Configure a Grouping Element in a Report
Required Tenable Security Center User Role: Organizational user with appropriate permissions. For more information, see User Roles.
Grouping elements in Tenable Security Centerreports include:
Type |
Description |
Relevant Reports |
---|---|---|
Group |
Groups associated elements on the same page. |
|
Section |
Allows you to organize content within chapters. |
|
Iterator |
Allows you to specify how the report groups its data. For example, if an Iterator Type of Port Summary is chosen for a vulnerability report, vulnerability data in the report is grouped by detected ports. If you do not configure an iterator, hosts and vulnerabilities are listed in the report individually. |
To configure a grouping element:
-
In the left navigation, click Reporting > Reports.
The Reports page appears.
-
In the reports table, click the name of the report you want to edit.
-or-
Right-click the row for the report you want to edit, and click Edit.
The Edit Report page appears.
-
On the left side of the page, click Definition.
The report outline appears. This outline is, by default, expanded. For more information, see Edit a Report Outline.
-
Click Add Element.
Tip: To display Add Element, hover the cursor over the element.
- Do one of the following:
Add a group to the report.
In the Grouping section, click the Group icon.
Configure the following options:
Option Action Name Type a name for the element. Location Select a location for the element in the report. Style Select a style for the element.
Add a section to the report.
- In the Grouping section, click the Section icon.
Configure the following options:
Option Action Name Type a name for the element. Location Select a location for the element in the report. Style Select a style for the element.
Add an iterator to the report.
- In the Grouping section, click the Iterator icon.
Configure the following options:
Option Action General Name Type a name for the element. Location Select a location for the element in the report. Style Select a style for the element. Definition Query Select a predefined query to define the data included in the element. For more information, see Queries.
Type Select the type of data to include in the element. Iterator elements support vulnerability or event data only.
Source Select the source of the data included in the element.
Valid values for this field differ based on the setting of the Type option:
- If Type is set to Vulnerability, valid Source values are:
- Cumulative—All vulnerabilities, regardless of whether the vulnerabilities have been remediated or not
- MItigated—Remediated vulnerabilities
Individual Scan—Vulnerabilities identified in a specific scan
Note: If you select Individual Scan, Tenable Security Center displays the Selected Scan option, which allows you to select a scan to use as the basis of the report:
- Click one of the predefined date ranges, or click Custom Range and enter starting and ending days for the range.
- Click Fetch Scans to view a list of possible scans within the date range.
- Click the scan you want to use in the drop-down box.
- If Type is set to Event, valid Source values are:
- Active—Currently active events
Archive—Archived events
Note: If you select Archive, Tenable Security Center displays additional options, allowing you to select the LCE that collected the events and the Silo that stores the archived events.
Filters Specify additional criteria to refine element data. See Manage Filters for a Chapter Report
Iterator Type Select a grouping method for iteration data:
- IP Summary—Group vulnerability or event data by the IP addresses of detected hosts.
- Port Summary—Group vulnerability or event data by the detected ports.
- Type Summary—Group event data by event type.
- User Summary—Group event data by user.
- Vulnerability Summary—Group vulnerability data by individual vulnerability.
Results Displayed Select the number of results you want to include in the iteration. Sort Column Select the column that Tenable Security Center uses to sort the iteration data. Sort Direction Select the sort direction for the iteration data. Header Information Select the columns you want to include in the iteration data. Available columns depend on the settings of the Type and Source options. - If Type is set to Vulnerability, valid Source values are:
- Click Submit to save the element.
- Click Submit to save your changes to the report.