Actions to mute assets and their associated ports and security risks
Go to Asset Exposure under the Attack Surface tab.
In the Asset Exposure section, a mute icon is located at the right corner of each asset.
Click the icon to mute the selected instance.
A dialog box titled "Mute Instance" will appear. It includes a dropdown menu to select the reason for muting and a hyperlink to view all muted instances. Clicking this link redirects you to the Settings section, where muted instances can be deleted (i.e., unmuted).
Select the appropriate reason and click the "OK" button to confirm. You may also include a personalized comment by choosing the "Other" option from the dropdown.
A success notification will confirm the action.
Once muted, you will not receive notifications about the instance in upcoming scans.
Go to Asset Inventory under the Attack Surface tab.
In the Asset Inventory section, a mute icon is located at the right corner of each asset.
Click the icon to mute the selected instance.
A dialog box titled "Mute Instance" will appear. It includes a dropdown menu to select the reason for muting and a hyperlink to view all muted instances. Clicking this link redirects you to the Settings section, where muted instances can be deleted (i.e., unmuted).
Select the appropriate reason and click the "OK" button to confirm. You may also include a personalized comment by choosing the "Other" option from the dropdown.
In the All Data Leaks section, a mute icon is located at the right corner of each data leak.
Click the icon to mute the selected instance.
A dialog box titled "Mute Instance" will appear. It includes a dropdown menu to select the reason for muting and a hyperlink to view all muted instances. Clicking this link redirects you to the Settings section, where muted instances can be deleted (i.e., unmuted).
Select the appropriate reason and click the "OK" button to confirm. You may also include a personalized comment by choosing the "Other" option from the dropdown.
Go to All Security Risks under the Security Risks tab.
In the All Security Risks section, a mute icon is located at the right corner of each security risk.
Click the icon to mute the selected instance.
A dialog box titled "Mute Instance" will appear. It includes a dropdown menu to select the reason for muting and a hyperlink to view all muted instances. Clicking this link redirects you to the Settings section, where muted instances can be deleted (i.e., unmuted).
Select the appropriate reason and click the "OK" button to confirm. You may also include a personalized comment by choosing the "Other" option from the dropdown.