Recast Columns
On the Recast page you can view the recast rules by finding type by clicking on the appropriate tab: Host Audits, Vulnerabilities. or Web Applications.
Each tab shows a table that contains the current recast rules for each finding type. The table shows columns that you can show or hide as described in Tables. The available column names in the table vary by finding type.
The following table describes the columns available for each finding type.
| Column | Finding Type(s) | Description | 
|---|---|---|
| Name | All | The name of the recast rule. | 
| Rule ID | All | The ID assigned by Tenable Vulnerability Management. This value is unique to Tenable Vulnerability Management. | 
| Criteria | All | The query that defines the recast rule. | 
| Rule Type | All | Values are Recast or Accept for Vulnerabilities and Web Application Findings. Value is Changed for Host Audits. | 
| Disabled | All | Shows the date the recast rule was disabled. | 
| Disabled By | All | Shows the user that disabled the recast rule. | 
| Expires | All | Date that the recast rule expires and no longer applies to new findings. | 
| Created | All | The date the recast rule was created. | 
| Owner | All | The user that created the recast rule. | 
| Revised Findings | All | Shows the number of findings that were impacted by this recast rule. | 
| Updated | All | The date the recast rule was updated. | 
| Audit File | Host Audits | The name of the audit file the scanner used to perform the compliance check. | 
| Audit Name | Host Audits | The name of the compliance check the scanner performed on the affected asset. | 
| Original Result | Host Audits | The result from the initial audit. Values are Passed, Failed, Warning, Unknown. | 
| Updated Result | Host Audits | The modified result from the recast rule. Values are Passed, Failed, Warning, Unknown. | 
| Original Severity | Vulnerabilities, Web Applications | The vulnerability's CVSS-based severity. For more information, see CVSS vs. VPR. | 
| New Severity | Vulnerabilities, Web Applications | The updated severity defined by the recast rule. Values are Critical, High, Medium, Low, Info. | 
| Status | All | Shows if the recast rule is Enabled or Disabled. | 
| Tags | Vulnerabilities, Web Applications | Filter and organize assets into logical groups (e.g., Network: Headquarters) for easier management and reporting. This filter is case-sensitive. You can add a maximum of 100 tags. For more information, see Tags. |