Using the POST /file/upload and POST /exclusions/import API endpoints, you can import exclusions as a comma-separated values (.csv) file for use in scan configuration in Tenable Vulnerability Management.
This file is composed of a header and at least one line of data. Each line in the file must be separated by a new line break.
A header line in the file is optional. If included, the header must be the first line in the file and be formatted as follows:
There are no spaces after the commas in this line.
Each data line in the file represents one exclusion configuration.
Each data line is a comma-delimited string of fields described in the table below.
Optional fields can be blank, but the associated comma separator must be present in the data line.
|id||An integer that uniquely identifies the exclusion.||optional|
|name||The name of the exclusion. You can use any combination of alpha-numeric characters or symbols.||required|
|description||A description for the exclusion.||required|
|members||The target or targets where you want the scan exclusion to apply. This value can have the following formats:||required|
|creation_date||The Unix timestamp that Vulnerability Management uses as the creation date for the imported exclusion(s).||optional|
|last_modification_date||The Unix timestamp that Vulnerability Management uses as the last modification date for the exclusion(s).||optional|
id,name,description,members,creation_date,last_modification_date 1,Exclusion Rule 1,routers,"192.0.2.57,192.0.2.177,192.0.2.8",1561643735,1561643785 ,Exclusion Rule 2,workstations,192.0.2.57-192.0.2.67,,
Updated about 13 hours ago