Create a Dashboard

Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, Administrator, or Custom Role with appropriate privileges

You can create a custom dashboard or use the Template Library to create a copy from the available templates. Dashboards let you drill down to view the details of each widget.

Important: The Template Library in Tenable Vulnerability Management includes Explore dashboard templates. The Explore dashboard templates are marked with Explore at the end of the template name. For example: Vulnerability Management (Explore). From the dashboards that you create using these templates, you can drill down to the Findings or Assets pages. To add an Explore dashboard, see Enable Explore Dashboards.

To create a dashboard:

  1. Click the  Dashboards button.

    The Dashboards plane appears. The plane contains a list of Tenable-provided and user-defined dashboards.

  2. Click New Dashboard.

    A drop-down appears.

  3. Do one of the following:

    • Create a dashboard from a template:
      1. Click Template Library.

        The Template Library page appears.

      2. In the Groups panel on the left, click the group name to view the templates for the category.

        CategoryDescription
        Center for Internet Security (CIS) CIS Benchmarks are best practices for the secure configuration of a target system. Be sure to use the proper audit file for scans.
        Defense Information Systems Agency (DISA)The Defense Information Systems Agency (DISA) is a United States Department of Defense combat support agency composed of military, federal civilians, and contractors. Security Technical Implementation Guides (STIG) is a configuration standard that consists of cybersecurity requirements for a specific product. Be sure to use the proper audit file for scans.
        Compliance Framework

        Tenable allows you to audit configuration compliance with a variety of standards including GDPR, ISO 27000, HIPAA, NIST 800-53, PCI DSS, and so on. These reports provide summary and detailed information for all the supported frameworks. Be sure to use the proper audit file for scans.

        Host Audit Plugin TypeOrganizations such as CIS, DISA, and some vendors create golden configurations standards, known as benchmarks. Tenable creates audit files that perform a detailed configuration review. Scanning the assets with the Host Audit Compliance Check plugins allows you to do detailed configuration checks. These reports provide summary and detailed information for all the Host Audit Compliance Check plugins.
        Tenable Best Practice AuditsAllows you to implement best practice audits for new technologies. Be sure to use the proper audit file for scans.
        Vendor Based AuditsAllows you to implement vendor-specific guidance for new technologies. Vendors include: Vendor, IBM, Juniper, Microsoft, NetApp, VMware, and others. Be sure to use the proper audit file for scans.
        Vulnerability Management

        Tenable Vulnerability Management provides the most comprehensive vulnerability coverage with real-time continuous assessment of the organization. These built-in reports allow organizations to communicate risk based on prioritization, threat intelligence and real-time insights to prioritize remediation actions. These reports provide summary and detailed information on data collected using Tenable Vulnerability Management applications such as Tenable Nessus.

        Web App ScanningWeb application security provides the ability to detect and mitigate threats and vulnerabilities that may compromise the confidentiality, integrity, and availability of web applications. These reports leverage data from Tenable Web App Scanning, a comprehensive and automated vulnerability scanning tool for modern web applications.
      3. In the library, locate the template you want to use.
      4. Hover over the template.

        An overlay of template information and options appears.

      5. (Optional) To preview the dashboard template, click Preview. For more information, see Preview a Dashboard.
      6. Click Add.

        An Added dashboard to Dashboards confirmation message appears.

        The new dashboard appears on the Dashboards page with the name Copy of selected dashboard.

    • Create a custom dashboard:
      1. Click Custom Dashboard.

        The Edit Dashboard page appears.

      2. Add a dashboard description:
        1. Click the dashboard description.

          The description becomes an editable text box.

        2. Type a description for the dashboard.
      3. Add widgets to the dashboard:
        1. In the upper-right corner of the page, click Add Widgets.

          A menu appears.

        2. Do one of the following:

          • To add a widget from a template, click Template Widget.

            The Widgets page appears.

          • To add a custom widget, click Custom Widget.

            The Create Widget page appears.

      4. Add dashboard filters:
        1. In the upper-right corner of the page, click Edit Filter.

          The Filter plane appears.

          Note: The Edit Filter option does not appear if there are no widgets added to the dashboard.

        2. Configure your dashboard filters as described in Filter a Dashboard.

      5. (Optional) Reorder widgets on the dashboard:
        1. Hover over the widget you want to move.
        2. Press and hold the mouse button to highlight the widget.

          The edges of the widget become defined and exhibit a raised appearance.

        3. Using the mouse, drag the widget to the new location.
        4. Release the mouse button to drop the widget in the new location.
      6. (Optional) Delete the dashboard:
        • In the lower-left corner of the page, click Delete Dashboard.

          Tenable Vulnerability Management discards the newly created dashboard.

What to do next: