Monitoring rules - Code-level Vulnerability Analytics
You can create your own fine-grained monitoring rules for code-level vulnerabilities based on resource attributes, and define multiple conditions for one rule. When creating a rule, you can check if conditions apply and how many process groups are affected. The rules you create override the global code-level vulnerability detection control for the selected technology.
Prerequisites
Enable Code-level Vulnerability Analytics.
Create custom monitoring rules
-
Go to Settings and select Application security > Vulnerability Analytics > Monitoring rules: Code-level.
-
Select Add new rule.
-
optional Name your rule (if not, a name will be assigned to it automatically once you create the rule, based on your criteria).
-
For Code-level vulnerability control, specify how to control a vulnerability that matches the rule criteria:
- Do not monitor – Code-level vulnerabilities for the selected conditions are ignored.
- Monitor – Code-level vulnerabilities for the selected selected conditions are reported.
-
optional Select Add new condition to add one or more conditions to your rule.
- If you don't add any condition, the rule applies to all processes.
- If you add multiple conditions, all of them have to apply for the rule to take effect. To check if a rule applies, select Preview matching process group instances. This lists process group instances that currently match the criteria.
Example conditions:
-
Select Save changes.
You can edit, disable, enable, or remove rules at any time.
Monitoring rules are ordered; the first matching rule applies.
- Restart processes.
Frequently asked questions
- What happens if I change the order of the rules?
- The first matching rule applies.
- What happens if a Do not monitor rule that applies gets added?
- New vulnerabilities for the processes that match the rule won't be created.
- Existing vulnerabilities that only relate to matching processes are resolved.
- What happens if a Do not monitor rule is deleted or doesn't apply anymore?
- New vulnerabilities for the processes that match the rule will be created.
- Related resolved vulnerabilities are reopened.