You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/content/get_started/about/OS__new_user_checklist.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,6 +23,6 @@ This is the essence of DefectDojo - import security data, organize it, and prese
23
23
All of these features can be automated, and because DefectDojo can handle over 200 tools (at time of writing) you should be all set to create a functional security inventory of your entire organizational output.
24
24
25
25
### Open-Source Features
26
-
- Does your organization use Jira? Learn how to use our [Jira integration](/issue_tracking/jira/jira_guide/) to create Jira tickets from the data you ingest.
26
+
- Does your organization use Jira? Learn how to use our [Jira integration](/issue_tracking/jira/os__jira_guide/) to create Jira tickets from the data you ingest.
27
27
- Are you expecting to share DefectDojo with many users in your organization? Check out our guides to [user management](/admin/user_management/about_perms_and_roles/) and set up role-based access control (RBAC).
28
28
- Ready to dive into automation? Learn how to use the [DefectDojo API](/import_data/import_scan_files/api_pipeline_modelling/) to automatically import new data, and build a robust CI/CD pipeline.
Copy file name to clipboardExpand all lines: docs/content/get_started/about/faq.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ DefectDojo is meant to be the central source of truth for your organization's se
21
21
22
22
- Allowing users to identify duplicate findings across scans and tools, minimizing alert fatigue.
23
23
- Enforcing SLAs on vulnerabilities, ensuring that your organization handles each Finding within an appropriate timeframe.
24
-
- Sending tickets to [Jira](/issue_tracking/jira/jira_guide/), ServiceNow or other Project Tracking software, allowing your development team to integrate issue remediation into their standard release process without requiring them to learn another project management tool.
24
+
-[Sending tickets](/issue_tracking/intro/intro/) to Jira, ServiceNow or other Project Tracking software, allowing your development team to integrate issue remediation into their standard release process without requiring them to learn another project management tool.
25
25
- Integrating into automated [CI/CD pipelines](/import_data/import_scan_files/api_pipeline_modelling/) to automatically ingest report data from repositories, even down to the branch level.
26
26
- Creating [reports](/metrics_reports/reports/using_the_report_builder/) on any set of vulnerabilities or software context, to quickly share scan results or status updates with stakeholders.
27
27
- Establishing acceptance and mitigation workflows, supporting formal risk-management tracking.
@@ -129,6 +129,6 @@ DefectDojo Pro users also have access to [executive-level Metrics dashboards](/g
129
129
130
130
### How can I integrate a project management tool with DefectDojo?
131
131
132
-
In both Pro and Open-Source editions of DefectDojo, Findings in DefectDojo can be pushed to Jira as Issues, which allows you to integrate issue remediation with your development team. We have a [complete guide to Jira](/issue_tracking/jira/jira_guide/) written which describes the process in detail.
132
+
In both Pro and Open-Source editions of DefectDojo, Findings in DefectDojo can be pushed to Jira as Issues, which allows you to integrate issue remediation with your development team.
133
133
134
134
DefectDojo Pro adds support for [Additional Project Tracking Integrations](/issue_tracking/intro/intro/)**: ServiceNow, Azure DevOps, GitHub and GitLab.
Copy file name to clipboardExpand all lines: docs/content/issue_tracking/jira/troubleshooting_jira.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,7 +65,7 @@ Using the 'Push To Jira' workflow triggers an asynchronous process, however an I
65
65
66
66
Common reasons issues are not created:
67
67
* The Default Issue Type you have selected is not usable with the Jira Space
68
-
* Issues in the Space have required attributes that prevent them from being created via DefectDojo (see our guide to [Custom Fields](../jira_guide/#custom-fields-in-jira))
68
+
* Issues in the Space have required attributes that prevent them from being created via DefectDojo (which can be handled via Custom Fields in Jira)
69
69
70
70
71
71
## Error: Product Misconfigured or no permissions in Jira?
@@ -77,11 +77,11 @@ This error message can appear when attempting to add a created Jira configuratio
77
77
78
78
## Changes made to Jira issues are not updating Findings in DefectDojo
79
79
80
-
* Start by confirming that the [DefectDojo webhook receiver](../jira_guide/#step-3-configure-bidirectional-sync-jira-webhook) is configured correctly and can successfully receive updates.
80
+
* Start by confirming that the DefectDojo webhook receiver is configured correctly and can successfully receive updates.
81
81
82
82
* Ensure the SSL certificate used by Defect Dojo is trusted by JIRA. For JIRA Cloud you must use [a valid SSL/TLS certificate, signed by a globally trusted certificate authority](https://developer.atlassian.com/cloud/jira/platform/deprecation-notice-registering-webhooks-with-non-secure-urls/)
83
83
84
-
* If you're trying to push status changes, confirm that Jira transition mappings are set up correctly (Reopen / Close [Transition IDs](../jira_guide/#step-3-configure-bidirectional-sync-jira-webhook)).
84
+
* If you're trying to push status changes, confirm that Jira transition mappings are set up correctly (Reopen / Close Transition IDs).
85
85
86
86
*[Test](https://support.atlassian.com/jira/kb/testing-webhooks-in-jira-cloud/) your JIRA webhook using a public endpoint such as Pipedream or Beeceptor:
Copy file name to clipboardExpand all lines: docs/content/releases/pro/changelog.md
+24Lines changed: 24 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,6 +12,30 @@ For Open Source release notes, please see the [Releases page on GitHub](https://
12
12
13
13
## Mar 2026: v2.56
14
14
15
+
### Mar 30, 2026: v2.56.4
16
+
17
+
***(Deduplication)** Fixed an issue where cross-tool deduplication could silently fail to match duplicates when findings were imported across different scan tools.
18
+
***(Pro UI)** Audit Log table now supports global search and query parameter–based filtering.
19
+
***(Pro UI)** Improved page load performance for large listing tables (Findings, Endpoints, etc.) by reducing unnecessary computation during pagination.
20
+
21
+
### Mar 23, 2026: v2.56.3
22
+
23
+
***(MFA)** All authenticated users can now access their own MFA settings page, regardless of role.
24
+
***(Pro UI)** Alerts table now uses server-side filtering, sorting, and pagination for improved performance.
25
+
***(Pro UI)** Removed the deprecated Credentials section from System Settings.
26
+
***(Pro UI)** Fixed boolean filters on the Product Types table for the Critical and Key Asset columns.
27
+
***(Pro UI)** Fixed a filter alignment issue on the Engagements table.
28
+
***(Pro UI)** Standardized the Test field label to "Title" across all screens.
29
+
***(Rules Engine)** Fixed a timeout (502 error) that could occur when previewing rules against a large number of Findings.
30
+
31
+
### Mar 16, 2026: v2.56.2
32
+
33
+
***(API)** Added pagination limit enforcement and deprecation warnings for unpaginated API requests.
34
+
***(Jira)** Custom field values are now properly encoded and decoded as JSON, with validation errors shown for invalid input.
35
+
***(Pro UI)** The New Risk Acceptance form now pre-fills the expiration date using the system default number of days.
36
+
***(Pro UI)** Improved handling of Group membership and permissions in the UI.
37
+
***(SBOM)** SBOM imports are now processed asynchronously, improving upload responsiveness for large files.
38
+
15
39
### Mar 12, 2026: v2.56.1
16
40
17
41
***(Pro UI)** Finding Groups can now be filtered by computed status: resolved, active, or risk-accepted.
SARIF parser customizes the Test_Type with data from the report.
10
-
For example, a report with `Dockle` as a driver name will produce a Test with a Test_Type named `Dockle Scan (SARIF)`
9
+
Current implementation will aggregate all the findings in the SARIF file into a single report.
11
10
12
-
Current implementation is limited and will aggregate all the findings in the SARIF file in one single report.
11
+
## How Test Types Are Determined
13
12
14
-
##### Support for de-duplication (fingerprinting)
13
+
Unlike most parsers in DefectDojo, the SARIF parser has a **report-defined Test Type**. When you import a SARIF file with `scan_type=SARIF`, DefectDojo reads the tool name from within the SARIF file at `runs[].tool.driver.name` and uses it to construct the Test Type name.
15
14
16
-
SARIF parser take into account data for fingerprinting. It's base on `fingerprints` and `partialFingerprints` properties.
17
-
It's possible to activate de-duplication based on this data by customizing settings.
15
+
The naming pattern is: **`{tool name} ({scan_type})`**
16
+
17
+
For example:
18
+
19
+
| Tool |`runs[].tool.driver.name` value | Resulting Test Type |
This means that even though all of these tools produce SARIF output and are imported with `scan_type=SARIF`, each tool will create a **distinct Test Type** in DefectDojo. For more information on how report-defined Test Types work, see **[Test Types](/asset_modelling/hierarchy/product_hierarchy#test-types)**.
27
+
28
+
## Reimporting SARIF Results
29
+
30
+
When using the `/api/v2/reimport-scan/` endpoint, DefectDojo needs to match incoming results to an existing Test. Understanding how this matching works is important when multiple SARIF-based tools are reporting into the same Engagement.
31
+
32
+
### One Tool Per Test
33
+
34
+
Each Test in DefectDojo represents results from a single tool. SARIF results from different tools (e.g. Semgrep, Trivy, MobSF) cannot be combined into the same Test, even though they share the same `scan_type=SARIF`. DefectDojo enforces this by validating that the tool name inside the SARIF file matches the existing Test's Test Type on reimport.
35
+
36
+
This constraint is what makes reimport's comparison logic reliable: when a Finding is absent from a new report, DefectDojo can safely assume it has been resolved. If results from multiple tools were mixed in a single Test, DefectDojo would not be able to distinguish between a resolved Finding and a Finding that simply isn't covered by the current tool.
37
+
38
+
## Support for Deduplication (Fingerprinting)
39
+
40
+
The SARIF parser takes into account data for fingerprinting, based on the `fingerprints` and `partialFingerprints` properties in the SARIF file. It's possible to activate deduplication based on this data by customizing settings:
Sample SARIF scans can be found [here](https://github.com/DefectDojo/django-DefectDojo/tree/master/unittests/scans/sarif).
26
49
27
50
### Default Deduplication Hashcode Fields
28
-
By default, DefectDojo identifies duplicate Findings using these [hashcode fields](https://docs.defectdojo.com/en/working_with_findings/finding_deduplication/about_deduplication/):
51
+
By default, DefectDojo identifies duplicate Findings using these [hashcode fields](/triage_findings/finding_deduplication/about_deduplication):
0 commit comments