the Hole Plugin
This extension works from version 0.70 of GLPI or greater.
It allows you to create and identify your vulnerabilities and link them to your equipment.
You can also link documents and tickets.
After decompressing the archive into the plugin folder of GLPI, log on as administrator:
Menu: Configuration / Plugins / Failles Security / Installation
This will create the tables used by the plugin.
Then set the thresholds of security vulnerabilities.
Menu: Configuration / Plugins / Failles security / rights management profile
This step allows you to define user profiles that can use the plugin.
An overview for computer and network hardware is available.