You can configure the global Approved IP Address List to exclude traffic from trusted IP addresses from Vulnerability Protection scanning.
You must enable the Vulnerability Protection feature to make the global Approved IP Address List take effect.
For more information, see Enabling Vulnerability Protection.
You can configure up to 100 approved IP addresses.
Use commas, semicolons, or the ENTER key to separate multiple entries