Recast Rules

In Tenable Vulnerability Management, you can customize Tenable's risk management framework to fit the needs of your organization. To do this, you create rules that modify the severity of vulnerabilities or the results of host audits—or hide them from your scan results.

  • To work with recast rules, in the left navigation, click Settings. On the page that appears, click Recast.

    The Accept/Recast Rules page appears. On this page, you can create the following rule types:

    Rule Description
    Recast In the Vulnerabilities tab, modify the severity of vulnerability findings based on their Plugin ID.
    Accept (for host vulnerabilities) In the Vulnerabilities tab, accept the risk of vulnerability findings and hide them from the Findings workbench.
    Change Result In the Host Audits tab, modify the Result of host audit findings, for example by changing Failed results to Passed.
    Accept (for host audits) In the Host Audits tab, accept the Result of host audit findings and hide them from the the Findings workbench.

This section explains how to create recast rules, when to use them, and how to manage them. It includes the following topics: