Eclipse Plugins Guide 20.2.0
Eclipse Plugins Guide 20.2.0
Eclipse Plugins Guide 20.2.0
Eclipse
Software Version: 20.2.0
User Guide
Legal Notices
Micro Focus
The Lawn
22-30 Old Bath Road
Newbury, Berkshire RG14 1QN
UK
https://www.microfocus.com
Warranty
The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in
the express warranty statements accompanying such products and services. Nothing herein should be construed as
constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained
herein. The information contained herein is subject to change without notice.
Copyright Notice
© Copyright 2009 - 2020 Micro Focus or one of its affiliates
Trademark Notices
All trademarks, service marks, product names, and logos included in this document are the property of their respective
owners.
Documentation Updates
The title page of this document contains the following identifying information:
l Software Version number
l Document Release Date, which changes each time the document is updated
l Software Release Date, which indicates the release date of this version of the software
This document was produced on October 29, 2020. To check for recent updates or to verify that you are using the most
recent edition of a document, go to:
https://www.microfocus.com/support/documentation
Contents
Preface 8
Contacting Micro Focus Fortify Customer Support 8
For More Information 8
About the Documentation Set 8
Change Log 9
Chapter 1: Introduction 10
Fortify Plugin for Eclipse 10
Fortify Remediation Plugin for Eclipse 10
Related Documents 11
All Products 11
Micro Focus Fortify Software Security Center 12
Micro Focus Fortify Static Code Analyzer 12
Analysis Settings 23
Configuring Analysis Settings 23
Configuring Advanced Analysis Options 24
Scanning in Full Scan or Quick Scan Mode 24
Specifying Additional Fortify Static Code Analyzer Options 25
About the Scan Results File Name and Directory 25
Making Changes for all Projects 25
Making Changes for Specific Projects 26
Specifying Resources to Scan 26
Viewing the Resources and Classpath to be Scanned 26
Scanning Projects 27
Scanning Individual Files and Packages 27
Running an Advanced Analysis 27
About Viewing Scan Results 32
Static Analysis Results View 33
Filter Sets 34
Specifying the Default Filter Set 35
Folders (Tabs) 35
Group By List 36
Specifying the Default Issue Grouping 37
Sorting Issues 37
Search Box 38
Project Summary View 38
Summary Tab 38
Certification Tab 38
Build Information Tab 39
Analysis Information Tab 39
Viewing Summary Graph Information 39
Analysis Trace View 43
Issue Auditing View 45
Audit Tab 45
Details Tab 47
WebInspect Agent Details Tab 47
Recommendations Tab 48
History Tab 48
Diagram Tab 48
Filters Tab 49
Warnings Tab 50
Preface
l Download software
https://www.microfocus.com/support
Change Log
The following table lists changes made to this document. Revisions to this document are published only
if the changes made affect product functionality.
Software
Release /
Document
Version Change
20.2.0 Updated:
l "Logging in to Fortify Software Security Center" on page 86 and "Opening a
Fortify Software Security Center Application Version" on page 112 - New ability to
connect to Fortify Software Security Center with an authentication token
20.1.0 Updated:
l "Generating Legacy Reports" on page 77 - Removed RTF as an output format for
legacy reports
19.2.0 Updated:
l "Issue Auditing View" on page 45 - Tab names were changed to be consistent with
Micro Focus Fortify Software Security Center
19.1.0 Updated:
l "About Installing the Eclipse Complete Plugin" on page 14 - Any required third-
party dependencies are automatically installed
l "Running an Advanced Analysis" on page 27 - The option to enable Findbugs for
the advanced scan was removed
For instructions on how to install and use the Eclipse Complete Plugin, see "Using the Eclipse Complete
Plugin" on page 14.
Developers can address security issues while they write code in Eclipse. Your organization can use the
Eclipse Remediation Plugin with Fortify Software Security Center to manage projects and assign specific
issues to the relevant developers.
For instructions on how to install and use the Eclipse Remediation Plugin, see "Using the Eclipse
Remediation Plugin" on page 110.
Related Documents
This topic describes documents that provide information about Micro Focus Fortify software products.
Note: You can find the Micro Focus Fortify Product Documentation at
https://www.microfocus.com/support/documentation. All guides are available in both PDF and
HTML formats.
All Products
The following documents provide general information for all products. Unless otherwise noted, these
documents are available on the Micro Focus Product Documentation website.
About Micro Focus Fortify Product This paper provides information about how to access Micro
Software Documentation Focus Fortify product documentation.
About_Fortify_Docs_<version>.pdf Note: This document is included only with the product
download.
Micro Focus Fortify Software System This document provides the details about the
Requirements environments and products supported for this version of
Fortify Software.
Fortify_Sys_Reqs_<version>.pdf
Micro Focus Fortify Software Release This document provides an overview of the changes made
Notes to Fortify Software for this release and important
information not included elsewhere in the product
FortifySW_RN_<version>.pdf
documentation.
What’s New in Micro Focus Fortify This document describes the new features in Fortify
Software <version> Software products.
Fortify_Whats_New_<version>.pdf
Micro Focus Fortify Software Security This document provides Fortify Software Security Center
Center User Guide users with detailed information about how to deploy and
use Software Security Center. It provides all of the
SSC_Guide_<version>.pdf
information you need to acquire, install, configure, and use
Software Security Center.
It is intended for use by system and instance
administrators, database administrators (DBAs), enterprise
security leads, development team managers, and
developers. Software Security Center provides security
team leads with a high-level overview of the history and
current status of a project.
Micro Focus Fortify Static Code This document describes how to install and use Fortify
Analyzer User Guide Static Code Analyzer to scan code on many of the major
programming platforms. It is intended for people
SCA_Guide_<version>.pdf
responsible for security audits and secure coding.
Micro Focus Fortify Static Code This document provides the information that you need to
Analyzer Custom Rules Guide create custom rules for Fortify Static Code Analyzer. This
guide includes examples that apply rule-writing concepts to
SCA_Cust_Rules_Guide_<version>.zip
real-world security issues.
Micro Focus Fortify Audit Workbench This document describes how to use Fortify Audit
User Guide Workbench to scan software projects and audit analysis
results. This guide also includes how to integrate with bug
AWB_Guide_<version>.pdf
trackers, produce reports, and perform collaborative
auditing.
Micro Focus Fortify Plugins for Eclipse This document provides information about how to install
User Guide and use the Fortify Complete and the Fortify Remediation
Plugins for Eclipse.
Eclipse_Plugins_Guide_<version>.pdf
Micro Focus Fortify Plugins for This document describes how to install and use both the
JetBrains IDEs and Android Studio Fortify Analysis Plugin for IntelliJ IDEA and Android Studio
User Guide and the Fortify Remediation Plugin for IntelliJ IDEA,
Android Studio, and other JetBrains IDEs.
JetBrains_AndStud_Plugins_Guide_
<version>.pdf
Micro Focus Fortify Jenkins Plugin This document describes how to install, configure, and use
User Guide the plugin. This documentation is available at
https://www.microfocus.com/documentation/fortify-
Jenkins_Plugin_Guide_<version>.pdf
jenkins-plugin.
Micro Focus Fortify Security Assistant This document describes how to install and use Fortify
Plugin for Eclipse User Guide Security Assistant plugin for Eclipse to provide alerts to
security issues as you write your Java code.
SecAssist_Eclipse_Guide_
<version>.pdf
Micro Focus Fortify Extension for This document provides information about how to install
Visual Studio User Guide and use the Fortify extension for Visual Studio to analyze,
audit, and remediate your code to resolve security-related
VS_Ext_Guide_<version>.pdf
issues in solutions and projects.
Micro Focus Fortify Static Code This document describes the properties used by Fortify
Analyzer Tools Properties Reference Static Code Analyzer tools.
Guide
SCA_Tools_Props_Ref_<version>.pdf
To update from an earlier Eclipse Complete Plugin version, you must first remove the existing version.
For information about how to uninstall the plugin, see About Uninstalling the Eclipse Complete Plugin.
Note: These instructions describe a third-party product and might not match the specific,
supported version you are using. See your product documentation for the instructions for your
version.
Note: Any required third-party dependencies are automatically installed if they do not already
exist on your system.
6. If you have Eclipse Java Development Tools (JDT) installed, you can clear the Contact all update
sites during install to find required software check box to reduce the installation time.
Note: Only the Fortify Analysis Plugin for Eclipse feature requires JDT.
7. Click Next.
The Install Details step lists the plugins you selected.
8. To display version and copyright information for a plugin in the Details section, click the feature
name.
9. Click Next.
10. On the Review Licenses step, review and accept the terms of the Micro Focus license agreement.
11. Click Finish.
12. To complete the installation and restart Eclipse, click Restart Now when prompted.
After Eclipse restarts, the menu bar includes the Fortify menu.
Note: Any required third-party dependencies are automatically installed if they do not already
exist on your system.
8. Click Next.
The Install Details step lists the plugins you selected.
9. To display version and copyright information about the plugin in the Details box, click the plugin
name.
10. Click Next.
11. On the Review Licenses step, review and accept the terms of the Micro Focus license agreement.
12. Click Finish.
13. Click OK.
14. To complete the installation, click Yes to restart Eclipse when prompted.
After Eclipse restarts, the menu bar includes the Fortify menu.
Note: By default, Micro Focus Fortify Software Security Center does not allow you to upload scans
performed in quick scan mode. However, you can configure your Fortify Software Security Center
application version so that uploaded audit projects scanned in quick scan mode are processed. For
more information, see analysis results processing rules in the Micro Focus Fortify Software Security
Center User Guide.
To configure your scan to run in full scan or quick scan mode, see "Scanning in Full Scan or Quick Scan
Mode" on page 24.
3. To update security content from your Fortify Software Security Center server:
a. Under Security Content Update, select the Update from Software Security Center check
box.
Note: If this check box is unavailable, then click Security Content Management in the left
panel and if prompted to locate the Fortify Static Code Analyzer executable location, click
OK and specify its location.
b. Under Software Security Center, specify the Fortify Software Security Center server URL and
if necessary, the proxy server, port number, and optionally credentials for proxy authentication.
4. To specify an update server from which to update security content, under Security Content
Update, do the following:
a. In the Server URL box, type the URL for the update server.
b. If required, specify the proxy server, port number, and optionally credentials for proxy
authentication.
Note: Scroll to the bottom of the Installed Fortify Security Content list to see the external
mappings.
Any custom rules and custom external mappings appear in the Installed Custom Security
Content list.
3. In the Update Security Content list, select the security content in the language you want.
The Security Content Update window displays the results of the security content update.
4. Click OK to close the Security Content Update window.
For more information about the fortifyupdate utility, see the Micro Focus Fortify Static Code Analyzer
User Guide.
Note: To import custom external metadata, place your external metadata file in the <sca_install_
dir>/Core/config/CustomExternalMetadata directory.
Analysis Settings
You can customize your scan and analysis settings to suit your requirements. You also have the option
to run scans in quick scan mode. The following sections provide instructions about how to configure
your scans and how to use quick scan mode.
3. To specify the amount of memory to use for the scan, type an integer in the Memory (MB) box.
Note: Do not allocate more than two thirds of the available physical memory.
4. By default, Fortify Static Code Analyzer treats SQL files as though they use the T-SQL procedural
language on Windows systems and PL/SQL on other platforms. To specify the SQL type, click the
SQL Type menu, and then select TSQL or PLSQL.
5. To use specific security content to scan the project (instead of all security content), under Security
Content, clear the Use All Installed Security Content check box, and then select the check boxes
for the installed Fortify and custom security content to use.
6. To update or import custom security content, click Manage Security Content.
7. Click OK.
4. Under Advanced Analysis Options, select or clear the Enable quick scan mode check box.
5. Click OK.
l To specify a name and a static workspace folder for FPR files, click Workspace, and then, in the
Folder Selection window, navigate to and select a workspace relative directory.
l To specify a name and a static folder that is not part of your workspace, click File System, and
then select a directory for FPR files.
l To specify a name and a dynamic path that changes based on the project you are analyzing, click
Variables, and then, in the Select Variable window, select core Eclipse variables to specify the
relative path for FPR files.
l To specify a name and a static workspace folder for project results, click Workspace, and then,
in the Folder Selection dialog box, navigate to and select a workspace relative directory.
l To specify a name and a static folder that is not part of your workspace, click File System, and
then select a directory for FPR files.
l To specify a name and a dynamic path that changes based on the project you are analyzing, click
Variables, and then, in the Select Variable dialog box, select core Eclipse variables to specify the
relative path for the FPR files.
l Select a project name, and then select Fortify > Advanced Analysis.
The Advanced Static Analysis wizard opens.
2. Expand the directory tree.
The Advanced Static Analysis displays the project resources and classpath to be scanned. If you have
“Scan resources in dependent projects” enabled, you can see any dependent projects in the Workspace
Source Dependencies root. If you have a source code folder set up for any of the referenced libraries
and it is not in your workspace, it is listed in the External Source Dependencies folder. All library JAR
files configured for your project that are not under the root of your project are shown in the External
Classpath folder.
Scanning Projects
The Eclipse Complete Plugin automatically includes all source files from dependent projects in scans.
Although you can scan individual packages and files (see "Scanning Individual Files and Packages"
below), the results are more accurate if you scan an entire project at once.
Note: You can scan multiple projects at the same time with the advanced analysis (see "Running an
Advanced Analysis" below).
To scan a project:
1. Open the project in the Java perspective.
2. In the Package Explorer or Project Explorer view, select the project.
3. Select Fortify > Analyze Project.
After the scan finishes, the results are loaded into and displayed in the Fortify Audit perspective.
Note: Fortify does not recommend this method, because analysis results are more accurate when
an entire project is scanned at once.
Note: The Eclipse Complete Plugin filters out unsupported files within the selected source code
directories.
The selected Eclipse projects to be scanned are listed in the left panel.
3. In the Build ID box, type the build ID.
If you selected only one project for the advanced analysis, the first root directory is the default
build ID. Otherwise, the wizard creates unique number for the Build ID, which you can change.
4. To disable translation, clear the Enable Translation check box.
For example, if the security content has changed but the source code has not, you might want to
disable the translate phase so that the project is scanned without retranslating.
Note: Selection of the Enable Translation option directs the wizard to perform the Micro
Focus Fortify Static Code Analyzer clean phase for the build ID in addition to the source code
translation. During the clean phase, Fortify Static Code Analyzer removes temporary files from
previous translation of the project. If translation is disabled, the clean phase is also not
performed.
5. To add additional Eclipse projects for analysis, click Add Project above the Eclipse projects list
on the left.
The wizard automatically includes all supported files in the translation as determined by the project
type. For Java projects, the wizard uses Eclipse logic to resolve source paths. For non-Java projects,
the wizard includes all files under the project root.
l Scanning Resources—Source files for translation.
Make sure only the files or directories that you want to translate are selected. To add additional
files for translation, click Add Files .
l Classpath—(Java projects only) The classpath to use for the Java source code. Include all
JAR dependencies normally used to build the project.
Make sure to select only the files or directories that you want to translate. To add additional files
for translation, click Add Folders . To add JAR files, click Add JAR .
l Sourcepath—(Java projects only) Folders that contain source code of dependent projects.
a. From the JDK version list, select the Java version of the code in the project.
b. By default, Micro Focus Fortify Static Code Analyzer treats SQL files as though they use the
T-SQL procedural language on Windows systems and PL/SQL on other platforms. To specify
the SQL type, click the SQL Type menu, and then select TSQL or PLSQL.
c. Specify any additional translation options in the Additional Translation Arguments box.
For information about the available command-line options, see the Micro Focus Fortify Static
Code Analyzer User Guide.
7. Click Next to configure the scan options.
a. (Optional) To skip the scan phase, clear the Enable Scan check box.
For example, if you want to offload the scan phase to a different machine, you would skip the
scan phase, use the command line to create a mobile build session (MBS) file, and import the
MBS to the scan machine. See the Micro Focus Fortify Static Code Analyzer User Guide for
instructions on how use mobile build sessions.
b. To specify a different output file path than the default, in the Output file box, type the path
and file name for the FPR file that Fortify Static Code Analyzer is to generate.
c. To perform a quick scan, select the Enable Quick Scan Mode check box.
For information about quick scans, see "Quick Scan Mode" on page 18.
d. To merge these results with a previous scan, select the Merge with previous scan check box,
and then click Browse to navigate to and select the previous FPR file.
e. (Optional) To specify the amount of memory Fortify Static Code Analyzer uses for scanning,
adjust the slider to the amount of memory as needed.
f. (Optional) Specify any additional scan options in the Additional Scan Arguments box.
For information about the available command-line scan options, see the Micro Focus Fortify
Static Code Analyzer User Guide.
8. (Optional) To scan the code with a custom selection of Rulepacks, do the following:
a. In the Secure Coding Rulepacks list in the left panel, expand the Installed Fortify Security
Content node and display the installed Rulepacks.
b. In the Installed Fortify Security Content list, clear the check boxes that correspond to any
Rulepacks you want to disable for the scan.
Note: For instructions on how to add custom security content, see "Importing Custom
Security Content" on page 23.
9. Click Next to proceed to the Audit guide page or to skip the Audit Guide options, click Scan.
Static Analysis Results (top left) "Static Analysis Results View" below
You can also open audit-related views in other perspectives, such as the Java perspective or the C/C++
perspective, and rearrange the views. You might decide to use the audit views only, and stay within a
customized development perspective.
Note: In this view, you can right-click an issue and select Issue Attributes to see all the attributes
associated with the issue such as Analysis tag, analyzer that detected the issue, severity, and more.
Filter Sets
The selected filter set controls which issues are listed in the Static Analysis Results view. The filter set
determines the number and types of containers (folders) that are shown and how and where to display
issues. The default filter sets sort the issues by severity into the Critical, High, Medium, Low, and All
folders.
Because filter sets are saved to audit project files, each audit project can have unique filter sets.
The plugin provides the following filter sets for new projects:
l Quick View: This is the default initial filter set for new projects. The Quick View filter set provides a
view only of issues in the Critical folder (these have a potentially high impact and a high likelihood of
occurring) and the High folder (these have a potentially high impact and a low likelihood of
occurring). The Quick View filter set provides a useful first look at results that enables you to quickly
address the most pressing issues.
l Security Auditor View: This is the default filter set for projects scanned in earlier product versions.
This view shows all security issues detected. The Security Auditor View filter contains no visibility
filters, so all issues are shown.
For instructions on how to create custom filter sets, see "Configuring Custom Filter Sets and Filters" on
page 93.
If you open an FPR file that contains no custom filtertemplate.xml file or if you open an FVDL file
or a webinspect.xml file, the audit project opens with the Quick View filter set selected.
Folders (Tabs)
The color-coded Critical, High, Medium, Low, and All tabs on the Static Analysis Results view are
called folders. You can customize the folders and their settings. The number of folders, names, colors,
and the issue list can vary between filter sets and projects.
Note: In the Eclipse Complete Plugin, the term folder does not refer to the folder icons in the issues
list.
Within each color-coded folder, issues are grouped into subfolders. At the end of each folder name,
enclosed in brackets, is the number of audited issues and the total number of issues in the folder. For
example, Command Injection - [1 / 3] indicates that one out of three issues categorized as Command
Injection has been audited.
The filter set you select from the Filter Set list determines which folders are visible in the Static Analysis
Results view. The following folders are visible while the Security Auditor View filter set is selected:
l The Critical folder contains issues that have a high impact and a high likelihood of occurring. Issues
at this risk level are easy to discover and to exploit, and represent the highest security risk to a
program. Remediate critical issues immediately.
Example: SQL Injection
l The High folder contains issues that have a high impact and a low likelihood of occurring.
High-priority issues are often difficult to discover and exploit, but can result in much asset damage.
They represent a significant security risk to a program. Remediate these issues with the next patch
release.
Example: Password Management: Hardcoded Password
l The Medium folder contains issues that a have low impact and a high likelihood of exploitation.
Medium-priority issues are easy to discover and exploit, but often result in little asset damage. These
issues represent a moderate security risk to a program. Remediate these issues as time permits.
Example: ASP.NET Misconfiguration: Missing Error Handling
l The Low folder contains issues that have a low impact and a low likelihood of exploitation. Remediate
these issues as time permits. Low-priority issues are potentially difficult to discover and to exploit and
typically result in little asset damage. These issues represent a minor security risk to the program.
Example: Poor Error Handling: Empty Catch Block
l The All folder contains the issues from all the other folders.
An issue is listed in a folder if the folder filter conditions match the issue attributes. Each filter set has a
default folder, indicated by (default) next to the folder name. If an issue does not match any of the
folder filters, the issue is listed in the default folder.
You can create your own folders as you need them. For example, you might group all hot issues for a
project into a Hot folder and group all warning issues for the same project into a Warning folder. For
instructions on how to create your own folders, see "Creating a Folder" on page 98.
Each folder contains a list of all the issues with attributes that match the folder filter conditions. One
folder in each filter set is the default folder, indicated by (default) in the folder name.
Note: To show or hide suppressed, hidden, and removed issues, set the user interface preferences
from the Options dialog box (see "Customizing the Static Analysis Results View" on page 62).
Group By List
The Group By list options sort the issues into sub folders. The option you select is applied to all visible
folders. To list all issues in the folder without any grouping, select <none>.
To customize the existing groups, you can specify which attributes to sort by, add or remove the
attributes to create sub-groupings, and add your own grouping options.
The Group By settings apply to the application instance. You can apply the Group By option to any
project opened with that instance of the application.
For more information, see "Grouping Issues" on page 53.
Sorting Issues
There are several different ways to sort the issues in the Static Analysis Results View. Select a sort
option from the Sort list. The following table describes the sort options.
Sort
Method Icons Description
Alphabetical Sorts the groups and the issues within the groups in alphabetical order.
Sorts the groups and the issues within the groups in reverse-
alphabetical order
Group size Sorts the groups by the number of contained issues from largest to
smallest
Last Sorts the groups and issues in groups by the date last modified by
modified Micro Focus Fortify Static Code Analyzer or the audit/comment date
date from newest to oldest
Sorts the groups and issues in groups by the date last modified by
Fortify Static Code Analyzer or the audit/comment date from oldest to
newest
Search Box
The search box enables you to limit the issues displayed in the folder and to search for specific issues.
For detailed information about how to use the search box, see "Searching for Issues" on page 66.
Summary Tab
The Summary tab shows high-level information about the project. For more information, see "Viewing
Summary Graph Information" on the next page.
Certification Tab
The Certification tab displays the result certification status and indicates whether the code analysis for
a scan was complete. Results certification is a check to ensure that the analysis results have not been
altered after Micro Focus Fortify Static Code Analyzer produced them. Results certification shows
specific information about the scanned code, including:
l FPR certification
l Certification details such as the results and rules signatures
2. To see a different view of the high priority issues, click the High bar.
By default, the graph displays high priority issues based on the analysis attribute (assigned analysis
values).
Note: The example here shows information for scan results that have been partially audited. If
these results were from a fresh, unaudited scan, no analysis information would be available.
The graph would just display a single bar that represents all (unaudited) high priority issues.
3. To view the high priority issues based on a different attribute, select an item from the View By list.
4. On the Issues in High bar graph, select a bar for a category that contains multiple issues.
In the example shown here, the Null Dereference bar is selected. You can see that, of eight issues,
three are marked as Suspicious and five are marked as Bad Practice.
5. To synchronize the issues list with the displayed graphical view, click Sync Issue List with Graph.
The issues list in the Static Analysis Results view now reflects the selections in the summary
graph.
7. To return to the original summary graph view (issues based on priority), click Return to Folder
Graph.
Note: The Eclipse Remediation Plugin does not display the Rule ID.
For example, when you select an issue that is related to potentially tainted dataflow, the Analysis
Trace view shows the direction the dataflow moves in this section of the source code.
The Analysis Trace view uses the icons listed in the following table to show how the dataflow moves in
this section of the source code or execution order.
Icon Description
Information is read from a source external to the code such as an HTML form or a URL
A comparison is made
Passthrough, tainted data passes from one parameter to another in a function call
A pointer is created
A pointer is dereferenced
Generic
Icon Description
Taint change
The Analysis Trace view can display inductions. Inductions provide supporting evidence for their
parent nodes. Inductions consist of a text node, displayed in italics as a child of the trace node, and an
induction trace, displayed as a child of the text node (a box surrounds the induction trace). The italics
and the box distinguish the induction from a standard subtrace.
Note: If any of the tabs are not visible, select Window > Show View to open them.
Audit Tab
The Audit tab displays information about the selected issue and enables auditors to add an audit
evaluation, comments, and custom tag values. The following table describes the tab elements.
Element Description
Issue Displays the issue location, including the file name and line number.
User Displays the name of the user assigned to the issue if the results were
uploaded to Micro Focus Fortify Software Security Center and a user was
assigned in Fortify Software Security Center.
Analysis List of values that the auditor can use to assess the issue. Valid values for
Analysis are Not an Issue, Reliability Issue, Bad Practice, Suspicious, and
Exploitable.
Element Description
<custom_tags> Displays any custom tags if defined for the audit project.
If the audit results have been submitted to Audit Assistant in Fortify
Software Security Center, then in addition to any other custom tags, the tab
displays the following tags:
l AA_Prediction—Exploitability level that Audit Assistant assigned to the
issue. You cannot modify this tag value.
l AA_Confidence—Confidence level from Audit Assistant for the accuracy
of its AA_Prediction value. This is a percentage, expressed in values that
range from 0.000 to 1.000. For example, a value of 0.982 indicates a
confidence level of 98.2 percent. You cannot modify this tag value.
l AA_Training—Whether to include or exclude the issue from Audit
Assistant training. You can modify this value.
For more information about Audit Assistant, see the Micro Focus Fortify
Software Security Center User Guide.
Comment Appends additional information about the issue to the comment field.
Rule Information Shows information, such as the category and kingdom that describes the
issue.
Show merge conflicts Shows merge conflicts in the Comments box that might exist after a merge
of audit projects. This check box is available only if merge conflicts exist.
Details Tab
The Details tab provides an abstract of the issue, a detailed explanation, and examples. The following
table describes the tab elements.
Element Description
Abstract/Custom Summary description of the issue, including custom abstracts that your
Abstract organization defined.
Explanation/Custom Description of the conditions in which this type of issue occurs. This includes a
Explanation discussion of the vulnerability, the constructs typically associated with it, how
an attacker can exploit it, and the potential consequences of an attack. This
element also provides custom explanations that your organization defined.
Remediation Effort The relative amount of effort required to fix and verify an issue.
Element Description
Request Shows the path of the request, the referrer address, and the method.
Stack Trace Shows the order of methods called during execution and line number information.
Blue, clickable code links are only displayed for Fortify Static Code Analyzer-scanned
code.
Recommendations Tab
The Recommendations tab displays suggestions and examples of how to secure the vulnerability or
remedy the bad practice. The following table lists the elements on the tab.
Element Description
Tips/Custom Tips Tips for this type of issue, including any custom tips that your
organization defined.
History Tab
The History tab displays a complete list of audit actions, including details such as the time and date, and
the name of the user who modified the issue.
Diagram Tab
The Diagram tab displays a graphical representation of the node execution order, call depth, and
expression type of the issue selected in the Static Analysis Results view. This tab displays information
that is relevant to the rule type. The vertical axis represents the execution order.
For dataflow issues, the trace starts with the first function to call the taint source, then traces the calls to
the source (blue node), and ends the trace at the sink (red node). In the diagram, the source (src) and
sink nodes are also labeled. A red X on a vertical axis indicates that the called function finished
executing.
The horizontal axis shows the call depth. A line shows the direction that control is passed. If control
passes with tainted data through a variable, then the line is red. If control passes without tainted data,
the line is black.
The icons used for the expression type of each node in the diagram are the same icons used in the
Analysis Trace view. To view the icons and the descriptions, see "Analysis Trace View" on page 43.
Filters Tab
The Filters tab displays all the filters in the selected filter set.
Option Description
Filters Displays a list of the visibility and folder filters configured in the selected filter set.
l Visibility filters show or hide issues
l Folder filters sort the issues into the folder tabs in the Static Analysis Results view
Right-click a filter to show issues that match the filter or to enable, disable, copy, or delete
it.
Note: This option is visible when you create a new filter or edit an existing filter. In this
case, a dialog box displays the If section.
Then Indicates the filter type, where Hide Issue is a visibility filter and Set Folder to is a folder
filter.
Note: This option is visible when you create a new filter or edit an existing filter. In this
case, a dialog box displays the Then section. For more information, see "Creating a
Filter from the Issue Auditing View" on page 95.
Warnings Tab
The Warnings tab lists any warnings that occurred during the analysis.
A common source of warnings are missing references. To resolve this type of warning, make sure that
the reference files are either within the project directory structure or in a location known to Micro Focus
Fortify Static Code Analyzer. The scan can also issue a warning if a class has no functional content. In
this case, the warning is not an issue because an empty class has no impact on a scan.
The following table describes the Warnings tab options.
Task Procedure
Copy a warning message to the l Right-click a message, and then select Copy.
clipboard.
Save a warning message to a file. 1. Right-click a message, and then select Export Entry.
2. Type a name for the file, and then click Save.
The file includes the audit project name, FPR file location, the
warning code, and the warning message.
Task Procedure
Search the warning message Type the search text in the filter text box.
C:\Users\<username>\AppData\Local\Fortify
l Non-windows: /home/<username>/.fortify
2. Edit the text following message= to the text you want to
display in the Warnings tab.
Close and reopen the Warnings tab to see the updated text.
2. Make your selections for the types of issues you want to display.
3. To use the advanced filter options, click Advanced Mode.
a. In the Audit Guide Filters list, select the types of issues you want to filter out and ignore.
As you select items in the Audit Guide Filters list, the Audit Guide Wizard also displays the
filter details for the selected filter type in the Filters table, including the number of issues that
match each filter.
b. To see a description of an issue type, click its name in the Audit Guide Filters list.
The Audit Guide Wizard displays a description to the right of the list.
4. Click OK to apply your filter selections.
Grouping Issues
The items visible in the navigation tree vary depending on the selected grouping option in the Static
Analysis Results view. The value you select from the Group By list sorts issues in all visible folders into
subfolders.
To list all issues in a folder without any grouping, select <none>.
You can view issues with any of the Group By options, and you can create and edit customized groups.
The Group By options enable you to group and view the issues in different ways. In practice, you will
probably switch frequently between different groupings. The following table lists descriptions of the
standard Group By options.
Option Description
Analysis Groups issues by the audit analysis, such as Suspicious, Exploitable, and
Not an Issue.
Analysis Type Groups issues by analyzer product, such as SCA, WEBINSPECT, and
SECURITYSCOPE (WebInspect Agent).
Analyzer Groups issues by analyzer group, such as Control Flow, Data Flow,
Findbugs, Pentest, and Structural.
App Defender Protected Groups issues by whether Application Defender can protect the
vulnerability category.
Category Analyzer A custom group that groups issues by category and then by analyzer.
Fortify Priority Order Groups issues as Critical, High, Medium, and Low based on the analyzer's
combined values of impact and likelihood.
Manual Groups issues by whether they were manually created by penetration test
tools, and not automatically produced by a web crawler such as Fortify
WebInspect.
New Issue Shows which issues are new since the last scan. For example, if you run a
new scan, any issues that are new display in the tree under the Issue New
group and the others are displayed in the Issue Updated group. Issues
not found in the latest scan are displayed in the Issue Removed group.
<metadata_listname> Groups issues by the alternative metadata external list names (for
example, OWASP Top 10 <year>, CWE, PCI <version>, STIG <version>,
and so on).
Package Groups issues by package or namespace. Does not appear for projects to
which this option does not apply, such as C projects.
Priority by Category A custom group that groups issues by Fortify Priority Order and then by
category.
Sink Groups issues that share the same dataflow sink function.
Option Description
Source Groups issues that share the same dataflow source functions.
Source File Type Groups issues by source file types Micro Focus Fortify Static Code
Analyzer recognizes.
Note: Issues in files with different file extensions that are the same
source file type are grouped together (for example, issues in files with
the extensions: html, htm, and xhtml are grouped under html).
Taint Flag Groups issues by the taint flags that they contain.
The following table describes additional grouping options that are available when you create a custom
Group By option (see "Creating a Custom Group By Option" below).
Option Description
Issue State Groups audited issues by whether the issue is an open issue or not an issue based
on the level of analysis set for the primary tag. Values equivalent to suspicious and
exploitable are considered open issue states.
Primary Context Groups issues where the primary location or sink node function call occurs in the
same code context.
Source Context Groups dataflow issues that have the source function call contained in the same
code context.
Status Groups issues by the audit status (Reviewed, Unreviewed, or Under Review)
Evaluating Issues
To evaluate and assign audit values to an issue or group of issues:
1. Select the issue or group of issues in the Static Analysis Results view, see "About Viewing Scan
Results" on page 32.
2. In the Issue Auditing view, read the abstract on the Audit tab. This abstract provides high-level
information about the issue, such as the analyzer that found the issue.
For example, Command Injection (Input Validation and Representation,
dataflow) indicates that this issue that the Dataflow Analyzer detected, is a Command Injection
issue in the Input Validation and Representation kingdom.
3. Click the More Information link to get more details about the issue.
4. On the Audit tab, specify an Analysis value for the issue to represent your evaluation.
5. Specify values for any custom tags as your organization requires.
For text-type custom tags, you can click Edit Text to see and edit long text strings. This tag
accepts up to 500 characters (HTML/XML tags and newlines are not allowed).
For date-type custom tags, you can click to select a date from a calendar.
6. If the audit results have been submitted to Audit Assistant in Micro Focus Fortify Software
Security Center, then you can specify whether to include or exclude the issue from Audit Assistant
training from the AA_Training list.
Note: If you select a different value for Analysis than the AA_Prediction value set by Audit
Assistant, and you select Include from the AA_Training list, then the next time the data is
submitted to Audit Assistant, it updates the information used to predict whether an issue
represents a true vulnerability. For more information about Audit Assistant, see the Micro
Focus Fortify Software Security Center User Guide.
7. (Optional) In the Comments box, type comments relevant to the issue and your evaluation.
If no custom tags have been created, the list only includes the Analysis tag.
4. Click OK.
The keyboard shortcut functions just as it does for the Analysis tag values. Shortcuts are provided for
only the first ten values in the list of custom tag values. (To assign the tenth value in the list, you press
Ctrl + Shift + A, and then press 0). If there is no value in the list for the key you press, no value is
assigned.
For information about custom tags, see "Configuring Custom Tags for Auditing" on page 101.
supported:
l GIF
l JPG
l PNG
Viewing Images
After you add an image to an issue, the image is displayed on the right side of the Screenshots tab.
To view a full-size version and complete description of an image added to an issue:
1. In the Issue Auditing Panel, click the Screenshots tab.
2. In the list, click an image to view.
3. Click Preview.
Suppressing Issues
You can suppress issues that are either fixed or that you do not plan to fix.
Suppression marks the issue and all future discoveries of this issue as suppressed. As such, it is a semi-
permanent marking of a vulnerability.
To review results that have been suppressed, select Show Suppressed Issues from the View menu on
the Static Analysis Results toolbar.
To unsuppress an issue, first display the suppressed issues and then do one of the following:
l In the Static Analysis Results view, select the suppressed issue, and then, on the Audit tab in the
Issue Auditing view, click Unsuppress .
l Right-click the issue in the Static Analysis Results view, and then select Unsuppress Issue.
Note: You can select and unsuppress multiple issues at the same time.
4. Select the attributes you want to include from the Include immutable attributes, Include
mutable attributes, and Include custom tags check boxes.
5. Click OK.
6. From the Static Analysis Results view, use the Ctrl or Shift key and select all the issues you want
to include in a table.
7. With the issues selected, press Ctrl + Alt + Shift + C.
8. Start the spreadsheet software, and then paste (Ctrl + V) the copied data into a single column.
To create a spreadsheet table that displays one row per attribute and its values:
1. Select Fortify > Options.
2. In the left panel, select Audit Configuration, and then select the Configuration tab.
3. Under Multiple Issues Copy Format, select the [v] List issues in rows option.
4. Select the attributes you want to include from the Include immutable attributes, Include
mutable attributes, and Include custom tags check boxes.
5. Click OK.
6. From the Static Analysis Results view, use the Ctrl or Shift key and select all the issues you want
to include in a table.
7. With the issues selected, press Ctrl + Alt + Shift + C.
8. Start the spreadsheet software, and then paste (Ctrl + V) the copied data into a single column.
To create a customized table layout for the values that you copy to a spreadsheet program:
1. Select Fortify > Options.
2. In the left panel, select Audit Configuration, and then select the Configuration tab.
3. Under Multiple Issues Copy Format, select the Format manually option.
4. In the Attribute value format box, use the string described in the following table to specify the
data layout, format, and separators for the values you want to copy.
String Function
[h] Columnar format - Attributes are inserted in a single column and the spreadsheet table
expands to the right (horizontally) with a new column added for each issue copied in.
[v] Row format - Attributes are inserted in a single row (table header) and a new row
populated with values is added for each issue added (table expands vertically).
%s Textual data (you can use the complete java.util.Formatter syntax). See the
java.util.Formatter documentation at
https://docs.oracle.com/en/java/index.html.
, Separator symbol - To import the copied value into most spreadsheet programs, you
; or must specify the separator to use in the format field.
tab
String Function
'…' Apply the preceding format string to all elements in the selection. This is only valid if
the format specification starts with [h] or [v].
%n Line separator (platform independent), whether it is the last value for an issue in a row
formatted table [v] or it is the last value of a given attribute in a columnar formatted
table [h].
For example, to specify which specific attributes you want to copy with the row format ([v]), use
[v]%file$s,%category$s,%fortify priority order$s%n. This copies the three attributes
for each selected issue.
5. To see the result of your syntax, look under Result example.
The example shown changes as you change the value in the Attribute Value Format box.
Note: Examples are not available for complex manual formats.
6. Select the attributes you want to include from the Include immutable attributes, Include
mutable attributes, and Include custom tags check boxes.
7. Click OK.
3. To change your preferences on the Appearance tab, select or clear the check boxes described in
the following table.
Preference Description
Show Removed Issues Displays all issues detected in the previous scan, but are no longer
evident in the new Static Analysis Results view. When multiple
scans are run on a project over time, vulnerabilities are often
remediated or become obsolete. Micro Focus Fortify Static Code
Analyzer marks these vulnerabilities as Removed Issues.
Preference Description
Collapse Issues Shows similar issues based on certain attributes under a shared
parent node in the Static Analysis Results view.
Use Short File Names References the issues in the Static Analysis Results view by file
name only, instead of by relative path.
Show Category of Issue Displays the category of an issue in the Static Analysis Results
view and the Audit tab.
Right justify ‘All’ Folder Displays the All folder aligned on the right.
Display Name in Folder Displays the name text in the folder tabs.
Tabs
Show ‘All’ Folder in Displays another bar in the chart on the Summary tab in the Project
Project Summary Graph Summary view.
Include Comments Displays the history items for comments on the History tab.
Note: To restore the default settings at any time, click Reset Perspective.
1. Select the issue in the Static Analysis Results view, and then, on the Audit tab, click File Bug .
When you submit a bug for first time, the Configure Bugtracker Integration dialog box opens. (For
information about configuring the plugin with bug tracker applications, see "Integrating with a Bug
Tracker Application" on the next page.) Select a bug tracker application, and then click OK.
2. Specify all required values and review the issue description. Depending on the integration and your
bug tracker application, the values include items such as the bug tracker application URL, product
name, severity level, summary, and version.
3. If the connection to the bug tracker requires a proxy, select the Use proxy check box.
With this option selected, the Fortify Plugins for Eclipse use the proxy settings specified for bug
trackers. For more information, see "Configuring Proxy Settings for Bug Tracker Integration"
below.
4. Click Submit.
You must already be logged in before you can file a bug through the user interface for bug tracker
applications that require a logon. The issue is submitted as a bug in the bug tracker application.
If you use Fortify Software Security Center, you can submit an issue as a bug using a bug tracker
application configured through Fortify Software Security Center.
To submit an issue as a bug through Fortify Software Security Center:
1. Select the issue in the Static Analysis Results view, and then, on the Audit tab, click the File Bug
icon.
When you submit a bug for first time, the Configure Bugtracker Integration dialog box opens.
Select Fortify Software Security Center, and then click OK.
2. Specify the values if changes are needed and review the issue description. Depending on the
integration and your bug tracker application, the values include items such as the bug tracker
application URL, product name, severity level, summary, and version.
3. Click Submit.
If your bug tracker application requires you to log in, you must do so before you can file a bug through
that interface.
If installed with Fortify SCA and Applications, example source code for bug tracker plugins is available in
<sca_install_dir>/Samples/advanced/BugTrackerPlugin<bugtracker>, where <bugtracker>
is the name of the bug tracker application.
To write your own plugin, see the instructions in the README text file, which is in each bug tracker
directory. Information about the API is included in the JavaDoc located in <sca_install_
dir>/Samples/advanced/JavaDoc/public-api/index.html.
3. Under HTTP Proxy, specify the proxy server, port number, and optionally credentials for proxy
authentication.
4. If the connection uses HTTPS requests, then provide the proxy settings under HTTPS Proxy.
5. Click OK to save your changes.
Comparison Description
equals Searches for an exact match when the term is wrapped in quotation marks ("")
Comparison Description
regex Searches for values that match a Java-style regular expression delimited by a forward
slash (/)
Example: /eas.+?/
number Searches for a range of numbers using the standard mathematical interval notation of
range parentheses and/or brackets to indicate whether the endpoints are excluded or
included respectively
Example: (2,4] indicates greater than two and less than or equal to four
not equal Excludes issues specified by the string when you precede the string with the
exclamation character (!)
Example: file:!Main.java returns all issues that are not in Main.java
You can further qualify search terms with modifiers. The syntax for using a modifier is
modifier:<search_term>.
A search string can contain multiple modifiers and search terms. If you specify more than one modifier,
the search returns only issues that match all the modified search terms. For example,
file:ApplicationContext.java category:SQL Injection returns only SQL injection issues
found in ApplicationContext.java.
If you use the same modifier more than once in a search string, then the search terms qualified by those
modifiers are treated as an OR comparison. For example, file:ApplicationContext.java
category:SQL Injection category:Cross-Site Scripting returns SQL injection issues and
cross-site scripting issues found in ApplicationContext.java.
For complex searches, you can also insert the AND or the OR keyword between your search queries.
Note that AND and OR operations have the same priority in searches.
For more information, see "Search Modifiers" below.
Search Modifiers
You can use a search modifier to specify to which attribute of an issue the search term applies.
Note: To use a modifier that contains a space in the name, such as the name of the custom tag, you
must enclose the modifier in brackets. For example, to search for issues that are new, type [issue
age]:new.
A search that is not qualified by a modifier tries to match the search string on the following attributes:
kingdom, primary rule id, analyzer, filename, severity, class name, function name, instance id, package,
confidence, type, subtype, taint flags, category, sink, and source.
l To apply the search to all modifiers, type a string such as control flow. This searches all the
modifiers and returns any result that contains the specified string.
l To apply the search to a specific modifier, type the modifier name and the string as follows:
analyzer:control flow. This returns all results whose analyzer is control flow.
The following table describes the search modifiers. A few modifiers have a shortened modifier name
indicated in parentheses. You can use either modifier string.
accuracy Searches for issues based on the accuracy value specified (0.1
through 5.0).
analysis Searches for issues that have the specified audit analysis value
such as exploitable, not an issue, and so on.
[analysis type] Searches for issues by analyzer product such as SCA and
WEBINSPECT.
analyzer Searches the issues for the specified analyzer such as control
flow, data flow, structural, and so on.
[app defender protected] Searches for issues based on whether Application Defender can
(def) protect the vulnerability category (protected or not
protected).
[attack payload] Searches for issues that contain the search term in the part of the
request that caused the vulnerability for penetration test results.
[attack type] Searches for issues based on the type of penetration test attack
conducted (URL, parameter, header, or cookie).
audited Searches the issues to find true if the primary tag is set and
false if the primary tag is not set. The default primary tag is the
Analysis tag.
body Searches for issues that contain the search term in the HTTP
message body in penetration test results, which is all the data that
is transmitted immediately following the headers.
bug Searches for issues that contain the search term in the information
for the filed bug.
comments Searches for issues that contain the search term in the comments
(comment, com) that have been submitted on the issue.
confidence (con) Searches for issues that have the specified confidence value
(legacy metadata).
cookies Searches for issues that contain the search term in the cookie from
the HTTP query for penetration test results.
correlated Searches for issues based on whether the issues are correlated
with another analyzer.
[correlation group] Searches for issues based on whether the issues are in the same
correlation group.
dynamic Searches for issues that have the specified dynamic hot spot
ranking value.
file Searches for issues where the primary location or sink node
function call occurs in the specified file.
filetype Searches for issues based on the file type such as asp, csharp,
java, jsp, xml, and so on.
[fortify priority order] Searches for issues that have a priority level that matches the
specified priority determined by Micro Focus Fortify Static Code
Analyzer. Valid values are critical, high, medium, and low,
based on the expected impact and likelihood of exploitation.
The impact value indicates the potential damage that might result
if an issue is successfully exploited. The likelihood value is a
headers Searches for issues that contain the search term in the request
header for penetration test results.
historyuser Searches for issues that have audit data modified by the specified
user.
[http version] Searches for issues based on the specified HTTP version such as
HTTP/1.1.
impact Searches for issues based on the impact value specified (0.1
through 5.0).
[instance id] Searches for an issue based on the specified instance ID.
[issue age] Searches for the issue age, which is new, updated,
reintroduced, or removed.
[issue state] Searches for audited issues based on whether the issue is an open
issue or not an issue (determined by the level of analysis set for
the primary tag).
likelihood Searches for issues based on the specified likelihood value (0.1
through 5.0).
line Searches for issues on the primary location line number. For
dataflow issues, the value is the sink line number. Also see
"sourceline" on page 72.
manual Searches for issues based on whether they were manually created
by penetration test tools, and not automatically produced by a
web crawler such as Fortify WebInspect.
[mapped category] Searches for issues based on the specified category that is
mapped across the various analyzers (SCA, WebInspect, and
WebInspect Agent).
maxconf Searches for all issues that have a confidence value equal to or less
than the number specified as the search term.
maxVirtConf Searches for dataflow issues that have a virtual call confidence
value equal to or less than the number specified as the search
term.
method Searches for issues based on the method, such as GET, POST,
DELETE, and so on.
minconf Searches for all issues that have a confidence value equal to or
greater than the number specified as the search term.
min_virtual_call_ Searches for dataflow issues that have a virtual call confidence
confidence (virtconf, value equal to or greater than the number specified as the search
minVirtConf) term.
package Searches for issues where the primary location occurs in the
specified package or namespace. For dataflow issues, the primary
location is the sink function.
parameters Searches for issues that contain the search term in the HTTP
query parameters.
primary Searches for issues that have the specified primary tag value. By
default, the primary tag is the Analysis tag.
[primary context] Searches for issues where the primary location or sink node
function call occurs in the specified code context. Also see sink and
[source context].
primaryrule (rule) Searches for all issues related to the specified sink rule.
probability Searches for issues based on the probability value specified (1.0
through 5.0).
[remediation effort] Searches for issues based on the remediation effort value
specified. The valid values are whole numbers from 1.0 to 12.0.
response Searches for issues that contain the search term in the response
from the protocol used in penetration test results.
ruleid Searches for all issues reported by the specified rule IDs used to
generate the issue source, sink and all passthroughs.
severity (sev) Searches for issues based on the specified severity value (legacy
metadata).
sink Searches for issues that have the specified sink function name.
Also see [primary context].
source Searches for dataflow issues that have the specified source
function name. Also see [source context].
[source context] Searches for dataflow issues that have the source function call
contained in the specified code context.
Also see source and [primary context].
sourcefile Searches for dataflow issues with the source function call that the
specified file contains.
Also see file.
sourceline Searches for dataflow issues having taint source entering the flow
on the specified line. Also see "line" on page 70.
status Searches issues that have the status reviewed, not reviewed, or
under review.
taint Searches for issues that have the specified taint flag.
trace Searches for issues that have the specified string in the dataflow
trace.
tracenodeAllPaths Searches for the specified value in all the steps of analysis trace.
trigger Searches for issues that contain the search term in the part of the
response that shows that a vulnerability occurred for penetration
test results.
<custom_tagname> Searches for issues based on the value of the specified custom tag.
You can search a list-type custom tag using a range of values. The
values of a list-type custom tag are an enumerated list where the
first value is 0, the second is 1, and so on. You can use the search
syntax for a range of numbers to search for ranges of list-type
custom tag values. For example, analysis:[0,2] returns the
issues that have the values of the first three Analysis values, 0, 1,
and 2 (Not an Issue, Reliability Issue, and Bad Practice).
To search a date-type custom tag, specify the date in the format:
yyyy-mm-dd.
<metadata_listname> Searches for issues based on the value of the specified metadata
external list. Metadata external lists include [owasp top ten
<year>], [cwe top 25 2019], [pci dss <version>],
[stig <version>], and others.
trace:cleanse
l To search for all issues that contain cleanse as part of any modifier, type:
cleanse
l To search for all suppressed vulnerabilities with asdf in the comments, type:
suppressed:true comments:asdf
l To search for all categories except for SQL Injection, type:
category:!SQL Injection
l To select a search term you used previously, click the arrow in the search box, and then select a
search term from the list.
To get assistance to compose the comparison for your search string, do the following:
1. Click your cursor in the search box, and then press Ctrl + Space.
2. From the displayed list, double-click an issue attribute to begin your search string.
3. To get assistance to specify the comparison, with your cursor placed after the modifier in the
search box, press Ctrl + Space.
4. From the displayed list, double-click the comparison to add to your search string.
5. Type the rest of the search term.
The Static Analysis Results view lists all the issues that match your search string.
The plugin saves all the search terms you type for the current session. To select a search term you used
previously, click the arrow in the search box, and then select a search term. (After you close Eclipse, the
saved search terms are discarded.)
To create complex search strings can involve several steps. If you type an invalid search string, the
magnifying glass icon in the text field changes to a warning icon to notify you of the error. Click the
warning sign to view information about the search term error.
The advanced search feature makes it easier to build complex search strings. For a description of this
feature and instructions on how to use it, see "Performing Advanced Searches" below.
Note: The advanced search feature is not available in the Eclipse Remediation Plugin.
Generating Reports
The Eclipse Complete Plugin provides a flexible reporting infrastructure based on user-configurable
report templates. Report templates provide several optional sections and subsections that gather and
present specific types of data. The following sections provide information about the default reports and
report templates, instructions on how to modify existing reports, and how to create your own reports.
5. Make any necessary changes to the report details, including its location and format.
6. Click Save.
Fortify Plugins for Eclipse generates the report in the format you selected.
l Fortify Scan Summary—Provides high-level information based on the category of issues that Micro
Focus Fortify Static Code Analyzer found as well as a project summary and a detailed project
summary.
l Fortify Security Report—A mid-level report that provides comprehensive information on the
analysis performed and the high-level details of the audit that was performed. It also provides a high-
level description and examples of categories that are of the highest priority.
l OWASP Top Ten <year>—Provides high-level summaries of uncovered vulnerabilities organized
based on the top ten issues that the Open Web Security Project (OWASP) has identified.
The following sections describe how to view report templates and customize them to address your
reporting needs.
Variable Description
$AUDIT_GUIDE_ List of filters created with answers to Audit Guide Wizard questions
SUMMARY$
$CLASSPATH_ JAR files used in the scan, one relative path per line
LISTING$
$FILE_LISTING$ List of files scanned, each file in format <relative file path> # Lines #
kb <timestamp>
$LIBDIR_ Libdirs specified for the scan, one relative path per line
LISTING$
$PROJECT_NAME$ Build ID
Variable Description
$PROPERTIES$ Complete list of properties set for the analysis phase (same format as project
summary)
$RESULTS_ Complete certification detail with a list of validity on a per file basis (same
CERTIFICATION$ format as project summary)
$RULEPACKS$ Complete list of Rulepacks used for the analysis (same format as project
summary)
$SCAN_DATE$ Date of analysis with the default format style for the locale
$VERSION_ Label of the scanned project (available only if the Fortify Static Code Analyzer
LABEL$ -build-label option was used in the scan)
In the previous example, the Results Outline section contains two subsections. The first subsection
is a text subsection named Overall number of results. The section subsection is a results list
named Vulnerability Examples by Category. A section can contain multiple subsections.
<SubSection enabled="true">
<Title>Overall number of results</Title>
<Description>Results count</Description>
<Text>The scan found $TOTAL_FINDINGS$ issues.</Text>
</SubSection>
In this example, the text subsection is titled Overall number of results. The description text to
describe the purpose of the text is Results count. The text in the text field that the user can edit
before running a report uses one variable named $TOTAL_FINDINGS$.
<SubSection enabled="true">
<Title>Vulnerability Examples by Category</Title>
<Description>Results summary of the highest severity issues.
Vulnerability examples are provided by category.</Description>
<IssueListing limit="1" listing="true">
<Refinement>[fortify priority order]:critical OR
[fortify priority order]:high</Refinement>
<Chart chartType="list">
<Axis>Category</Axis>
</Chart>
</IssueListing>
</SubSection>
In this example, the results list subsection is titled Vulnerability Examples by Category. The
description text to describe the purpose of the subsection is Results summary of the highest
<SubSection enabled="true">
<Title>New Issues</Title>
<Description>A list of issues discovered since the previous
analysis.</Description>
<Text>The following issues have been discovered since the
last scan.</Text>
<IssueListing limit="-1" listing="false">
<Refinement />
<Chart chartType="pie">
<Axis>New Issue</Axis>
</Chart>
</IssueListing>
</SubSection>
In this subsection, a chart (limit="-1" listing="false") has the title New Issues and a text
section that contains the text The following issues have been discovered since the
last scan. This chart includes all issues (the Refinement element is empty) and groups the issues on
the value of New Issues (the value of the Axis element). This chart is displayed as a pie chart
(chartType="pie").
Username/Password Type your Fortify Software Security Center user name and password.
Authentication Token In the Token box, specify the decoded value of a Fortify Software
Security Center authentication token of type ToolsConnectToken.
Note: For instructions about how to create an authentication
token from Fortify Software Security Center, see the Micro Focus
Fortify Software Security Center User Guide.
Kerberos SSO Fortify Software Security Center must be configured to use SPNEGO-
based Kerberos authentication.
Note: Support for Kerberos SSO is limited to Windows systems.
Note: Automatic synchronization requires that you specify an application version that already
exists in Fortify Software Security Center. If the application version does not exist in Fortify
Software Security Center, you must first create it. For instructions, see the Micro Focus Fortify
Software Security Center User Guide.
Scheduling Synchronization
You can customize which action synchronizes your local version of the project with the server. For
example, you can specify that synchronization only occurs when you merge or scan a project.
To customize when synchronization occurs:
1. Right-click a project.
2. Select Properties.
3. Select Fortify Project Properties.
4. You can schedule synchronization for either the current project or the workspace:
l To schedule synchronization for only the current project, select Enable project specific
settings.
l To schedule synchronization for the workspace, click Configure Workspace Settings.
5. Select the Synchronize Options tab.
6. Select the options that you want to exclude from automatic synchronization.
7. Click OK.
The default filter set from the template is loaded at startup, regardless of the setting. This would also
happen, for example, with any FPR files downloaded from the Fortify on Demand Server.
To resolve this, do one of the following:
l To apply the default filter set from the current issue template, click Cancel.
l To update the issue template for the project, click Update Issue Template.
After you select Update Issue Template, some of the filter sets that were available before the
update, for example Developer View and Critical Exposure, are no longer available.
A warning is displayed to let you know that you cannot undo the update.
l To ensure that the default filter set for the project is never overridden, click Never Override Default
Filter Set.
Note: Issues are not merged. Merged results include only the issues found in the latest scan. Issues
uncovered in the older scan that were not uncovered in the latest scan are marked as Removed and
are hidden by default.
Make sure that the projects you merge contain the same analysis information. That is, make sure that
the scans were performed on the same source code (no missing libraries or files), the Micro Focus
Fortify Static Code Analyzer settings were the same, and the scan was performed using the same
security content.
To merge projects:
1. Open a project in the Eclipse Complete Plugin.
2. Select Fortify > Merge Audit Projects.
3. Select an audit project (FPR file), and then click Open.
The Progress Information dialog box opens. When complete, the Merge dialog box opens.
4. Click Yes to confirm the number of issues added or removed from the file.
Note: If the scan is identical, no issues are added or removed.
The project now contains all audit data from both result files.
Note: If you created any custom tags or filter sets for your project's issue template, you must first
commit them to Fortify Software Security Center before you upload the project so that information
is also uploaded. See "Committing Custom Tags to Fortify Software Security Center" on page 105
and "Committing Filter Sets and Folders" on page 96 for more information.
Note: By default, Micro Focus Fortify Software Security Center does not allow you to upload scans
performed in quick scan mode. However, you can configure your Fortify Software Security Center
application version so that uploaded audit projects scanned in quick scan mode are processed. For
more information, see analysis results processing rules in the Micro Focus Fortify Software Security
Center User Guide.
enables you to quickly change the sorting and visibility of the issues you are auditing. For example, the
default issue template used in the interface provides two filter sets. These filter sets provide an
increasingly restrictive view of security-related issues. Defining multiple filter sets for an audit project
enables different views for different users, and a customized view does not affect any other views.
In addition to providing sorting and filtering mechanisms, you can also customize the auditing process
by defining custom tags in the issue template. Auditors associate custom tags with issues during
auditing. For example, you can use custom tags to track impact, severity, or priority of an issue using the
same names and values used to track these attributes in other systems, such as a bug tracker
application.
Issue templates contain the following settings:
l Folder filters—Control how issues are sorted into the folders
l Visibility filters—Control which issues are shown and hidden
l Custom tags—Specify which audit fields are displayed and the values for each
The issue template applied to an audit project is determined using the following preference order:
1. Template that exists in the audit project
2. Template <eclipse_install_dir>/plugins/com.fortify.dev.ide.eclipse_
<version>/Core/config/filters/defaulttemplate.xml
3. Template <eclipse_install_dir>/plugins/com.fortify.dev.ide.eclipse_
<version>/Core/config/rules/defaulttemplate.xml
4. Embedded Fortify default template
Note: To find the filter that directed the issue to the folder, right-click the issue, and then select
Why is this issue here? To find the filter that hid an issue, right-click the issue, and then select
Why is this issue hidden?
l To create a folder filter, select Set Folder to, and then select the folder name or select Other
Folder to add an existing folder or create a new one.
A new folder is displayed in this filter set only.
6. Click Create Filter.
The wizard places the new filter at the end of the filter list. For folder filters, this gives the new filter
the highest priority. Issues that match the new folder filter appear in the targeted folder.
7. (Optional) For folder filters, drag the filter higher in the folder filter list to change the priority.
The issues are sorted with the new filter.
3. Right-click Visibility Filters or Folder Filters, and then select Create New Filter.
The Create Filter dialog box opens.
The third list contains the possible values for the attribute.
6. Select a value or specify a range as instructed in the If line.
7. Set Then to one of the following options:
l To create a visibility filter, select Hide Issue.
l To create a folder filter, select Set Folder to, and then select the folder name or select Other
Folder to add a folder from another filter set or create a new folder.
8. Click Save.
The new filter is displayed at the end of the list. For folder filters, this gives the new filter the
highest priority. Issues that match the new folder filter appear in the targeted folder.
9. (Optional) For folder filters, drag the filter higher in the folder filter list to change the priority.
The issues are sorted with the new filter.
For information about logging into Fortify Software Security Center, see "Logging in to Fortify
Software Security Center" on page 86.
The Update Existing Issue Template or Add Issue Template dialog box opens, depending on
whether the issue template already exists in Fortify Software Security Center.
6. Do one of the following:
a. To upload filter sets and folders to the issue template, click Yes.
b. To add the issue template that contains the current set of custom tags to Fortify Software
Security Center, click Yes.
If the current issue template does not exist on Fortify Software Security Center, do the following:
a. In the Issue Template column, select an issue template name.
b. Click OK.
6. The Eclipse Complete Plugin downloads the filter sets and folders from the selected issue template
on Fortify Software Security Center, and overwrites your current issue template.
Managing Folders
Folders are logical sets of issues that are defined by the filters in the active filter set. Even though a
folder can appear in more than one filter set, the contents might differ depending on the filters in that
filter set that target the folder. To accommodate filter sets that provide sorting mechanisms with little
overlap, you can have filter sets with different folders. Folders are defined independent of the filter sets
they may appear in. For example, a filter set might place low priority issues into a red folder that is
labeled "Hot."
Creating a Folder
You can create a new folder so that you can display a group of issues you have filtered to the folder.
Folders must have unique names.
To create a new folder:
1. Select Fortify > Project Configuration.
2. Click the Folders tab.
The Folders panel on the left lists the folders for the filter set selected in the Folder for Filter Set
list. Fields on the right show the name, color, and description of the selected folder.
3. To associate the folder with an existing filter set, select the filter set from the Filter Set list.
Select (All Folders) to create a new folder in the issue template without associating the folder to a
specific filter set. You can associate the folder with an existing filter set later.
Note: Selecting a filter set updates the Folders list to display the folders that are associated
with the selected filter set.
4. To add a folder:
a. Next to Folders, click Add Folder .
The Add Folder dialog box opens.
Note: If you have created folders in other filter sets, the Add New Folder to Filter Set
dialog box opens. Click Create New.
b. Type a unique name for the new folder, and then select a folder color.
c. Click OK.
The folder is added to the bottom of the folder list.
5. In the Description box, type a description for the new folder.
6. To change the tab position of the folder on the Static Analysis Results view, drag the folder up
or down in the Folders list.
The top position is on the left and the bottom position is on the right.
7. To put all issues that do not match a folder filter into this folder, select the Default Folder check
box.
8. Click OK.
The folder is displayed as a tab with the other folders. If you selected default, all issues that do not
match a folder filter are displayed. The new folder is added to the issue template for the audit project.
Note: To display issues in this folder, create a folder filter that targets the new folder. For more
information, see "Creating a Filter from the Static Analysis Results View" on page 94 and "Creating a
Filter from the Issue Auditing View" on page 95.
5. Select the folder to add to the selected filter set, and then click Select.
6. Click OK.
The folder is displayed as a tab along with the other folders.
Renaming a Folder
You can rename a folder. Modifying the name of a folder is a global change reflected in all filter sets.
To rename a folder:
1. Select Fortify > Project Configuration.
2. Click the Folders tab.
3. In the Filter Set list, select (All Folders).
4. Select the folder in the Folders list.
The folder properties are displayed on the right.
5. Type the new name for the folder.
The folder name changes in the Folders list as you type.
6. Click OK.
The new folder name displays on the tabs.
Removing a Folder
You can remove a folder from a filter set without removing it from other filter sets.
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 100 of 121
User Guide
Chapter 2: Using the Eclipse Complete Plugin
To remove a folder:
1. Select Fortify > Project Configuration.
2. Click the Folders tab.
3. Select a filter set from the Filter Set list.
The Folders list displays the folders in the selected filter set.
4. Select the folder, and then next to Folders, click Delete Folder .
Note: The folder is removed only from the selected filter set.
If the folder is a target of a folder filter, the Conflicts Occurred Removing Folder dialog box opens.
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 101 of 121
User Guide
Chapter 2: Using the Eclipse Complete Plugin
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 102 of 121
User Guide
Chapter 2: Using the Eclipse Complete Plugin
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 103 of 121
User Guide
Chapter 2: Using the Eclipse Complete Plugin
selected.
l To allow only administrators, security leads, and managers to set this tag on an issue, select the
Restricted check box.
l Type a description of the custom tag in the Description box.
l For a list-type tag, from the Default Value list, select the default value for the tag.
If you do not specify a default value, the default is null.
8. To add a value for a list-type tag, do the following:
a. From the Tags list, select the tag name.
b. Next to Values, click Add Value .
c. In the Enter Value dialog box, type a value, and then click OK.
d. Type a description of the value in the Description box.
e. Repeat steps a through d for each additional value required for the new tag.
9. To make this custom tag the primary tag:
Note: You can only set a list-type tag as a primary tag.
Note: If you hide a custom tag that was set for any issues, that tag and values are hidden from the
issue. If you make the tag available again, the tag and values are restored.
You cannot hide the primary tag.
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 104 of 121
User Guide
Chapter 2: Using the Eclipse Complete Plugin
This action hides the tag from your available custom tags. You can make this tag available again
when you add a custom tag (see "Adding a Custom Tag" on page 102).
5. Click OK.
If you hide a tag that has an associated filter, you are prompted to delete the filter.
Center:
o To upload the custom tags to the global pool and assign them to the application version,
click Yes.
o To upload the custom tags to the global pool without assigning them to the application
version, click No.
o To prevent uploading the custom tags to Fortify Software Security Center, click Cancel.
l If the issue template does not exist on Fortify Software Security Center:
o To upload the custom tags to the global pool only on Fortify Software Security Center, click
Yes.
o To prevent uploading the custom tags to Fortify Software Security Center, click No.
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 105 of 121
User Guide
Chapter 2: Using the Eclipse Complete Plugin
For information about logging into Fortify Software Security Center, see "Logging in to Fortify
Software Security Center" on page 86.
The Custom Tag Download dialog box opens.
6. If the application version and the issue template both exist on Fortify Software Security Center,
select either Application Version or Issue Template to specify from where to download the
custom tags.
7. To download custom tags from the issue template, click Yes.
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 106 of 121
User Guide
Chapter 2: Using the Eclipse Complete Plugin
The filter sets, custom folders, and custom tags are updated.
Note: You can also click Reset to Default to return the settings to the default issue template.
Troubleshooting
The following topics provide information on how to troubleshoot problems you might encounter
working with the Eclipse Plugin and how to report an issue to Micro Focus Fortify Customer Support.
where <nnn> is the amount of memory you are allocating to the IDE. For example, to allocate 300 MB to
the IDE, specify -Xmx300M.
If you specify this option, make sure that you do not allocate more memory than is physically available.
As a guideline, assuming no other memory-intensive processes are running, allocate no more than two
thirds of the available memory.
Choose Limit to limit the number of issues to the maximum or Save All to save all the removed issues.
The maximum number of removed issues <RemovedIssuesLimit> is controlled by the
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 107 of 121
User Guide
Chapter 2: Using the Eclipse Complete Plugin
Scanning <sca_install_dir>/Core/config
com.fortify.Debug If set to true, all the Fortify Static Code Analyzer tools run
in debug mode.
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 108 of 121
User Guide
Chapter 2: Using the Eclipse Complete Plugin
For help diagnosing the problem, provide the log files to Micro Focus Fortify Customer Support. On
Windows systems, the default log file locations are in the following directories:
l C:\Users\<username>\AppData\Local\Fortify\sca<version>\log
l C:\Users\<username>\AppData\Local\Fortify\Eclipse.Plugin-<version>\log
On Linux and macOS systems, the default log file locations are in the following directories:
l <userhome>/.fortify/sca<version>/log
l <userhome>/.fortify/Eclipse.Plugin-<version>/log
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 109 of 121
Chapter 3: Using the Eclipse Remediation
Plugin
This chapter provides an overview of the Eclipse Remediation Plugin, instructions on how to install the
plugin, and how to use the plugin to audit issues associated with your Micro Focus Fortify Software
Security Center applications.
Use the Eclipse Remediation Plugin to download audit results for your code from Fortify Software
Security Center so that you can resolve security-related issues in Eclipse.
This section contains the following topics:
Installing the Eclipse Remediation Plugin 110
Uninstalling the Eclipse Remediation Plugin from Eclipse 112
Opening a Fortify Software Security Center Application Version 112
Remediation View 114
Locating the Source Code Associated with Issues 118
Eclipse Remediation Plugin Reports 119
Note: You do not need to specify a Fortify license file for the Eclipse Remediation Plugin. It uses the
license file for Micro Focus Fortify Software Security Center, with which it works.
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 110 of 121
User Guide
Chapter 3: Using the Eclipse Remediation Plugin
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 111 of 121
User Guide
Chapter 3: Using the Eclipse Remediation Plugin
5. Do the following:
a. In the Name box, type a name for the update site.
b. In the Location box, type the URL for the update site.
c. Click OK.
In the Install window, the Work with list displays the update site you specified and the Eclipse
Remediation Plugin node is listed as available software.
6. Click Select All and then click Next.
7. To view version and copyright information about the plugin in the Details box, click the plugin
name.
8. Click Next.
9. On the Review Licenses step, review and accept the terms of the Micro Focus license agreement.
10. Click Finish.
11. To complete the installation, click Yes to restart Eclipse when prompted.
After Eclipse restarts, the menu bar displays the Fortify menu.
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 112 of 121
User Guide
Chapter 3: Using the Eclipse Remediation Plugin
If your server is behind a proxy, you must provide the proxy server and port as follows:
1. Select Fortify > Options.
2. In the Server URL box, type the URL for your Fortify Software Security Center server (for
example, http://my.domain.com:8080/ssc).
3. Type the proxy address and port number.
4. Click OK.
Note: The Fortify Software Security Center that you connect to from the Eclipse Remediation
Plugin must be running continuously during your work session in Eclipse.
To connect to Fortify Software Security Center and open an application in the Eclipse Remediation
Plugin:
1. Select Fortify > Connect to Software Security Center.
2. From the Login Method menu, select the login method set up for you on Fortify Software Security
Center.
Depending on the selected login method, do one of the following:
Username/Password Type your Fortify Software Security Center user name and password.
Authentication Token In the Token box, specify the decoded value of a Fortify Software
Security Center authentication token of type ToolsConnectToken.
Note: For instructions about how to create an authentication
token from Fortify Software Security Center, see the Micro Focus
Fortify Software Security Center User Guide.
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 113 of 121
User Guide
Chapter 3: Using the Eclipse Remediation Plugin
The Eclipse Remediation Plugin downloads the application version content from Fortify Software
Security Center.
Remediation View
The Eclipse Remediation Plugin provides the security issues related to an opened application version.
Issues are organized based on settings in Micro Focus Fortify Software Security Center.
The Remediation View displays all project issues, organized in folders (colored tabs). To the right of
the issues list are four tabs that provide information specific to a selected issue in the issues list on the
left.
Issues List
Micro Focus Fortify Software Security Center organizes issues into folders (tabs) based on the filter
sets specified in the issue template. After you select an application version to open, the Eclipse
Remediation Plugin downloads the issues for that application version and displays the Remediation
View at the bottom of the Eclipse window.
The left portion of the Remediation View lists any issues assigned to you, grouped by issue category.
The issues are grouped into the following color-coded folders (tabs):
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 114 of 121
User Guide
Chapter 3: Using the Eclipse Remediation Plugin
l The Critical folder contains issues that have a high impact and a high likelihood of exploitation.
Remediate critical issues immediately.
l The High folder contains issues that have a high impact and a low likelihood of exploitation.
Within each color-coded folder, issues are grouped into subfolders. At the end of each folder name,
enclosed in brackets, is the number of audited issues and the total number of issues in the folder. For
example, Command Injection - [2 / 2] indicates that two out of two issues categorized as Command
Injection have been audited.
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 115 of 121
User Guide
Chapter 3: Using the Eclipse Remediation Plugin
1. To list a specific issue type, at the top right of the Remediation View, click the View Menu icon ,
click Issue Visibility, and then select (or deselect) one of the following options:
l To display all issues that are excluded from display by visibility filters in filter sets such as the
Audit Tab
The Audit tab provides the following information for the selected issue:
l User assigned to the issue (if set)
l Analysis tag value
l Any custom tags defined for the application in Micro Focus Fortify Software Security Center
l Comments added for the issue (bottom left)
l Information (abstract) about the selected issue (top right)
l Analysis trace that the analyzer used to produce the results file (bottom right). For a description of
the analysis trace, see "Analysis Trace View" on page 43.
To update the audit results at any time with Fortify Software Security Center, click Refresh .
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 116 of 121
User Guide
Chapter 3: Using the Eclipse Remediation Plugin
For text-type custom tags, you can click Edit Text to see and edit long text strings. This tag
accepts up to 500 characters (HTML/XML tags and newlines are not allowed).
For date-type custom tags, you can click to select a date from a calendar.
Recommendations Tab
The Recommendations tab provides suggestions and examples on how to secure a vulnerability or
remedy a bad practice. The following table describes the information on this tab.
Tips/Custom Tips Tips for particular types of issues, including any custom tips defined for
your organization.
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 117 of 121
User Guide
Chapter 3: Using the Eclipse Remediation Plugin
Details Tab
The Details tab provides an abstract of the issue, a detailed explanation, and examples. The following
table describes the information on this tab.
Explanation/Custom Descriptions of the conditions in which the selected issue type occurs. This
Explanation includes a discussion of the vulnerability, the constructs typically associated
with it, ways in which it can be exploited, and the potential ramifications of an
attack. This section also provides custom explanations defined by your
organization.
Primary Rule ID Identifies the primary rule used to find the issue
Remediation Effort The relative amount of effort required to fix and verify an issue.
History Tab
The History tab displays a complete list of audit actions, including details such as the time and date, and
the name of the user who modified the issue.
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 118 of 121
User Guide
Chapter 3: Using the Eclipse Remediation Plugin
1. Make sure that you have the same application version open in both Eclipse and the Eclipse
Remediation Plugin.
Note: The name of the Eclipse project and the Micro Focus Fortify Software Security Center
application must be the same.
2. Select an issue in the issue tree or select a line in the analysis trace section of the Remediation
View.
Eclipse displays the associated line of code.
Generating Reports
To generate a report:
1. Select Fortify > Generate Report.
2. If prompted, provide your Fortify Software Security Center credentials.
3. Select an application version and then click OK.
The Software Security Center Report Generation dialog box opens.
4. Select a report type from the list.
5. Select the template version and the options you want to include in the report.
Note: The template version and options vary depending on the report type selected.
6. To specify the file name for the report and select the report format (PDF, DOC, or XLS), click
Report details.
The default report format is PDF.
7. Click Generate.
8. Navigate to where you want to save the report and click Save.
The report is generated and saved in the format you selected.
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 119 of 121
User Guide
Chapter 3: Using the Eclipse Remediation Plugin
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 120 of 121
Send Documentation Feedback
If you have comments about this document, you can contact the documentation team by email.
Note: If you are experiencing a technical issue with our product, do not email the documentation
team. Instead, contact Micro Focus Fortify Customer Support at
https://www.microfocus.com/support so they can assist you.
If an email client is configured on this computer, click the link above to contact the documentation team
and an email window opens with the following information in the subject line:
Feedback on User Guide (Fortify Plugins for Eclipse 20.2.0)
Just add your feedback to the email and click send.
If no email client is available, copy the information above to a new message in a web mail client, and send
your feedback to FortifyDocTeam@microfocus.com.
We appreciate your feedback!
Micro Focus Fortify Plugins for Eclipse (20.2.0) Page 121 of 121