Filter Suppressed Vulnerabilities List

With filtering, you can customize the suppressed vulnerabilities list according to the selected criteria. The Filter icon is located above the upper-right corner of the Suppressed Vulnerabilities table. 

After the Filter icon is selected, the Filters pop-up window appears.

Suppressed Vulnerabilities list can be filtered by the following criteria:

  • Severity—shows suppressed vulnerabilities with the selected severity status (Critical, High, Medium, Low) assigned.
  • Assignment—shows vulnerabilities assigned to another user by you (By me), to you by another user (To me), vulnerabilities that are not assigned (Unassigned), or vulnerabilities that are assigned to a particular user. 
    • To select a user, select the To dropdown list and then select the checkboxes near the needed users.
  • Last reviewed—shows vulnerabilities that were reviewed within the selected date range (All, Last 30 Days, Last 90 Days, Not Reviewed)

To filter vulnerabilities list

  1. Select the Filter icon.
  2. In the Filters pop-up window, select the checkboxes near the needed options. You can select several filters at a time. 
    Filter vulnerabilities list
  3. Select the Apply button.
  4. To clear all filters, select the Clear Filters button that is now located next to the Search field.

Related Topics

Suppressed Vulnerabilities Tab,

Suppressed Vulnerabilities Table

Search Suppressed Vulnerabilities

View Suppressed Vulnerability Details

Download Accepted Vulnerabilities Information

Assign Accepted Vulnerability

Select Suppressed Vulnerabilities Patch Publication Date