Add an Accept Risk Rule

Required Tenable Security Center User Role: Organizational user with appropriate permissions. For more information, see User Roles.

If you create an accept risk rule, Tenable Security Center automatically accepts the risk associated with any vulnerabilities that match the rule. Risk-accepted vulnerabilities do not appear in a vulnerability search if your filter excludes Accepted Risk vulnerabilities.

For more information, see Accept Risk Rules.

To add an accept risk rule:

  1. Log in to Tenable Security Center via the user interface.

  2. In the left navigation, click Analysis > Vulnerabilities.

    The Vulnerabilities page appears.

  3. In the analysis tools drop-down box, select Vulnerability Detail List, Vulnerability List, or Vulnerability Summary.

    The page refreshes to show the analysis tool view you selected.

  4. To accept risk, do one of the following:

    Accept Risk Rule

    Actions

    To accept risk rule for a single vulnerability

    • Right-click any row for which you want to accept risk and select Accept Risk.

    • Select the check box next to the vulnerability for which you want to accept risk and in the toolbar, click Accept Risk.

    To accept risk rule for multiple vulnerabilities

    • Select more than one row and in the toolbar, click Accept Risk.

    The Accept Risk pane appears.

  5. Configure the following settings for the accept risk rule:

    Option

    Description

    Basic

    Comment

    Add a comment to the accept risk rule.

    Expires

    Select the date you want the accept risk rule to expire.

    Repository

    Repositories

    Select one or more repositories where you want to apply the rule.

    Targets

    Type

    Select the target for the rule:

    • All Available Devices - Target all assets.

    • Asset Tag - Target specific asset tags.

    Asset Tag

    (If Type is Asset Tag) The asset tag you want the accept risk rule to target.

    Port

    The port you want the accept risk rule to target.

    Protocol

    The protocol you want the accept risk rule to target.

  6. Click Submit.

    Tenable Security Center saves your configuration.

    Note: There can be a short delay between clicking on Submit and vulnerabilities showing the new risk acceptance. You may need to reload the filters to view the applied changes.

What to do next:

  • (Optional) Enable Recast and Accept Risk Rule Comments to display contents of the Comment field in reports and vulnerability analysis views. For more information, see Risk Rule Comments.