• /
  • EnglishEspañolFrançais日本語한국어Português
  • ログイン今すぐ開始

Manage application vulnerability status

New Relic Security RX can detect vulnerabilities across your applications. While most vulnerabilities need remediation, some might not be applicable to your environment. For example, your internal policies might categorize them as low risk or limited exposure due to how your application uses the potentially vulnerable component.

For vulnerabilities you're not interested in tracking, you can set the Status to Ignored so they no longer appear in the UI. Since each vulnerability is tied to one or more applications, you can:

  • Ignore individual vulnerabilities for a specific application
  • Ignore a vulnerability that appears across multiple applications

You can always change the status from Ignored back to Affected if you decide a vulnerability is worth tracking again.

ヒント

Before you ignore a vulnerability, keep in mind that this change prevents other users with account access from seeing that vulnerability.

Ignore a vulnerability

When you choose to ignore a vulnerability, you'll be prompted to explain the rationale behind the decision. For example, you might say that the vulnerable code is not used in the application. We recommend that when you give this context, you also provide supplemental documentation when possible.

You'll also be prompted to set a duration for the Ignored status. Security RX will automatically change it from Ignored to Affected when the time period expires. If a vulnerability is already No Longer Detected, the status will remain no longer detected.

Restore ignored vulnerabilities

It's good practice to review ignored vulnerabilities and validate whether they should stay ignored. We recommend reviewing your vulnerabilities every 90 days to ensure you aren't introducing risk into your system.

If you change the status from Ignored to Affected for a specific application, that reintroduces the vulnerability into default views and counts against this application. Instances of this vulnerability on other applications remain ignored.

What's next?

Set up alerts

Get notified when application vulnerabilities are detected

Query security data

Track status changes and remediation metrics with NRQL

Understand prioritization

Learn how application vulnerabilities are ranked by risk

Manage organization vulnerabilities

View application vulnerabilities across your entire organization

Copyright © 2025 New Relic株式会社。

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.