Skip to content

Commit 5510363

Browse files
Merge pull request #2307 from MicrosoftDocs/main
Auto Publish – main to live - 2025-12-28 23:00 UTC
2 parents 4e2c455 + bbcd23e commit 5510363

File tree

5 files changed

+155
-118
lines changed

5 files changed

+155
-118
lines changed
Lines changed: 65 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -1,80 +1,102 @@
11
---
2-
title: Create exemptions and disable vulnerabilities (Secure score)
3-
description: Learn how to create exemptions and disable vulnerabilities in Defender for Cloud to customize secure score results and manage findings effectively.
2+
title: Disable vulnerability findings (Secure score)
3+
description: Learn how to disable vulnerability assessment findings in Microsoft Defender for Cloud to customize secure score results and manage findings effectively.
44
ms.topic: how-to
55
ms.date: 03/31/2025
6-
#customer intent: As a security administrator, I want to manage exemptions and disable vulnerabilities so that I can customize secure score results.
6+
#customer intent: As a security administrator, I want to disable vulnerability findings so that I can customize secure score results.
7+
78
---
89

9-
# Create exemptions and disable vulnerabilities (Secure score)
10+
# Disable vulnerability findings (Secure score)
1011

11-
Defender for Cloud lets you create exemptions and disable vulnerability assessment findings on container registry images and running images (secure score). This feature lets you customize your secure score results and manage the findings relevant to your organization.
12+
Microsoft Defender for Cloud lets you customize your secure score by controlling which vulnerability assessment findings are included in the score. You can do this by creating disable rules, which suppress specific findings for container registry images and running images.
1213

13-
If your organization needs to ignore a finding instead of remediating it, you can disable it. Disabled findings don't affect your secure score or generate unwanted alerts or recommendations.
14+
Disable rules help you exclude findings that aren't relevant to your organization so they dont affect your secure score or appear in your vulnerability findings list.
1415

15-
## Prerequisites
16+
## How disable rules work
1617

17-
- To create a rule, you need permissions to edit a policy in Azure Policy. Learn more in [Azure RBAC permissions in Azure Policy](/azure/governance/policy/overview#azure-rbac-permissions-in-azure-policy).
18+
Disable rules control how Defender for Cloud evaluates vulnerability assessment findings for container registry images and running container images. A disable rule tells Defender for Cloud to ignore specific findings that match the criteria you define.
19+
20+
When a finding is disabled:
21+
22+
- it doesn't appear in the list of vulnerability findings,
23+
- it doesn't affect your secure score, and
24+
- it doesn't generate alerts or recommendations.
25+
26+
Disable rules are applied per recommendation. To disable the same CVE or criteria for both registry images and running images, create a rule in each recommendation.
27+
28+
Disable rules are commonly used to:
29+
30+
- exclude low-severity findings,
31+
- ignore vulnerabilities in images the vendor won’t fix, or
32+
- suppress findings that aren't relevant to your environment.
1833

1934
> [!NOTE]
20-
> You can customize your vulnerability assessment experience by exempting management groups, subscriptions, or specific resources from your secure score. Learn how to [create an exemption](exempt-resource.md) for a resource or subscription.
35+
> If you need to exclude an entire resource, subscription, or management group from secure score calculations, you can [create an exemption](exempt-resource.md).
36+
37+
## Prerequisites
38+
39+
- To create a rule, you need permissions to edit a policy in Azure Policy. Learn more in [Azure RBAC permissions in Azure Policy](/azure/governance/policy/overview#azure-rbac-permissions-in-azure-policy).
2140

2241
## Create a disable rule
2342

24-
Create a disable rule for vulnerability findings on registry images and running images (secure score) from the recommendations detail page in Defender for Cloud.
43+
1. From the recommendations details page for [Container registry images should have vulnerability findings resolved powered by Microsoft Defender Vulnerability Management](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/c0b7cfc6-3172-465a-b378-53c7ff2cc0d5) or [Running container images should have vulnerability findings resolved powered by Microsoft Defender Vulnerability Management](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5), select **Disable rule**.
2544

26-
When a finding matches the criteria you defined in your disable rules, it won't appear in the list of findings.
45+
1. Select the scope where you want the rule to apply.
2746

28-
Typical scenarios include:
47+
1. Define your criteria. Disable rules can match findings based on:
2948

30-
- Disabling findings with severity below medium
31-
- Disabling findings for images that the vendor won't fix
49+
- **CVE** – Enter one or more valid CVE identifiers, separated by semicolons.
50+
For example, `CVE-2020-1347;CVE-2020-1346`
3251

33-
Disable rules use a combination of the following criteria:
52+
- **Image digest** – Specify the digests of images whose vulnerability findings you want to exclude. Separate multiple digests with semicolons.
53+
For example:
54+
`sha256:9b920e938111710c2768b31699aac9d1ae80ab6284454e8a9ff42e887fa1db31;sha256:ab0ab32f75988da9b146de7a3589c47e919393ae51bbf2d8a0d55dd92542451c`
3455

35-
- **CVE** - Enter the CVEs of the findings you want to exclude. Ensure the CVEs are valid. Separate multiple CVEs with a semicolon. For example, CVE-2020-1347; CVE-2020-1346.
36-
- **Image digest** - Specify images for which vulnerabilities should be excluded based on the image digest. Separate multiple digests with a semicolon, for example: `sha256:9b920e938111710c2768b31699aac9d1ae80ab6284454e8a9ff42e887fa1db31;sha256:ab0ab32f75988da9b146de7a3589c47e919393ae51bbf2d8a0d55dd92542451c`
37-
- **OS version** - Specify images for which vulnerabilities should be excluded based on the image OS. Separate multiple versions with a semicolon, for example: ubuntu_linux_20.04;alpine_3.17
38-
- **Minimum Severity** - Select low, medium, high, or critical to exclude vulnerabilities less than the specified severity level.
39-
- **Fix status** - Select the option to exclude vulnerabilities based on their fix status.
56+
- **OS version** – Specify OS versions to exclude *for images running that OS*. Separate multiple OS versions with semicolons.
57+
For example: `ubuntu_linux_20.04;alpine_3.17`
4058

41-
Disable rules apply per recommendation, for example, to disable [CVE-2017-17512](https://github.com/advisories/GHSA-fc69-2v7r-7r95) both on the registry images and runtime images, the disable rule has to be configured in both places.
59+
- **Minimum severity** – Exclude vulnerabilities that are *less than or equal to* the selected severity (low, medium, high, or critical).
4260

43-
### Create the disable rule:
61+
- **Fix status** – Exclude vulnerabilities based on whether a fix is available.
62+
For example: "Fix available", "No fix", "Unknown"
4463

45-
1. From the recommendations detail page for [Container registry images should have vulnerability findings resolved powered by Microsoft Defender Vulnerability Management](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/c0b7cfc6-3172-465a-b378-53c7ff2cc0d5) or [Running container images should have vulnerability findings resolved powered by Microsoft Defender Vulnerability Management](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5), select **Disable rule**.
64+
1. Enter a justification explaining why the finding is being disabled. This helps maintain clarity and auditability.
4665

47-
1. Select the relevant scope.
66+
1. Select **Apply rule**.
4867

49-
1. Define your criteria. You can use any of the following criteria:
68+
:::image type="content" source="./media/disable-vulnerability-findings-containers/disable-rules-secure-score.png" alt-text="Screenshot showing where to create a disable rule for vulnerability findings." lightbox="media/disable-vulnerability-findings-containers/disable-rules.png":::
5069

51-
- **CVE** - Enter the CVEs of the findings you want to exclude. Ensure the CVEs are valid. Separate multiple CVEs with a semicolon. For example, CVE-2020-1347; CVE-2020-1346.
52-
- **Image digest** - Specify images for which vulnerabilities should be excluded based on the image digest. Separate multiple digests with a semicolon, for example: `sha256:9b920e938111710c2768b31699aac9d1ae80ab6284454e8a9ff42e887fa1db31;sha256:ab0ab32f75988da9b146de7a3589c47e919393ae51bbf2d8a0d55dd92542451c`
53-
- **OS version** - Specify images for which vulnerabilities should be excluded based on the image OS. Separate multiple versions with a semicolon, for example: ubuntu_linux_20.04;alpine_3.17
54-
- **Minimum Severity** - Select low, medium, high, or critical to exclude vulnerabilities less than and equal to the specified severity level.
55-
- **Fix status** - Select the option to exclude vulnerabilities based on their fix status.
70+
Disable rule changes can take up to 24 hours to take effect. When the rule is active, it appears on the Disable rule page with a **Rule applied** status.
5671

57-
1. In the justification text box, add your justification for why a specific vulnerability was disabled. This provides clarity and understanding for anyone reviewing the rule.
72+
## View a disable rule
5873

59-
1. Select **Apply rule**.
74+
1. From the recommendation details page, select **Disable rule**.
75+
76+
1. Select the ellipsis (****) next to the rule and choose **View rule**.
6077

61-
:::image type="content" source="./media/disable-vulnerability-findings-containers/disable-rules-secure-score.png" alt-text="Screenshot showing where to create a disable rule for vulnerability findings on registry images." lightbox="media/disable-vulnerability-findings-containers/disable-rules.png":::
78+
## Override a disable rule
6279

63-
> [!IMPORTANT]
64-
> Changes might take up to 24 hours to take effect.
80+
1. From the recommendation details page, select **Disable rule**.
6581

66-
## View, override, or delete a rule
82+
1. Select the ellipsis (****) next to the rule you want to override.
6783

68-
1. From the recommendations detail page, select **Disable rule**.
69-
1. From the scope list, subscriptions with active rules show as **Rule applied**.
70-
1. To view or delete the rule, select the ellipsis menu ("...").
71-
1. Do one of the following:
72-
- To view or override a disable rule - select **View rule**, make any changes you want, and select **Override rule**.
73-
- To delete a disable rule - select **Delete rule**.
84+
1. Select **View rule**.
85+
86+
1. Update the criteria as needed and select **Override rule** to apply the changes.
7487

7588
:::image type="content" source="./media/disable-vulnerability-findings-containers/override-rules.png" alt-text="Screenshot showing where to view, delete or override a rule for vulnerability findings on registry images." lightbox="media/disable-vulnerability-findings-containers/override-rules.png":::
89+
90+
## Delete a disable rule
91+
92+
1. From the recommendation details page, select **Disable rule**.
93+
94+
1. Select the ellipsis (****) next to the rule you want to delete.
7695

77-
## Next step
96+
1. Select **Delete rule**.
97+
98+
## Next steps
7899

79100
- Learn how to [view and remediate vulnerability assessment findings for registry images](view-and-remediate-vulnerability-assessment-findings.md).
101+
80102
- Learn about [agentless container posture](concept-agentless-containers.md).

articles/defender-for-cloud/disable-vulnerability-findings-containers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Creating exemptions and disabling vulnerabilities
3-
description: Learn how to create exemptions and disable vulnerabilities
2+
title: Create exemptions and disable vulnerability assessment findings on container registry images and running images
3+
description: Learn how to create exemptions and disable vulnerability assessment findings for container registry images and running images in Microsoft Defender for Cloud.
44
ms.topic: how-to
55
ms.date: 07/29/2025
66
---

articles/defender-for-cloud/disable-vulnerability-findings.md

Lines changed: 20 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,9 @@ If your organization needs to ignore certain findings instead of remediating the
1818
You might disable findings for:
1919

2020
- Vulnerabilities with a severity less than medium
21-
- Vulnerabilities that aren't patchable.
21+
- Unpatchable vulnerabilities
2222
- Vulnerabilities with CVSS score less than 6.5
23-
- Findings with specific text in the security check or category (for example, “RedHat”)
23+
- Findings with specific text in the security check or category (for example, “Red Hat”)
2424

2525
## Prerequisites
2626

@@ -30,27 +30,30 @@ You might disable findings for:
3030

3131
## Disable specific findings
3232

33-
Create a rule to disable findings as follows:
33+
1. Sign in to the [Azure portal](https://portal.azure.com/).
3434

35-
1. In Defender for Cloud > **Recommendations**. Find recommendation [Machines should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/1195afff-c881-495e-9bc5-1486211ae03f).
36-
1. In the recommendation details page > **Take action** tab, select **Disable rule**.
37-
1. In **Disable rule**, specify the settings for disabling vulnerability findings. Findings will be disabled based on the settings criteria. You can specify:
35+
1. Go to **Defender for Cloud** > **Recommendations**.
3836

39-
- IDs: Enter the ID of the findings you want to disable. Separate multiple IDs with a semicolon
40-
- CVEs: Enter valid CVEs for findings you want to disable.
41-
- Categories: Enter the categories of findings.
42-
- Security checks: Enter text from the name of the security checks for findings to disable.
43-
- CVSS2 and CVSS3 scores: to filter by score, enter a value between 1-10.
44-
- Minimum severity: Select Medium or High to exclude findings with a severity of less than that chosen.
45-
- Patchable status: Select the checkbox to exclude findings that can't be patched.
37+
1. Find the recommendation **[Machines should have vulnerability findings resolved](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/1195afff-c881-495e-9bc5-1486211ae03f)**.
4638

47-
1. Optionally add a justification, and then select **Apply rule**. It might take up to 24 hours to take effect.
39+
1. On the recommendation details page, select the **Take action** tab, and then select **Disable rule**.
4840

49-
:::image type="content" source="./media/remediate-vulnerability-findings-vm/new-disable-rule-for-finding.png" alt-text="Create a disable rule for VA findings on VM." lightbox="media/remediate-vulnerability-findings-vm/new-disable-rule-for-finding.png":::
41+
1. In the **Disable rule** pane, specify the criteria for the findings you want to disable. You can specify:
42+
- **IDs** – Enter one or more finding IDs (separate multiple IDs with semicolons).
43+
- **CVEs** – Enter CVE identifiers for the findings you want to disable.
44+
- **Categories** – Enter the categories of findings to disable.
45+
- **Security checks** – Enter text from the security check name for findings to disable.
46+
- **CVSS2 and CVSS3 scores** – To filter by score, enter a value between 1 and 10.
47+
- **Minimum severity** – Select *Medium* or *High* to exclude findings with a lower severity.
48+
- **Patchable status** – Select this option to exclude findings that can't be patched.
5049

51-
1. To view the status of a rule, in the **Disable rule** page. In the **Scope** list, subscriptions with active findings show a status of **Rule applied**.
50+
1. Optionally, add a justification, and then select **Apply rule**. The rule might take up to 24 hours to take effect.
5251

53-
:::image type="content" source="./media/remediate-vulnerability-findings-vm/modify-rule.png" alt-text="Modify or delete an existing rule." lightbox="media/remediate-vulnerability-findings-vm/modify-rule.png":::
52+
:::image type="content" source="./media/remediate-vulnerability-findings-vm/new-disable-rule-for-finding.png" alt-text="Screenshot of creating a rule to disable VM vulnerability findings in Defender for Cloud." lightbox="media/remediate-vulnerability-findings-vm/new-disable-rule-for-finding.png":::
53+
54+
1. To view the rule status, open the **Disable rule** page. In the **Scope** list, subscriptions with active findings show the status **Rule applied**.
55+
56+
:::image type="content" source="./media/remediate-vulnerability-findings-vm/modify-rule.png" alt-text="Screenshot showing how to view, modify, or delete a rule for disabling vulnerability findings in Defender for Cloud." lightbox="media/remediate-vulnerability-findings-vm/modify-rule.png":::
5457

5558
## Next steps
5659

0 commit comments

Comments
 (0)