the Hole Plugin

This extension works from version 0.70 of GLPI or greater.

It allows you to create and identify your vulnerabilities and link them to your equipment.

You can also link documents and tickets.


After decompressing the archive into the plugin folder of GLPI, log on as administrator:

Menu: Configuration / Plugins / Failles Security / Installation

This will create the tables used by the plugin.

Then set the thresholds of security vulnerabilities.

Rights Management

Menu: Configuration / Plugins / Failles security / rights management profile

This step allows you to define user profiles that can use the plugin.




An overview for computer and network hardware is available.

Known Issues