mirror of
https://github.com/fleetdm/fleet
synced 2026-05-23 17:08:53 +00:00
Corrected recent_vulnerability_max_age option. (#16153)
This commit is contained in:
parent
17f0a4e28e
commit
4a5945b612
1 changed files with 1 additions and 1 deletions
|
|
@ -15,7 +15,7 @@ percentage of hosts have not checked in to Fleet for a configured number of days
|
|||
|
||||
Vulnerability automations are triggered if Fleet detects a new vulnerability (CVE) on at least one host.
|
||||
|
||||
> Note that a CVE is treated as "new" by Fleet if it was published to the national vulnerability database (NVD) within the preceding 30 days by default. This setting can be changed through the [`recent_vulnerabilities_max_age` configuration option](https://fleetdm.com/docs/deploying/configuration#recent-vulnerability-max-age).
|
||||
> Note that a CVE is treated as "new" by Fleet if it was published to the national vulnerability database (NVD) within the preceding 30 days by default. This setting can be changed through the [`recent_vulnerability_max_age` configuration option](https://fleetdm.com/docs/deploying/configuration#recent-vulnerability-max-age).
|
||||
|
||||
Fleet can be configured either to send a webhook request or to create a ticket in Jira or Zendesk. Fleet checks whether to trigger vulnerability automations once per hour by default. This period can be changed through the [`vulnerabilities_periodicity` configuration option](https://fleetdm.com/docs/deploying/configuration#periodicity).
|
||||
|
||||
|
|
|
|||
Loading…
Reference in a new issue