the Hole Plugin
This extension works from version 0.70 of GLPI or greater.
It allows you to create and identify your vulnerabilities and link them to your equipment.
You can also link documents and tickets.
Installation
After decompressing the archive into the plugin folder of GLPI, log on as administrator:
Menu: Configuration / Plugins / Failles Security / Installation
This will create the tables used by the plugin.
Then set the thresholds of security vulnerabilities.
Rights Management
Menu: Configuration / Plugins / Failles security / rights management profile
This step allows you to define user profiles that can use the plugin.
Reports
Features
Tip
An overview for computer and network hardware is available.