Submit False Positive Requests

It's possible after fixing all vulnerabilities that you have an issue that doesn't seem to apply to the host. In this circumstance, you may request an exception that will be considered by us as a false positive. If a false positive request is approved, the vulnerability will not cause you to fail PCI compliance for 90 days. Note you must re-submit false positive requests every quarter as per the requirements outlined in the PCI Data Security Standard.

A few things to consider...

Before making a false positive request, complete all remediation steps to fix vulnerabilities and take these actions:

1) Work with your system administrator to fix all vulnerabilities using the recommended solutions. A custom solution is provided for each vulnerability in the vulnerability details.

2) Be sure to fix all vulnerabilities except the false positive issues. Your last rescan should show only the false positive issues.

How to submit a false positive request

If you believe that the PCI compliance service has identified a false positive, then submit a false positive request by going to Network > Vulnerabilities. Select the check box next to vulnerabilities you want to submit and then click "Review False Positives" to complete the request. A Technical Support representative will work with you to confirm the issue is indeed a false positive. Once approved, the false positive is approved for 90 days and this will not appear in your vulnerabilities list or in your reports.

Still have questions?

Reasons for requesting a false positive

What happens if my request is approved?

What happens if my request is rejected?

Why are vulnerability check boxes grayed out?

Tell me about false positive expiration

Each approved false positive is valid for 90 days. After 90 days, the approved false positive will expire automatically. The next time you run a network scan after a false positive expires, if the QID is detected on the host, you will fail PCI compliance. The vulnerability will be listed on the Current Vulnerabilities list with an indicator that there is an expired false positive associated with the vulnerability. A new false positive request must be submitted and approved to pass PCI compliance.

It is best practice to track the false positive status of your approved false positives and to submit new false positive requests as needed. See Searching False Positives to learn how to search for false positives that are already expired and false positives that are about to expire soon.