Recast Columns

On the Recast page you can view the recast rules by finding type by clicking on the appropriate tab:  Host Audits, Vulnerabilities. or Web Applications.

Each tab shows a table that contains the current recast rules for each finding type. The table shows columns that you can show or hide as described in Tables. The available column names in the table vary by finding type.

The following table describes the columns available for each finding type.

Column Finding Type(s) Description
Name All The name of the recast rule.
Rule ID All

The ID assigned by Tenable Vulnerability Management. This value is unique to Tenable Vulnerability Management.

Criteria All The query that defines the recast rule.
Rule Type All Values are Recast or Accept for Vulnerabilities and Web Application Findings. Value is Changed for Host Audits.
Disabled All Shows the date the recast rule was disabled.
Disabled By All Shows the user that disabled the recast rule.
Expires All Date that the recast rule expires and no longer applies to new findings.

Created

All The date the recast rule was created.
Owner All The user that created the recast rule.
Revised Findings All Shows the number of findings that were impacted by this recast rule.
Updated All The date the recast rule was updated.
Audit File Host Audits

The name of the audit file the scanner used to perform the compliance check.

Audit Name Host Audits

The name of the compliance check the scanner performed on the affected asset.

Original Result Host Audits

The result from the initial audit. Values are Passed, Failed, Warning, Unknown.

Updated Result Host Audits The modified result from the recast rule. Values are Passed, Failed, Warning, Unknown.
Original Severity Vulnerabilities, Web Applications

The vulnerability's CVSS-based severity. For more information, see CVSS vs. VPR.

New Severity Vulnerabilities, Web Applications

The updated severity defined by the recast rule. Values are Critical, High, Medium, Low, Info.

Status All Shows if the recast rule is Enabled or Disabled.
Tags Vulnerabilities, Web Applications

Filter and organize assets into logical groups (e.g., Network: Headquarters) for easier management and reporting. This filter is case-sensitive. You can add a maximum of 100 tags.

For more information, see Tags.