Add a Recast Risk Rule
Required Tenable Security Center User Role: Organizational user with appropriate permissions. For more information, see User Roles.
If you create a recast risk rule, Tenable Security Center automatically updates the severity for any vulnerabilities that match the rule to the severity you specified in the rule.
For more information, see Recast Risk Rules.
To add a recast risk rule:
-
Log in to Tenable Security Center via the user interface.
-
In the left navigation, click Analysis > Vulnerabilities.
The Vulnerabilities page appears.
-
In the analysis tools drop-down box, select Vulnerability Detail List, Vulnerability List, or Vulnerability Summary.
The page refreshes to show the analysis tool view you selected.
-
To recast risk, do one of the following:
Recast Risk Rule
Actions
To recast risk rule for a single vulnerability
-
Right-click any row that you want to recast and select Recast Risk.
-
Select the check box next to the vulnerability that you want to recast and in the toolbar, click Recast Risk.
To recast rule for multiple vulnerabilities
-
Select more than one row and in the toolbar, click Recast Risk.
The Recast Risk pane appears.
-
-
Configure the following settings for the accept risk rule:
Option
Description
Basic
New Severity
Select the severity you want to apply to the vulnerability. Comment
Add a comment to the recast risk rule.
Expires
Select the date you want the recast risk rule to expire.
Repository
Repositories
Select one or more repositories where you want to apply the rule.
Targets
Type
Select the target for the rule:
-
All Available Devices - Target all assets.
-
Asset Tag - Target specific asset tags.
Asset Tag
(If Type is Asset Tag) The asset tag you want the recast risk rule to target.
Port
The port you want the recast risk rule to target.
Protocol
The protocol you want the recast risk rule to target.
-
-
Click Submit.
Tenable Security Center saves your configuration.
Note: There can be a short delay between clicking on Submit and vulnerabilities showing the new risk. It may be necessary to reload the filters to view the applied changes.
What to do next:
-
(Optional) Enable Recast and Accept Risk Rule Comments to display contents of the Comment field in reports and vulnerability analysis views. For more information, see Risk Rule Comments.