You only want to scan for and show data in the console and in reports) for Microsoft and 3rd Party patches/updates. However, the console displays vulnerabilities from a few scans that used profiles that included vulnerabilities (such as a Full Scan profile).
All Supported Operating Systems
There are 2 approaches to this problem
A. Delete scans from the database that used the "Full Scan" profile:
1. Go to Configuration > Database Maintenance Options > Manage Scan Results.
2. Organize the scan results by Scan Profile and delete all the scans that have profiles that include Vulnerabilities.
Note: If you receive a message that states that the scan cannot be deleted due to database integrity, use solution B.
B. Run a script in SQL that will "hide" the vulnerabilities:
1. Connect to the backend database server using SQL Management Studio and expand the databases node.
2. Right click on the LNSSScanResults11 database and choose -> "New Query"
3. In the Query window that opens, paste the following script / query:
UPDATE [OverviewCategory] SET [ScanIDOfActualResults] = 0
WHERE [ResultsCategoryName] = 'VulnerabilitiesUsb'
OR [ResultsCategoryName] = 'VulnerabilitiesAlerts'
OR [ResultsCategoryName] = 'VulnerabilitiesSoftware'
OR [ResultsCategoryName] = 'VulnerabilitiesNics'
OR [ResultsCategoryName] = 'VulnerabilitiesBackdoors'
4. Click the Execute button.
5. The results should show "(x row(s) affected)"
6. The console should not display vulnerabilities or show them in reports.
NOTE: If another FULL scan is run it will flip this setting back to show vulnerabilities again. In that case you can just run the script again.
GFI LanGuard shows Vulnerabilities and Patches detected during a scan.