Create Recast/Accept Rules in Findings
In Tenable Web App Scanning, you can create rules that affect your vulnerability findings. Recast rules change the severity of host vulnerabilities or web application findings, while Accept rules accept the risk of these findings without modifying their severity. This topic describes how to create rules in the Findings page.
Note: If a rule is targeted by IP address, that rule applies to the specified IP in each network in which it is found. For more information, see Networks in the Tenable Vulnerability Management User Guide.
Create a Recast Rule in Findings
To create a Recast rule:
-
In the upper-left corner, click the button.
The left navigation plane appears.
- In the left navigation plane, click Findings.
The Findings page appears.
-
In the row for the finding to create a rule for, click the button.
A drop-down menu appears.
-
Click Recast.
The Recast plane appears.
-
Complete the following options:
-
New Severity – Select the desired severity level for the vulnerability.
-
Targets – Select All to target all assets or Custom to specify targets that you want the rule to run against.
Note: If you set the Targets drop-down to All, a warning appears indicating that this option may override existing rules.
-
Target Hosts – Type one or more custom targets for the rule, if necessary. You can type a comma-separated list that includes any combination of IP addresses, IP ranges, CIDR, and hostnames.
Caution: You can only specify 1000 comma-separated custom entries. If you want to target a larger number of custom entries, create multiple rules.
-
(Optional) Expires – Select when you want the rule to age out.
-
(Optional) Comments – Type a description of the rule. This option is only visible when the rule is modified.
-
-
Click Save.
Tenable Web App Scanning starts applying the rule to existing findings. This process may take some time, depending on the system load and the number of matching findings. Tenable Web App Scanning updates your dashboards, where a label appears to indicate how many instances of affected findings were recast.
Note: A recast rule does not affect the historical results of a scan.
Create an Accept Rule in Findings
To create an Accept rule from the Findings workbench:
-
In the upper-left corner, click the button.
The left navigation plane appears.
- In the left navigation plane click Findings.
-
In the row for the finding to create a rule for, click the button.
A drop-down menu appears.
-
Click Accept.
The Accept Risk window appears.
-
Complete the following options:
-
Targets – Select All to target all assets or Custom to specify targets that you want the rule to run against.
-
Target Hosts – Type one or more custom targets for the rule, if necessary. You can type a comma-separated list that includes any combination of IP addresses, IP ranges, CIDR, and hostnames.
Caution: You can only specify 1000 comma-separated custom entries. If you want to target a larger number of custom entries, create multiple rules.
-
(Optional) Expires – Select when you want the rule to age out.
-
(Optional) Comments – Type a description of the rule. This option is only visible when the rule is modified.
-
-
(Optional) To report the vulnerability as a false positive:
- Enable the Report as false positive toggle.
A Message To Tenable box appears.
- In the Message to Tenable box, type a description of the false positive.
- Enable the Report as false positive toggle.
-
Click Save.
Tenable Web App Scanning starts applying the rule to existing findings. This process may take some time, depending on the system load and the number of matching findings.