Remediation and Auto-Remediation
Remediation and Auto-Remediation
Category: Features & Tools
Manual Remediation
For each exposure, Malanta provides:
- Step-by-step remediation instructions - Specific actions to fix the vulnerability
- Code snippets - Exact commands or configuration changes where applicable
- Connection details - Which systems need updating and how
Auto-Remediation for Subdomain Takeovers
For Subdomain Takeover exposures, Malanta offers automatic remediation:
Available Actions
- Update - Automatically update the dangling CNAME record to point to the top-level domain (requires DNS integration)
- Delete - Automatically delete the dangling CNAME record (requires DNS integration)
- Consent - Allow Malanta to take temporary ownership of the abandoned resource while you work on resolving it, preventing attackers from claiming it
How It Works
- Click "Prevent" on a subdomain takeover exposure
- Review the remediation steps
- Select your preferred option
- Optionally check "Automatically remediate all similar instances"
- Submit
Safety Features
- Full audit logs for all remediation actions
- Ability to restore previous configurations
- All actions require explicit consent
- Remediation is scoped and controlled
Prevented Threats
Once remediated, an exposure's status changes to Prevented (green) and moves to the Prevented Threats page with a timestamp recorded.
Updated on: 26/02/2026
Thank you!