Edit

Disable vulnerability findings

The Defender for Servers plan in Microsoft Defender for Cloud uses Microsoft Defender Vulnerability Management to continuously scan your virtual machines (VMs) and identify vulnerabilities.

Defender for Servers presents the vulnerability findings as recommendations. Recommendations can include remediation steps, related CVEs, and CVSS scores. You can review them across subscriptions or focus on a specific VM.

If your organization needs to ignore certain findings instead of remediating them, you can disable them with a rule. Disabled findings don't affect your secure score, generate noise, or appear in the list of findings.

You might disable findings for:

  • Vulnerabilities with a severity less than medium
  • Unpatchable vulnerabilities
  • Vulnerabilities with CVSS score less than 6.5
  • Findings with specific text in the security check or category (for example, “Red Hat”)

Prerequisites

Disable specific findings

  1. Sign in to the Azure portal.

  2. Go to Defender for Cloud > Recommendations.

  3. Find the recommendation Machines should have vulnerability findings resolved.

  4. On the recommendation details page, select the Take action tab, and then select Disable rule.

  5. In the Disable rule pane, specify the criteria for the findings you want to disable. You can specify:

    • IDs – Enter one or more finding IDs (separate multiple IDs with semicolons).
    • CVEs – Enter CVE identifiers for the findings you want to disable.
    • Categories – Enter the categories of findings to disable.
    • Security checks – Enter text from the security check name for findings to disable.
    • CVSS2 and CVSS3 scores – To filter by score, enter a value between 1 and 10.
    • Minimum severity – Select Medium or High to exclude findings with a lower severity.
    • Patchable status – Select this option to exclude findings that can't be patched.
  6. Optionally, add a justification, and then select Apply rule. The rule might take up to 24 hours to take effect.

    Screenshot of creating a rule to disable VM vulnerability findings in Defender for Cloud.

  7. To view the rule status, open the Disable rule page. In the Scope list, subscriptions with active findings show the status Rule applied.

    Screenshot showing how to view, modify, or delete a rule for disabling vulnerability findings in Defender for Cloud.

Next steps