TOC & Recently Viewed

Recently Viewed Topics

Create a Plugin Rule

Normally, to create a plugin rule for a user account, you must be logged in to using that account. However, administrators can impersonate a user account in order to create plugin rules for other users.

Use plugin rules to manipulate the severity levels of results from plugins, as well as to hide results from plugins. Rules can be applied to all hosts, or to a specific host. If the rule is intended to be a temporary measure, you can also provide an expiration date, after which the rule no longer applies to scans.

Your organization may want to create a set of rules that dictate the behavior of certain plugins related to the scans you are performing as a part of your role in the organization, as well as to better account for your organization’s security posture and response plan.

The following procedure can be performed by a standard user or administrator.

To create a plugin rule:

  1. In the upper-right corner of the top navigation bar, click your name, and then click My Profile.

    The My Profile page appears.

  2. On the center pane, click the Plugin Rules tab.
  3. In the upper-right corner, click the New Rule button.

    The New Rule window appears.

  4. (Optional) In the Host box, type the hostname or IP address of the host that you want the plugin rule to apply to. If no host is entered, the plugin rule applies to all hosts.
  5. In the Plugin ID box, type the ID of a plugin.
  6. (Optional) In the Expiration Date box, type a date. If no date is entered, the plugin rule never expires.
  7. In the Severity box, select the severity that you want to apply to results from this plugin, or select Hide this result.
  8. Click Add.

Example Plugin Rule

Consider the following values for a new plugin rule:

  • Host:
  • Plugin ID: 79877
  • Expiration Date: 12/31/2018
  • Severity: Low

Normally, results for the CentOS 7 : rpm (CESA-2014:1976) plugin (79877) are set to critical severity. This plugin rule causes all results from the plugin to be set to low severity specifically for the host at The results for other hosts remains set to critical severity. After 12/31/2018, the plugin rule expires, and the results return to normal.

Copyright 2017-2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable,, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.