|
| 1 | +--- |
| 2 | +title: "Deduplication Tuning (Pro)" |
| 3 | +description: "Configure how DefectDojo identifies and manages duplicate findings" |
| 4 | +weight: 4 |
| 5 | +--- |
| 6 | + |
| 7 | +Deduplication Tuning is a DefectDojo Pro feature that gives you fine-grained control over how findings are deduplicated, allowing you to optimize duplicate detection for your specific security testing workflow. |
| 8 | + |
| 9 | +## Deduplication Settings |
| 10 | + |
| 11 | +In DefectDojo Pro, you can access Deduplication Tuning through: |
| 12 | +**Settings > Pro Settings > Deduplication Settings** |
| 13 | + |
| 14 | + |
| 15 | + |
| 16 | +The Deduplication Settings page offers three key configuration areas: |
| 17 | +- Same Tool Deduplication |
| 18 | +- Cross Tool Deduplication |
| 19 | +- Reimport Deduplication |
| 20 | + |
| 21 | +## Same Tool Deduplication |
| 22 | + |
| 23 | +Same Tool Deduplication is enabled by default for all security tool parsers. This ensures findings from consecutive scans using the same tool are properly deduplicated. |
| 24 | + |
| 25 | +To adjust Same Tool Deduplication: |
| 26 | + |
| 27 | +1. Select a specific **Security Tool** from the dropdown |
| 28 | +2. Choose a **Deduplication Algorithm** from the available options |
| 29 | + |
| 30 | + |
| 31 | + |
| 32 | +### Available Deduplication Algorithms |
| 33 | + |
| 34 | +DefectDojo Pro offers three deduplication methods for same-tool deduplication: |
| 35 | + |
| 36 | +#### Hash Code |
| 37 | +Uses a combination of selected fields to generate a unique hash. When selected, a third dropdown will appear showing the fields being used to calculate the hash. |
| 38 | + |
| 39 | +#### Unique ID From Tool |
| 40 | +Leverages the security tool's own internal identifier for findings, ensuring perfect deduplication when the scanner provides reliable unique IDs. |
| 41 | + |
| 42 | +#### Unique ID From Tool or Hash Code |
| 43 | +Attempts to use the tool's unique ID first, then falls back to the hash code if no unique ID is available. This provides the most flexible deduplication option. |
| 44 | + |
| 45 | +## Cross Tool Deduplication |
| 46 | + |
| 47 | +Cross Tool Deduplication is disabled by default, as deduplication between different security tools requires careful configuration due to variations in how tools report the same vulnerabilities. |
| 48 | + |
| 49 | + |
| 50 | + |
| 51 | +To enable Cross Tool Deduplication: |
| 52 | + |
| 53 | +1. Select a **Security Tool** from the dropdown |
| 54 | +2. Change the **Deduplication Algorithm** from "Disabled" to "Hash Code" |
| 55 | +3. Select which fields should be used for generating the hash in the **Hash Code Fields** dropdown |
| 56 | + |
| 57 | +Unlike Same Tool Deduplication, Cross Tool Deduplication only supports the Hash Code algorithm, as different tools rarely share compatible unique identifiers. |
| 58 | + |
| 59 | +## Reimport Deduplication |
| 60 | + |
| 61 | +Reimport Deduplication Settings are specifically designed for reimporting data using Universal Parsers or the Generic Parser. |
| 62 | + |
| 63 | + |
| 64 | + |
| 65 | +When configuring Reimport Deduplication: |
| 66 | + |
| 67 | +1. Select the **Security Tool** (Universal or Generic Parser) |
| 68 | +2. Choose the appropriate **Deduplication Algorithm** |
| 69 | + |
| 70 | +The same three algorithm options are available for Reimport Deduplication as for Same Tool Deduplication: |
| 71 | +- Hash Code |
| 72 | +- Unique ID From Tool |
| 73 | +- Unique ID From Tool or Hash Code |
| 74 | + |
| 75 | +## Deduplication Best Practices |
| 76 | + |
| 77 | +For optimal results with Deduplication Tuning: |
| 78 | + |
| 79 | +- **Start with defaults**: The preconfigured deduplication settings work well for most scenarios |
| 80 | +- **Test changes carefully**: After adjusting deduplication settings, monitor a few imports to ensure proper behavior. |
| 81 | +- **Adjustments to deduplication will retroactively adjust the hash values for findings already imported for the given test type that was changed**. The recalculation is applied in the background to all findings in the database associated with the given test type that was changed. Please note that since the process is occurring in the background, immediate changes may not be observed. |
| 82 | +- **Use Hash Code for cross-tool deduplication**: When enabling cross-tool deduplication, select fields that reliably identify the same finding across different tools (such as vulnerability name, location, and severity). **IMPORTANT** Each tool enabled for cross-tool deduplication **MUST** have the same fields selected. |
| 83 | +- **Avoid overly broad deduplication**: Cross-tool deduplication with too few hash fields may result in false duplicates |
| 84 | + |
| 85 | +By tuning deduplication settings to your specific tools, you can significantly reduce duplicate noise. |
0 commit comments