|
1 | 1 | --- |
2 | | -title: Create exemptions and disable vulnerabilities (Secure score) |
3 | | -description: Learn how to create exemptions and disable vulnerabilities in Defender for Cloud to customize secure score results and manage findings effectively. |
| 2 | +title: Disable vulnerability findings (Secure score) |
| 3 | +description: Learn how to disable vulnerability assessment findings in Microsoft Defender for Cloud to customize secure score results and manage findings effectively. |
4 | 4 | ms.topic: how-to |
5 | 5 | ms.date: 03/31/2025 |
6 | | -#customer intent: As a security administrator, I want to manage exemptions and disable vulnerabilities so that I can customize secure score results. |
| 6 | +#customer intent: As a security administrator, I want to disable vulnerability findings so that I can customize secure score results. |
| 7 | + |
7 | 8 | --- |
8 | 9 |
|
9 | | -# Create exemptions and disable vulnerabilities (Secure score) |
| 10 | +# Disable vulnerability findings (Secure score) |
10 | 11 |
|
11 | | -Defender for Cloud lets you create exemptions and disable vulnerability assessment findings on container registry images and running images (secure score). This feature lets you customize your secure score results and manage the findings relevant to your organization. |
| 12 | +Microsoft Defender for Cloud lets you customize your secure score by controlling which vulnerability assessment findings are included in the score. You can do this by creating disable rules, which suppress specific findings for container registry images and running images. |
12 | 13 |
|
13 | | -If your organization needs to ignore a finding instead of remediating it, you can disable it. Disabled findings don't affect your secure score or generate unwanted alerts or recommendations. |
| 14 | +Disable rules help you exclude findings that aren't relevant to your organization so they don’t affect your secure score or appear in your vulnerability findings list. |
14 | 15 |
|
15 | | -## Prerequisites |
| 16 | +## How disable rules work |
16 | 17 |
|
17 | | -- To create a rule, you need permissions to edit a policy in Azure Policy. Learn more in [Azure RBAC permissions in Azure Policy](/azure/governance/policy/overview#azure-rbac-permissions-in-azure-policy). |
| 18 | +Disable rules control how Defender for Cloud evaluates vulnerability assessment findings for container registry images and running container images. A disable rule tells Defender for Cloud to ignore specific findings that match the criteria you define. |
| 19 | + |
| 20 | +When a finding is disabled: |
| 21 | + |
| 22 | +- it doesn't appear in the list of vulnerability findings, |
| 23 | +- it doesn't affect your secure score, and |
| 24 | +- it doesn't generate alerts or recommendations. |
| 25 | + |
| 26 | +Disable rules are applied per recommendation. To disable the same CVE or criteria for both registry images and running images, create a rule in each recommendation. |
| 27 | + |
| 28 | +Disable rules are commonly used to: |
| 29 | + |
| 30 | +- exclude low-severity findings, |
| 31 | +- ignore vulnerabilities in images the vendor won’t fix, or |
| 32 | +- suppress findings that aren't relevant to your environment. |
18 | 33 |
|
19 | 34 | > [!NOTE] |
20 | | -> You can customize your vulnerability assessment experience by exempting management groups, subscriptions, or specific resources from your secure score. Learn how to [create an exemption](exempt-resource.md) for a resource or subscription. |
| 35 | +> If you need to exclude an entire resource, subscription, or management group from secure score calculations, you can [create an exemption](exempt-resource.md). |
| 36 | +
|
| 37 | +## Prerequisites |
| 38 | + |
| 39 | +- To create a rule, you need permissions to edit a policy in Azure Policy. Learn more in [Azure RBAC permissions in Azure Policy](/azure/governance/policy/overview#azure-rbac-permissions-in-azure-policy). |
21 | 40 |
|
22 | 41 | ## Create a disable rule |
23 | 42 |
|
24 | | -Create a disable rule for vulnerability findings on registry images and running images (secure score) from the recommendations detail page in Defender for Cloud. |
| 43 | +1. From the recommendations details page for [Container registry images should have vulnerability findings resolved powered by Microsoft Defender Vulnerability Management](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/c0b7cfc6-3172-465a-b378-53c7ff2cc0d5) or [Running container images should have vulnerability findings resolved powered by Microsoft Defender Vulnerability Management](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5), select **Disable rule**. |
25 | 44 |
|
26 | | -When a finding matches the criteria you defined in your disable rules, it won't appear in the list of findings. |
| 45 | +1. Select the scope where you want the rule to apply. |
27 | 46 |
|
28 | | -Typical scenarios include: |
| 47 | +1. Define your criteria. Disable rules can match findings based on: |
29 | 48 |
|
30 | | -- Disabling findings with severity below medium |
31 | | -- Disabling findings for images that the vendor won't fix |
| 49 | + - **CVE** – Enter one or more valid CVE identifiers, separated by semicolons. |
| 50 | + For example, `CVE-2020-1347;CVE-2020-1346` |
32 | 51 |
|
33 | | -Disable rules use a combination of the following criteria: |
| 52 | + - **Image digest** – Specify the digests of images whose vulnerability findings you want to exclude. Separate multiple digests with semicolons. |
| 53 | + For example: |
| 54 | + `sha256:9b920e938111710c2768b31699aac9d1ae80ab6284454e8a9ff42e887fa1db31;sha256:ab0ab32f75988da9b146de7a3589c47e919393ae51bbf2d8a0d55dd92542451c` |
34 | 55 |
|
35 | | -- **CVE** - Enter the CVEs of the findings you want to exclude. Ensure the CVEs are valid. Separate multiple CVEs with a semicolon. For example, CVE-2020-1347; CVE-2020-1346. |
36 | | -- **Image digest** - Specify images for which vulnerabilities should be excluded based on the image digest. Separate multiple digests with a semicolon, for example: `sha256:9b920e938111710c2768b31699aac9d1ae80ab6284454e8a9ff42e887fa1db31;sha256:ab0ab32f75988da9b146de7a3589c47e919393ae51bbf2d8a0d55dd92542451c` |
37 | | -- **OS version** - Specify images for which vulnerabilities should be excluded based on the image OS. Separate multiple versions with a semicolon, for example: ubuntu_linux_20.04;alpine_3.17 |
38 | | -- **Minimum Severity** - Select low, medium, high, or critical to exclude vulnerabilities less than the specified severity level. |
39 | | -- **Fix status** - Select the option to exclude vulnerabilities based on their fix status. |
| 56 | + - **OS version** – Specify OS versions to exclude *for images running that OS*. Separate multiple OS versions with semicolons. |
| 57 | + For example: `ubuntu_linux_20.04;alpine_3.17` |
40 | 58 |
|
41 | | -Disable rules apply per recommendation, for example, to disable [CVE-2017-17512](https://github.com/advisories/GHSA-fc69-2v7r-7r95) both on the registry images and runtime images, the disable rule has to be configured in both places. |
| 59 | + - **Minimum severity** – Exclude vulnerabilities that are *less than or equal to* the selected severity (low, medium, high, or critical). |
42 | 60 |
|
43 | | -### Create the disable rule: |
| 61 | + - **Fix status** – Exclude vulnerabilities based on whether a fix is available. |
| 62 | + For example: "Fix available", "No fix", "Unknown" |
44 | 63 |
|
45 | | -1. From the recommendations detail page for [Container registry images should have vulnerability findings resolved powered by Microsoft Defender Vulnerability Management](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/c0b7cfc6-3172-465a-b378-53c7ff2cc0d5) or [Running container images should have vulnerability findings resolved powered by Microsoft Defender Vulnerability Management](https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/c609cf0f-71ab-41e9-a3c6-9a1f7fe1b8d5), select **Disable rule**. |
| 64 | +1. Enter a justification explaining why the finding is being disabled. This helps maintain clarity and auditability. |
46 | 65 |
|
47 | | -1. Select the relevant scope. |
| 66 | +1. Select **Apply rule**. |
48 | 67 |
|
49 | | -1. Define your criteria. You can use any of the following criteria: |
| 68 | + :::image type="content" source="./media/disable-vulnerability-findings-containers/disable-rules-secure-score.png" alt-text="Screenshot showing where to create a disable rule for vulnerability findings." lightbox="media/disable-vulnerability-findings-containers/disable-rules.png"::: |
50 | 69 |
|
51 | | - - **CVE** - Enter the CVEs of the findings you want to exclude. Ensure the CVEs are valid. Separate multiple CVEs with a semicolon. For example, CVE-2020-1347; CVE-2020-1346. |
52 | | - - **Image digest** - Specify images for which vulnerabilities should be excluded based on the image digest. Separate multiple digests with a semicolon, for example: `sha256:9b920e938111710c2768b31699aac9d1ae80ab6284454e8a9ff42e887fa1db31;sha256:ab0ab32f75988da9b146de7a3589c47e919393ae51bbf2d8a0d55dd92542451c` |
53 | | - - **OS version** - Specify images for which vulnerabilities should be excluded based on the image OS. Separate multiple versions with a semicolon, for example: ubuntu_linux_20.04;alpine_3.17 |
54 | | - - **Minimum Severity** - Select low, medium, high, or critical to exclude vulnerabilities less than and equal to the specified severity level. |
55 | | - - **Fix status** - Select the option to exclude vulnerabilities based on their fix status. |
| 70 | +Disable rule changes can take up to 24 hours to take effect. When the rule is active, it appears on the Disable rule page with a **Rule applied** status. |
56 | 71 |
|
57 | | -1. In the justification text box, add your justification for why a specific vulnerability was disabled. This provides clarity and understanding for anyone reviewing the rule. |
| 72 | +## View a disable rule |
58 | 73 |
|
59 | | -1. Select **Apply rule**. |
| 74 | +1. From the recommendation details page, select **Disable rule**. |
| 75 | + |
| 76 | +1. Select the ellipsis (**…**) next to the rule and choose **View rule**. |
60 | 77 |
|
61 | | - :::image type="content" source="./media/disable-vulnerability-findings-containers/disable-rules-secure-score.png" alt-text="Screenshot showing where to create a disable rule for vulnerability findings on registry images." lightbox="media/disable-vulnerability-findings-containers/disable-rules.png"::: |
| 78 | +## Override a disable rule |
62 | 79 |
|
63 | | - > [!IMPORTANT] |
64 | | - > Changes might take up to 24 hours to take effect. |
| 80 | +1. From the recommendation details page, select **Disable rule**. |
65 | 81 |
|
66 | | -## View, override, or delete a rule |
| 82 | +1. Select the ellipsis (**…**) next to the rule you want to override. |
67 | 83 |
|
68 | | -1. From the recommendations detail page, select **Disable rule**. |
69 | | -1. From the scope list, subscriptions with active rules show as **Rule applied**. |
70 | | -1. To view or delete the rule, select the ellipsis menu ("..."). |
71 | | -1. Do one of the following: |
72 | | - - To view or override a disable rule - select **View rule**, make any changes you want, and select **Override rule**. |
73 | | - - To delete a disable rule - select **Delete rule**. |
| 84 | +1. Select **View rule**. |
| 85 | + |
| 86 | +1. Update the criteria as needed and select **Override rule** to apply the changes. |
74 | 87 |
|
75 | 88 | :::image type="content" source="./media/disable-vulnerability-findings-containers/override-rules.png" alt-text="Screenshot showing where to view, delete or override a rule for vulnerability findings on registry images." lightbox="media/disable-vulnerability-findings-containers/override-rules.png"::: |
| 89 | + |
| 90 | +## Delete a disable rule |
| 91 | + |
| 92 | +1. From the recommendation details page, select **Disable rule**. |
| 93 | + |
| 94 | +1. Select the ellipsis (**…**) next to the rule you want to delete. |
76 | 95 |
|
77 | | -## Next step |
| 96 | +1. Select **Delete rule**. |
| 97 | + |
| 98 | +## Next steps |
78 | 99 |
|
79 | 100 | - Learn how to [view and remediate vulnerability assessment findings for registry images](view-and-remediate-vulnerability-assessment-findings.md). |
| 101 | + |
80 | 102 | - Learn about [agentless container posture](concept-agentless-containers.md). |
0 commit comments