You can acknowledge a vulnerability if you don't want to be notified about it anymore. For example, when a programmable logic controller (PLC) is detected as vulnerable but a firewall or a security module is placed before the PLC, then the vulnerability is mitigated. The user can cancel an acknowledgment at any time. Only the following user roles can access vulnerabilities acknowledgment/cancelation:
- Cyber Vision Admin
- Cyber Vision Auditor
- Cyber Vision Operator
- Cyber Vision User
There are a few ways to acknowledge a vulnerability in the Cyber Vision UI.
Acknowledge a vulnerability
1. To acknowledge a vulnerability:
- Click Security Posture > Vulnerability.
- Click on the name of the Vulnerability that you want to acknowledge.
- Click the Affected Assets tab.
- Search for the asset for which you want to acknowledge this vulnerability.
- Click Acknowledge for that asset. A sidebar appears.
- Add your comment in the box.
- Click Save. The asset changes to Acknowledged with a green check in the previous screen.
2. To acknowledge a vulnerability:
- Click Inventory > Assets.
- Click on the name of an asset that you want to acknowledge.
- Click the Vulnerabilities tab.
- Search for the asset for which you want to acknowledge this vulnerability.
- Click Acknowledge for that asset. A sidebar appears.
- Add your comment in the box.
- Click Save. The asset changes to Acknowledged with a green check in the previous screen.
Cancel a vulnerability acknowledgment
To cancel a vulnerability acknowledgment:
- Click Security Posture > Vulnerability.
- Click on the name of the Vulnerability for which you want to cancel the acknowledgment.
- Click the Affected Assets tab.
- Search for the asset for which you want to cancel the acknowledgment.
- Click Acknowledged next to the green check for that asset. A sidebar appears.
- Add your comment in the box.
- Click Unacknowledge. The green check is now removed for this asset in the previous screen.
To modify the vulnerability parameters that display:
- Click Security Posture > Vulnerability > Settings icon > Edit Table Columns.
- Use the sliders to select which columns to show or hide in the list.
- Click Apply.
To filter the vulnerability parameters that display:
- Click the Filter icon. The option fields appear.
- Type in a Name or a CVE ID in the fields. Press Return/Enter. The display optimizes.
- For CVSS, use the drop-down arrow to select Low, Medium, High, or Critical.
- To remove the filter options, click the Filter icon.