Last Updated: 2025-05-27
Purpose
This article describes how to mark a finding as a false positive in the Portal.
Introduction
A false positive refers to situations where the scanner mistakenly identifies a harmless action or event as a threat or risk. Marking a Finding as False Positive allows analysts to indicate that a flagged vulnerability is not a real threat—due to factors like outdated threat signatures, misconfiguration or overzealous security settings, or inherent limitations in the detection algorithms.
To prevent it from reoccurring in future scans, it can be marked as a False Positive. Once marked, the finding retains visibility but is labeled as false positive, and optionally an encrypted scan blueprint can be submitted to Outpost24’s research team for further evaluation. This capability helps reduce alert fatigue, prevent recurring noise in scan results, and improve the signal-to-noise ratio in your vulnerability management process.
Reporting a False Positive
Prerequisites
Before you start, verify that the False Positive column is active, to show the status of the findings.
To activate the False Positive column:
-
Login to the portal.
-
Go to Findings > Vulnerabilities.
-
Click on the filter icon and select False positive.
Reporting
To report a false positive:
-
Go to Findings > Vulnerabilities.
-
Open the mark false positive popup. This can be done in two ways:
-
From the Toolbar:
-
Select the checkbox on the vulnerabilities you want to mark as a false positive.
-
Click the Mark as false positive
icon on the toolbar.
-
-
From the context menu:
-
Right-click on the vulnerabilities you want to mark as false positive to open the context menu.
-
Select Mark as false positive in the in the menu.
-
-
-
When the Mark as false positive popup is displayed, enter a comment in the comment input.
-
To send additional information to Outpost24, toggle the Send information to the Outpost24 Vulnerability Research and Development Team switch.
-
Once all of the information is filled out, click the blue SEND button.
A False Positive will still be listed in the results, but with its status changed to false positive.
The vulnerability details, comments and additional information are displayed in the comment tab.
-
For HIAB users, if they choose the Include scan blueprint in the submission option, an encrypted blueprint file is created and uploaded to Outpost 24 Support Team.
Unmarking a False Positive
To unmark an entry as a false positive, select Unmark as False Positive in the context menu or the toolbar.
Related Articles
- Reports
- Log In Using LDAP
- Report Library
- Vulnerability Database
- Removing an Agent from Windows
- Delta
- Scan Blueprint
- Technical Specification
- Schedules
- Installing a Linux Agent
- Workflows
- Troubleshooting checklists
- User Management
- Check Connectivity to Agent Server
- Scan Scheduling Errors
- HIAB Deployment Guide
- Managing Tags
- Checking if Agent is Running
- Agent Installation Introduction
- Common Settings Panel
- Scanning Range
- Role Management
- Portal Icon List
- Agent Call Home
- Asset Discovery
- XML API Interface Technical Document
- Using the Agent Info Command
- Scheduled Reports
- Removing an Agent from Linux
- Solutions
- Identity and Access Management (IAM)
- Understanding Scanner and Scheduler
- Licensing Consumption
- Installing a macOS Agent
- Agent Introduction
- Setting Up an Agent Using System Proxy
- DNS Lookup in UI and in Console
- Supported Browsers
- HIAB Console
- Certificates
- Marking as False Positives
- Managing Agents
- Event Notification - Integration
- HIAB Distribution Settings
- Agent Latest Version
- Column Configuration
- PGP on User Accounts
- Event Notification - Use Cases
- Logging in to the Portal
- Firewall Rules
- Account
- Notification Settings
- Products Database
- Log In Using Single Sign-On (SSO)
- Scan Assessment Configuration
- View Templates
- Ports
- Installing a Windows Agent
- Generate Reports
- Basic Credentials
- Scan Stages
- Object Identifiers
- Subscriptions Overview
- Services
- REST API Interface Technical Document
- Getting Started with the Portal
- Scan Configuration Settings
- Scans View
- Retrieving a REST API Token From XMLAPI
- HIAB E-mail Whitelisting
- Scan Credentials
- API Examples
- Tags
- Accepting a Risk
- Importing Tags for AWS Discovery
- Discovery Scan Configuration
- Products
- Vulnerabilities
- Scan Policies
- Resource Group Management
- Download Agents
- Discussions and Commenting
- Filters
- Notifications
- 2FA on User Accounts
- Assets