Using the POST /file/upload and POST /exclusions/import API endpoints, you can import exclusions as a comma-separated values (.csv) file for use in scan configuration in Tenable Vulnerability Management.
This file is composed of a header and at least one line of data. Each line in the file must be separated by a new line break.
A header line in the file is optional. If included, the header must be the first line in the file and be formatted as follows:
There are no spaces after the commas in this line.
Each data line in the file represents one exclusion configuration.
Each data line is a comma-delimited string of fields described in the table below.
Optional fields can be blank, but the associated comma separator must be present in the data line.
|An integer that uniquely identifies the exclusion.
|The name of the exclusion. You can use any combination of alpha-numeric characters or symbols.
|A description for the exclusion.
|The target or targets where you want the scan exclusion to apply. This value can have the following formats:
|The Unix timestamp that Vulnerability Management uses as the creation date for the imported exclusion(s).
|The Unix timestamp that Vulnerability Management uses as the last modification date for the exclusion(s).
1,Exclusion Rule 1,routers,"192.0.2.57,192.0.2.177,192.0.2.8",1561643735,1561643785
,Exclusion Rule 2,workstations,192.0.2.57-192.0.2.67,,
Updated 11 days ago