Skip to content

Commit 3d3427b

Browse files
paulOsinskiPaul Osinski
andauthored
[docs] typo fixes (#13709)
Co-authored-by: Paul Osinski <paul.m.osinski@gmail.com>
1 parent 2593926 commit 3d3427b

File tree

4 files changed

+13
-12
lines changed

4 files changed

+13
-12
lines changed

docs/content/en/connecting_your_tools/import_intro.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,18 +4,16 @@ description: "Learn how to import data manually, through the API, or via a conne
44
weight: 1
55
---
66

7-
One of the things we understand at DefectDojo is that every company’s security needs are completely different. There is no ‘one\-size\-fits\-all’ approach. As your organization changes, having a flexible approach is key.
8-
9-
DefectDojo allows you to connect your security tools in a flexible way to match those changes.
7+
One of the things we understand at DefectDojo is that every company’s security needs are completely different. There is no one-size-fits-all approach. As your organization changes, having a flexible approach is key, and DefectDojo allows you to connect your security tools in a flexible way to match those changes.
108

119
## Scan Upload Methods
1210

13-
When DefectDojo receives a vulnerability report from a security tool, it will create Findings based on the vulnerabilities contained within that report. DefectDojo acts as the central repository for these Findings where they can be triaged, remediated or otherwise addressed by you and your team.
11+
When DefectDojo receives a vulnerability report from a security tool, it will create Findings based on the vulnerabilities contained within that report. DefectDojo acts as the central repository for these Findings where they can be triaged, remediated, or otherwise addressed by you and your team.
1412

1513
There are two main ways that DefectDojo can upload Finding reports.
1614

1715
* Via direct **import** through the UI: [Import Scan Form](../import_scan_files/import_scan_ui)
18-
* Via **API** endpoint (allowing for automated data ingest): See [API Docs](https://docs.defectdojo.com/en/api/api-v2-docs/)
16+
* Via **API** endpoint (allowing for automated data ingestion): See [API Docs](https://docs.defectdojo.com/en/api/api-v2-docs/)
1917

2018
#### DefectDojo Pro Methods
2119

@@ -29,8 +27,8 @@ There are two main ways that DefectDojo can upload Finding reports.
2927

3028
| | **UI Import** | **API** | **Connectors** <span style="background-color:rgba(242, 86, 29, 0.3)">(Pro)</span> | **Smart Upload** <span style="background-color:rgba(242, 86, 29, 0.3)">(Pro)</span>|
3129
| --- | --- | --- | --- | --- |
32-
| **Supported Scan Types** | All: see [Supported Tools](/supported_tools/) | All: see [Supported Tools](/supported_tools/) | Snyk, Semgrep, Burp Suite, AWS Security Hub, Probely, Checkmarx, Tenable | Nexpose, NMap, OpenVas, Qualys, Tenable |
33-
| **Automation?** | Available via API: `/reimport` `/import` endpoints | Triggered from [CLI Importer](../external_tools) or external code | Connectors is inherently automated | Available via API: `/smart_upload_import` endpoint |
30+
| **Supported Scan Types** | All: see [Supported Tools](/supported_tools/) | All: see [Supported Tools](/supported_tools/) | Anchore, AWS Security Hub, BurpSuite, Checkmarx ONE, Dependency-Track, Probely, Semgrep, SonarQube, Snyk, Tenable, Wiz | Nexpose, NMap, OpenVas, Qualys, Tenable |
31+
| **Automation?** | Available via API: `/reimport` `/import` endpoints | Triggered from [CLI Importer](../external_tools) or external code | Connectors is an inherently automated feature | Available via API: `/smart_upload_import` endpoint |
3432

3533
### Product Hierarchy and organization
3634

docs/content/en/working_with_findings/organizing_engagements_tests/product_hierarchy.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -116,16 +116,17 @@ Tests always have:
116116
* an associated test **Environment**
117117
* an associated **Engagement**
118118

119-
Tests can be created in different ways. Tests can be automatically created when scan data is imported directly into to an Engagement, resulting in a new Test containing the scan data. Tests can also be created in anticipation of planning future engagements, or for manually entered security findings requiring tracking and remediation.
119+
Tests can be created in different ways. Tests can be automatically created when scan data is imported directly into an Engagement, resulting in a new Test containing the scan data. Tests can also be created in anticipation of planning future engagements, or for manually entered security findings requiring tracking and remediation.
120120

121121
### **Test Types**
122122

123123
DefectDojo supports two categories of Test Types:
124124

125125
1. **Parser-based Test Types**: These correspond to specific security scanners that produce output in formats like XML, JSON, or CSV. When importing scan results, DefectDojo uses specialized parsers to convert the scanner output into Findings.
126126

127-
2. **Non-parser Test Types**: These are used for manually created findings not imported from a scan files.
128-
The following Test Types appear in the "Scan Type" dropdown when creating a new test, but will not appear when selecting "Import Scan":
127+
2. **Non-parser Test Types**: These are used for manually created Findings not imported from scan files. These Test Types use the [Generic Findings Import](/supported_tools/parsers/generic_findings_import/) method to render Findings and metadata.
128+
129+
The following Test Types appear in the "Scan Type" dropdown when creating a new test.
129130
* API Test
130131
* Static Check
131132
* Pen Test

docs/content/supported_tools/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ DefectDojo can parse data from 200+ security reports and counting.
2626

2727
| [Connectors](/en/connecting_your_tools/connectors/about_connectors/): supported tools | [Smart Upload](/en/connecting_your_tools/import_scan_files/smart_upload/): supported tools |
2828
| --- | --- |
29-
| AWS Security Hub, BurpSuite, Checkmarx ONE, Dependency-Track, Probely, Semgrep, SonarQube, Snyk, Tenable | Nexpose, NMap, OpenVas, Qualys, Tenable, Wiz |
29+
| Anchore, AWS Security Hub, BurpSuite, Checkmarx ONE, Dependency-Track, Probely, Semgrep, SonarQube, Snyk, Tenable | Nexpose, NMap, OpenVas, Qualys, Tenable, Wiz |
3030

3131
# All Supported Tools
3232

docs/content/supported_tools/parsers/generic_findings_import.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,13 @@ Open-source and Pro users can use Generic Findings Import as a method to ingest
88

99
Using Generic Findings Import will create a new Test Type in your DefectDojo instance called "`{The Name Of Your Test}` (Generic Findings Import)". For example, this JSON content will result in a Test Type called "Example Report (Generic Findings Import)":
1010

11+
```
1112
{
1213
"name": "Example Report",
1314
"findings": []
1415
}
16+
```
1517

1618
DefectDojo Pro users can also consider using the [Universal Parser](../universal_parser), a tool which allows for highly customizable JSON, XML and CSV imports.
1719

18-
For more information on supported parameters for Generic Findings Import, see the [Parser Guide](../file/generic)
20+
For more information on supported parameters for Generic Findings Import, see the related [Parser Guide](../file/generic).

0 commit comments

Comments
 (0)