Dismissing Exposures
Dismissing Exposures Category: Exposures & Threats If an exposure is not relevant or is a false positive, you can dismiss it. Dismiss Reasons Already Fixed - You've resolved the issue outside of Malanta Not an Exposure - It's a false positive (the detected issue isn't actually a vulnerability) Ignore (Will Not Fix) - You've accepted the risk and chosen not to remediate Other - A custom reason you can describe Dismiss Scope When dismissing, you canFew readersBusiness Impact Categories
Business Impact Categories Category: Exposures & Threats Each exposure may include a business impact assessment describing what could happen if the vulnerability is exploited: Operational Disruption - Could disrupt business operations or service availability. Reputation Damage - Could harm the organization's public image or brand trust. Financial Losses - Could result in direct financial damage. Legal and Regulatory Consequences - Could lead to complianceFew readersWhat is an Exposure?
What is an Exposure? Category: Exposures & Threats An exposure is a discovered vulnerability or weakness in your external attack surface. Each exposure represents something that an attacker could potentially exploit - a misconfigured DNS record, a leaked credential, an expired certificate, or a subdomain that can be taken over. Exposure Data Fields Every exposure includes: Exposure Type - The category of vulnerability (e.g., "Subdomain Takeover", "Invalid SSL CertificateFew readersImminent Threats vs Regular Exposures
Imminent Threats vs Regular Exposures Category: Exposures & Threats What's the Difference? Exposures are vulnerabilities that exist in your attack surface - things like misconfigured DNS, expired certificates, or leaked data. They represent things that could be exploited. Imminent Threats are a subset of exposures where there's evidence that attackers are actively preparing to exploit them. They mean an attacker is not just aware of the vulnerability but is activFew readersHow to Filter and Search Exposures
How to Filter and Search Exposures Category: Exposures & Threats The Exposures page lets you filter and search to find specific vulnerabilities quickly. Available Filters Asset Type - Registered Domain, Subdomain, IP Address, Certificate Status - Exposed, Hijacked, Spoofed, Impersonated, Invalid, Prevented Exposure Type - The category of vulnerability Potential Impact - The business impact category Exposure Scenario - The specific scenario typeFew readers