Articles on: Features & Tools

Remediation and Auto-Remediation

Remediation and Auto-Remediation



Category: Features & Tools



Manual Remediation



For each exposure, Malanta provides:

  • Step-by-step remediation instructions - Specific actions to fix the vulnerability
  • Code snippets - Exact commands or configuration changes where applicable
  • Connection details - Which systems need updating and how



Auto-Remediation for Subdomain Takeovers



For Subdomain Takeover exposures, Malanta offers automatic remediation:



Available Actions

  1. Update - Automatically update the dangling CNAME record to point to the top-level domain (requires DNS integration)
  2. Delete - Automatically delete the dangling CNAME record (requires DNS integration)
  3. Consent - Allow Malanta to take temporary ownership of the abandoned resource while you work on resolving it, preventing attackers from claiming it



How It Works

  1. Click "Prevent" on a subdomain takeover exposure
  2. Review the remediation steps
  3. Select your preferred option
  4. Optionally check "Automatically remediate all similar instances"
  5. Submit



Safety Features

  • Full audit logs for all remediation actions
  • Ability to restore previous configurations
  • All actions require explicit consent
  • Remediation is scoped and controlled



Prevented Threats



Once remediated, an exposure's status changes to Prevented (green) and moves to the Prevented Threats page with a timestamp recorded.

Updated on: 26/02/2026

Was this article helpful?

Share your feedback

Cancel

Thank you!