How to Customize a Secure Baseline Scan by Suppressing Benchmarks
This guide explains how to modify your secure baseline scan in CYRISMA by suppressing specific benchmarks. Suppressing benchmarks allows you to ignore particular checks for a scan or a customer instance, providing flexibility for unique requirements.
- User Manual
- Agents
- The Cyber Risk Assessment Process
- API Documents
- General Questions and Troubleshooting
- The Cyber Risk Assessment Process (Video Tutorials)
- Sales and Prospecting Articles
- CYRISMA Partner Portal Access
- Glossary
- CYRISMA Change Log
- Support Ticket SLA
- Onboarding Framework
- PSA Integrations
- Billing Questions
- Self Onboarding Guide
Table of Contents
Steps to Customize Your Secure Baseline Scan
Navigate to Scan History
- Log into the CYRISMA platform.
- From the left-hand menu, select Scan History to access the list of previously conducted scans.

Select the Secure Baseline Scan
- Find the specific Secure Baseline Scan you want to modify and click on it.
- This will open a detailed view of the scan results.

Drill Down into a Machine
- Within the scan results, click on the specific machine you wish to modify.
- This will display the controls applied to that machine during the scan.

Suppress Individual Controls
- Click on each control you want to suppress.
- In the control details, you’ll have the option to Suppress the benchmark for future scans.
- Confirm the suppression action.


Repeat as Needed
- Continue to suppress additional controls as required for the machine or scan.
Key Considerations
- Customer-Specific Suppressions: Ensure that changes are applied to the relevant machine or customer instance.
- Operating System Profiles: Some controls may vary based on the OS profile. Review the settings carefully before applying suppressions.
- Documentation: Keep a record of the suppressed controls and reasons for the adjustments to maintain transparency and accountability.
Best Practices for Suppression
- Evaluate Risks: Suppress only when necessary, ensuring no critical security benchmarks are bypassed.
- Reassess Periodically: Regularly review suppressed controls to confirm whether they should remain suppressed or be re-enabled.
- Communicate Changes: Inform all relevant stakeholders about suppression decisions.
Customizing your secure baseline scans provides flexibility while ensuring security requirements are met. For further assistance, contact CYRISMA Support.