Kaspersky Security Center

Ignoring software vulnerabilities

14 April 2024

ID 191582

You can ignore software vulnerabilities to be fixed. The reasons to ignore software vulnerabilities might be, for example, the following:

  • You do not consider the software vulnerability to be critical to your organization.
  • You understand that the software vulnerability fix can damage data related to the software that required the vulnerability fix.
  • You are sure that the software vulnerability is not dangerous for your organization's network because you use other measures to protect your managed devices.

You can ignore a software vulnerability on all managed devices or only on selected managed devices.

To ignore a software vulnerability on all managed devices:

  1. In the AdvancedApplication management folder in the console tree, select the Software vulnerabilities subfolder.

    The workspace of the folder displays a list of vulnerabilities in applications detected on devices by the Network Agent installed on them.

  2. Select the vulnerability you want to ignore.
  3. Select Properties from the context menu of the vulnerability.

    The properties window of the vulnerability opens.

  4. On the General section, select the Ignore vulnerability option.
  5. Click OK.

    The software vulnerability properties window is closed.

The software vulnerability is ignored on all managed devices.

To ignore a software vulnerability on the selected managed device:

  1. Open the properties window of the selected managed device and select the Software vulnerabilities section.
  2. Select a software vulnerability.
  3. Ignore selected vulnerability.

The software vulnerability is ignored on the selected device.

The ignored software vulnerability will not be fixed after the completion of the Fix vulnerabilities task or Install required updates and fix vulnerabilities task. You can exclude ignored software vulnerabilities from the list of vulnerabilities by using a filter.

See also:

Scenario: Finding and fixing third-party software vulnerabilities

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.