Create a Recast Rule

Required User Role: Administrator

Note: You can also create a recast rule directly from the Vulnerability Details page.

To create a recast rule:

  1. View the Recast/Accept Rules page.
  2. In the upper-right corner, click the Add Rule button.

    The Add Rule plane appears.

    Note: The form can only be submitted after the user changes the N/A value, under the New Severity drop-down, to some other value.

  3. In the Action section, select Recast.
  4. In the Vulnerability box, type the ID of the plugin that you want to recast. For example, 51192.

    Note: If the plugin ID corresponds to a Tenable Nessus plugin, the Original Severity indicator changes to match the default severity of the vulnerability. The Original Severity indicator does not change if another type of plugin is used.

  5. In the New Severity drop-down box, select the severity level for the vulnerability.
  6. In the Targets drop-down box, do one of the following:

    • To target all assets, select All. This is the default target.

      Note: If the Targets drop-down is set to All, a warning appears indicating that this option may override existing rules.

    • To target a custom set of assets:
      1. Select Custom.

        A Target Hosts box appears.

      2. In the Target Hosts box, type one or more targets for the rule. You can type a comma-delimited list that includes any combination of IP addresses, IP ranges, CIDR, and hostnames.

        Caution: For performance reasons, you can only specify 1000 comma-separated custom entries. If you need to target a larger number of custom entries, create multiple rules.

  7. (Optional) In the Expires box, set an expiration date for the rule. This action is only necessary if you want the rule to expire. By default, the rule applies indefinitely.
  8. (Optional) In the Comments box, type a description of the rule. The text you type in this box is only visible if the rule is modified and has no functional effect.
  9. Click Save.

    Tenable Vulnerability Management starts applying the rule to existing vulnerabilities. This process may take some time, depending on the system load and the number of matching vulnerabilities. The change is reflected on dashboards, where a label appears to indicate how many instances of affected vulnerabilities have been recast.

    Note: A recast rule does not affect the historical results of a scan.