Tenable Integeration for Vulnerability Response does not honor 'CI Classes to Ignore' correctlyIssue <!-- div.margin{ padding: 10px 40px 40px 30px; } table.tocTable{ border: 1px solid; border-color:#E0E0E0; background-color: rgb(245, 245, 245); padding-top: .6em; padding-bottom: .6em; padding-left: .9em; padding-right: .6em; } table.noteTable{ border:1px solid; border-color:#E0E0E0; background-color: rgb(245, 245, 245); width: 100%; border-spacing:2; } table.internaltable { white-space:nowrap; text-align:left; border-width: 1px; border-collapse: collapse; font-size:14px; width: 85%; } table.internaltable th { border-width: 1px; padding: 5px; border-style: solid; border-color: rgb(245, 245, 245); background-color: rgb(245, 245, 245); } table.internaltable td { border-width: 1px; padding: 5px; border-style: solid; border-color: #E0E0E0; color: #000000; } .title { color: #D1232B; font-weight:normal; font-size:28px; } h1{ color: #D1232B; font-weight:normal; font-size:21px; margin-bottom:-5px } h2{ color: #646464; font-weight:bold; font-size:18px; } h3{ color: #000000; font-weight:BOLD; font-size:16px; text-decoration:underline; } h4{ color: #646464; font-weight:BOLD; font-size:15px; text-decoration:; } h5{ color: #000000; font-weight:BOLD; font-size:13px; text-decoration:; } h6{ color: #000000; font-weight:BOLD; font-size:14px; text-decoration:; } ul{ list-style: disc outside none; margin-left: 0; } li { padding-left: 1em; } --> Symptoms Tenable.io for Vulnerability Response is a store app developed by Tenable. In the general settings for this integration, there is an option 'CI Classes to ignore' which is a list of CI classes to be ignored when matching vulnerable items to CIs. This 'CI classes to ignore' feature does not work and causes newly created Vulnerable items to be associated to CIs which are listed in 'CI classes to Ignore'. Release Applicable to all ServiceNow releases. Environment Tenable.io for Vulnerability Response store app. Cause The CI to match is found by running 'CI matching rules' that can be seen in 'Tenable - SecurityCenter > CMDB > CI Matching Rules' from the filter navigator. These rules run queries against different CMDB tables excluding the CI classes to ignore. If there is a match, they check if the CI has a non-empty cmdb_ci field value and if there is one, that CI is directly matched to the vulnerable item without checking the CI's class name. If the CI matched has a non-empty cmdb_ci field value, the script does not check if this CI belongs to one of the classes listed in CI Classes to Ignore or not. Resolution Since these CI matching rules are part of the store app developed by Tenable, you would need to contact Tenable support to provide a fix for this.