Skip to main content

How to Mute Any Instance?

Actions to mute assets and their associated ports and security risks

  • Go to Asset Exposure under the Attack Surface tab.
  • In the Asset Exposure section, a mute icon is located at the right corner of each asset.
  • Click the icon to mute the selected instance.
  • A dialog box titled "Mute Instance" will appear. It includes a dropdown menu to select the reason for muting and a hyperlink to view all muted instances. Clicking this link redirects you to the Settings section, where muted instances can be deleted (i.e., unmuted).
  • Select the appropriate reason and click the "OK" button to confirm. You may also include a personalized comment by choosing the "Other" option from the dropdown.
  • A success notification will confirm the action.
  • Once muted, you will not receive notifications about the instance in upcoming scans.

Actions to mute assets along with their ports

  • Go to Asset Inventory under the Attack Surface tab.
  • In the Asset Inventory section, a mute icon is located at the right corner of each asset.
  • Click the icon to mute the selected instance.
  • A dialog box titled "Mute Instance" will appear. It includes a dropdown menu to select the reason for muting and a hyperlink to view all muted instances. Clicking this link redirects you to the Settings section, where muted instances can be deleted (i.e., unmuted).
  • Select the appropriate reason and click the "OK" button to confirm. You may also include a personalized comment by choosing the "Other" option from the dropdown.
  • A success notification will confirm the action.

Actions to mute data leaks

  • Go to All Data Leaks under the Data Leaks tab.
  • In the All Data Leaks section, a mute icon is located at the right corner of each data leak.
  • Click the icon to mute the selected instance.
  • A dialog box titled "Mute Instance" will appear. It includes a dropdown menu to select the reason for muting and a hyperlink to view all muted instances. Clicking this link redirects you to the Settings section, where muted instances can be deleted (i.e., unmuted).
  • Select the appropriate reason and click the "OK" button to confirm. You may also include a personalized comment by choosing the "Other" option from the dropdown.
  • A success notification will confirm the action.

Actions to mute security risks

  • Go to All Security Risks under the Security Risks tab.
  • In the All Security Risks section, a mute icon is located at the right corner of each security risk.
  • Click the icon to mute the selected instance.
  • A dialog box titled "Mute Instance" will appear. It includes a dropdown menu to select the reason for muting and a hyperlink to view all muted instances. Clicking this link redirects you to the Settings section, where muted instances can be deleted (i.e., unmuted).
  • Select the appropriate reason and click the "OK" button to confirm. You may also include a personalized comment by choosing the "Other" option from the dropdown.
  • A success notification will confirm the action.