Skip to content

Commit

Permalink
Merge docs changes around script exection and YARA (#25204)
Browse files Browse the repository at this point in the history
This PR cherry-picks a couple of docs changes I added to the docs-4.63.0
branch. These changes were approved and merged in
#25181 and
#25189, before I belatedly asked
whether that was the correct process.
  • Loading branch information
sgress454 authored Jan 7, 2025
1 parent d079b63 commit f2239e6
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 3 deletions.
2 changes: 1 addition & 1 deletion docs/Configuration/agent-configuration.md
Original file line number Diff line number Diff line change
Expand Up @@ -497,7 +497,7 @@ How to update agent options:

The agents may take several seconds to update because Fleet has to wait for the hosts to check in. Additionally, hosts enrolled with removed enroll secrets must properly rotate their secret to have the new changes take effect.


> When configuring a value for [`script_execution_timeout`](https://fleetdm.com/docs/configuration/agent-configuration#script-execution-timeout) in the UI, make sure to put the key at the top level of the YAML, _not_ as a child of `config`.

<meta name="pageOrderInSection" value="300">
<meta name="description" value="Learn how to use configuration files and the fleetctl command line tool to configure agent options.">
4 changes: 2 additions & 2 deletions handbook/company/pricing-features-table.yml
Original file line number Diff line number Diff line change
Expand Up @@ -929,8 +929,8 @@
# ╩ ╩╩ ╩╩═╝╚╩╝╩ ╩╩╚═╚═╝ ═╩╝╚═╝ ╩ ╚═╝╚═╝ ╩ ╩╚═╝╝╚╝ └─ ╩ ╩ ╩╩╚═╩ ╩─┘
- industryName: Malware detection (YARA/custom IoCs) # TODO: consider: technically more than YARA, consider generalizing this and including the concept of comparing known binary hashes and other IoCs (either via live query or in the data lake to compare threat intel feed)
friendlyName: Scan files for zero days and malware signatures
description: Use YARA signatures to report and trigger automations when zero days, malware, or unexpected files are detected on a host.
documentationUrl: https://fleetdm.com/tables/yara
description: Deploy YARA signatures (rules) to report and trigger automations when zero days, malware, or unexpected files are detected on a host. YARA rules can be deployed remotely and privately.
documentationUrl: https://fleetdm.com/guides/remote-yara-rules
tier: Free
jamfProHasFeature: no
jamfProtectHasFeature: yes
Expand Down

0 comments on commit f2239e6

Please sign in to comment.