diff --git a/docs/Configuration/agent-configuration.md b/docs/Configuration/agent-configuration.md index eb594e14c5d0..e859ee4b3483 100644 --- a/docs/Configuration/agent-configuration.md +++ b/docs/Configuration/agent-configuration.md @@ -497,7 +497,7 @@ How to update agent options: The agents may take several seconds to update because Fleet has to wait for the hosts to check in. Additionally, hosts enrolled with removed enroll secrets must properly rotate their secret to have the new changes take effect. - +> When configuring a value for [`script_execution_timeout`](https://fleetdm.com/docs/configuration/agent-configuration#script-execution-timeout) in the UI, make sure to put the key at the top level of the YAML, _not_ as a child of `config`. diff --git a/handbook/company/pricing-features-table.yml b/handbook/company/pricing-features-table.yml index 58730dfb7b83..5b68e432de78 100644 --- a/handbook/company/pricing-features-table.yml +++ b/handbook/company/pricing-features-table.yml @@ -929,8 +929,8 @@ # ╩ ╩╩ ╩╩═╝╚╩╝╩ ╩╩╚═╚═╝ ═╩╝╚═╝ ╩ ╚═╝╚═╝ ╩ ╩╚═╝╝╚╝ └─ ╩ ╩ ╩╩╚═╩ ╩─┘ - industryName: Malware detection (YARA/custom IoCs) # TODO: consider: technically more than YARA, consider generalizing this and including the concept of comparing known binary hashes and other IoCs (either via live query or in the data lake to compare threat intel feed) friendlyName: Scan files for zero days and malware signatures - description: Use YARA signatures to report and trigger automations when zero days, malware, or unexpected files are detected on a host. - documentationUrl: https://fleetdm.com/tables/yara + description: Deploy YARA signatures (rules) to report and trigger automations when zero days, malware, or unexpected files are detected on a host. YARA rules can be deployed remotely and privately. + documentationUrl: https://fleetdm.com/guides/remote-yara-rules tier: Free jamfProHasFeature: no jamfProtectHasFeature: yes