Create Recast Rules from Settings

In Settings > Recast, you can create rules to modify or hide vulnerability or host audit findings from the Findings workbench. You can also create these rules directly from the Findings workbench, as described in Create Recast Rules from Findings.

Create a Recast or Accept Rule

To create a Recast or Accept rule:

  1. In the left navigation, click Settings.

    The Settings page appears.

  2. Click Recast.

    The Recast/Accept Rules page appears.

  3. In the upper-right corner, click Add Rule.

    A plane of options appears. Set these options as follows:

    Option Description
    Action Click Accept or Recast. To learn about these rule types, see About Recast and Accept Rules.
    Vulnerability Plugin ID Type the Tenable Plugin ID for the vulnerability, for example 70658.
    New Severity (Recast rules only) Select the severity you want to change the corresponding vulnerability to, for example Low.
    Targets

    Select All or Custom. If the rule will override other rules, a warning appears. The most recently created rule trumps other rules.

    Target Hosts

    For Custom targets, enter up to 1000 comma-separated IPv4 addresses or ranges, hostnames, Classless Inter-Domain Routing (CIDR) notations, or fully qualified domain names (FQDNs).

    Caution: If you target findings by IP address and have multiple networks, the rule matches findings on all your networks. For more information, see Networks.

    Expires Select After or Exact Date. Then, type a number of days or a date when the rule will expire.
    Comments Type comments to provide rule details.
    Report as False Positive to Tenable (Optional) (Accept rules only) Turn on this toggle when a plugin generates inaccurate findings and you want Tenable to review the results.
  4. Click Save.

    The system processes the rule, which may take time if many findings are targeted. When complete, the rule appears in the Vulnerabilities tab and the system updates the Findings workbench.

Create a Change Result or Accept Rule

Caution: For best performance, the system supports a maximum of 5000 Change Result and Accept rules in each container, total.

To create a Change Result or Accept rule:

  1. In the left navigation, click Settings.

    The Settings page appears.

  2. Click Recast.

    The Recast/Accept Rules page appears.

  3. Click the Host Audits tab.
  4. In the upper-right corner, click Add Rule.

    A plane of options appears. Set these options as follows:

    Option Description
    Action Click Accept or Change Result. To learn about these rule types, see About Change Result and Accept Rules.
    Category Select a category for the new rule, for example, Windows.
    Audit File

    Select an audit file to run against your assets, for example, CIS_MS_Windows_11_Enterprise_Level_1_v1.0.0.audit.

    Audit Name

    Type an audit name, for example, 9.3.1 Ensure 'Windows Firewall: Public: Firewall state' is set to 'On (recommended)'.

    Original Result

    Select the original result of the host audit, for example, Failed.

    New Result (Change Result rules only) Select the result to change the targeted findings to.
    Targets (Optional) Select Custom. If the rule will override other rules, a warning appears. The most recently created rule trumps other rules.
    Target Hosts

    For Custom targets, type a comma-separated list of IPv4 addresses or ranges, hostnames, Classless Inter-Domain Routing (CIDR) notation, or fully qualified domain names (FQDNs). The system supports up to 100 items.

    Expires (Optional) Select After or Exact Date. Then, type a number of days or a date when the rule will expire.
    Comments Type comments to provide rule details.
  5. Click Save.

    The system processes the rule, which may take time if many findings are targeted. When complete, the rule appears in the Vulnerabilities tab and the system updates the Findings workbench.