You can acknowledge a vulnerability if you don't want to be notified about it anymore. For example, when a programmable logic controller (PLC) is detected as vulnerable but a firewall or a security module is placed before the PLC, then the vulnerability is mitigated. The user can cancel an acknowledgment at any time. Only the following user roles can access vulnerabilities acknowledgment/cancelation:

  • Cyber Vision Admin
  • Cyber Vision Auditor
  • Cyber Vision Operator
  • Cyber Vision User

There are a few ways to acknowledge a vulnerability in the Cyber Vision UI.

Acknowledge a vulnerability

1. To acknowledge a vulnerability:

  1. Click Security Posture > Vulnerability.
  2. Click on the name of the Vulnerability that you want to acknowledge.
  3. Click the Affected Assets tab.
  4. Search for the asset for which you want to acknowledge this vulnerability.
  5. Click Acknowledge for that asset. A sidebar appears.
  6. Add your comment in the box.
  7. Click Save. The asset changes to Acknowledged with a green check in the previous screen.

2. To acknowledge a vulnerability:

  1. Click Inventory > Assets.
  2. Click on the name of an asset that you want to acknowledge.
  3. Click the Vulnerabilities tab.
  4. Search for the asset for which you want to acknowledge this vulnerability.
  5. Click Acknowledge for that asset. A sidebar appears.
  6. Add your comment in the box.
  7. Click Save. The asset changes to Acknowledged with a green check in the previous screen.

Cancel a vulnerability acknowledgment

To cancel a vulnerability acknowledgment:

  1. Click Security Posture > Vulnerability.
  2. Click on the name of the Vulnerability for which you want to cancel the acknowledgment.
  3. Click the Affected Assets tab.
  4. Search for the asset for which you want to cancel the acknowledgment.
  5. Click Acknowledged next to the green check for that asset. A sidebar appears.
  6. Add your comment in the box.
  7. Click Unacknowledge. The green check is now removed for this asset in the previous screen.

To modify the vulnerability parameters that display:

  1. Click Security Posture > Vulnerability > Settings icon > Edit Table Columns.
  2. Use the sliders to select which columns to show or hide in the list.
  3. Click Apply.

To filter the vulnerability parameters that display:

  1. Click the Filter icon. The option fields appear.
  2. Type in a Name or a CVE ID in the fields. Press Return/Enter. The display optimizes.
  3. For CVSS, use the drop-down arrow to select Low, Medium, High, or Critical.
  4. To remove the filter options, click the Filter icon.