VS Ext Guide 20.2.0
VS Ext Guide 20.2.0
VS Ext Guide 20.2.0
User Guide
Legal Notices
Micro Focus
The Lawn
22-30 Old Bath Road
Newbury, Berkshire RG14 1QN
UK
https://www.microfocus.com
Warranty
The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in
the express warranty statements accompanying such products and services. Nothing herein should be construed as
constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained
herein. The information contained herein is subject to change without notice.
Copyright Notice
© Copyright 2009 - 2020 Micro Focus or one of its affiliates
Trademark Notices
All trademarks, service marks, product names, and logos included in this document are the property of their respective
owners.
Documentation Updates
The title page of this document contains the following identifying information:
l Software Version number
l Document Release Date, which changes each time the document is updated
l Software Release Date, which indicates the release date of this version of the software
This document was produced on November 03, 2020. To check for recent updates or to verify that you are using the most
recent edition of a document, go to:
https://www.microfocus.com/support/documentation
Contents
Preface 7
Contacting Micro Focus Fortify Customer Support 7
For More Information 7
About the Documentation Set 7
Change Log 8
Chapter 1: Introduction 10
Fortify Extension for Visual Studio 10
Fortify Security Content 11
Installation 11
Upgrades 12
Related Documents 12
All Products 12
Micro Focus Fortify ScanCentral SAST 13
Micro Focus Fortify Software Security Center 13
Micro Focus Fortify Static Code Analyzer 14
Preface
l Download software
https://www.microfocus.com/support
Change Log
The following table lists changes made to this document. Revisions to this document are published
between software releases only if the changes made affect product functionality.
Software Release /
Document Version Changes
20.2.0 Updated:
l "Logging in to Fortify Software Security Center" on page 16 - New
ability to connect to Fortify Software Security Center with an
authentication token
l "Updating Security Content" on page 19 - New option to update
Fortify Security Content in different languages
l "Configuring Advanced Scan Options" on page 23 - New option to
specify a custom build ID for the scan
l "Adding a Custom Tag" on page 53 - New ability to make a custom tag
the primary tag
l "BIRT Reports" on page 61 - Added a description of a new
report: OWASP ASVS 4.0
l "Remediating Results from Fortify Software Security Center" on
page 77 - Edited to reflect minor user interface changes
l Replaced all references to Micro Focus Fortify ScanCentral with the
new product name: Micro Focus Fortify ScanCentral SAST
20.1.0 Updated:
l Replaced all references to Micro Focus Fortify CloudScan with the new
product name: Micro Focus Fortify ScanCentral SAST
l "BIRT Reports" on page 61 - Added a description of a new
report: CWE Top 25 2019
19.2.0 Added:
l "About Scanning Remotely" on page 24, "Configuring Remote Scan
Options" on page 25, and "Scanning Projects or Solutions Remotely"
on page 27 - You can now offload scanning to Fortify ScanCentral
SAST
Software Release /
Document Version Changes
Updated:
l "Issue Auditing Window" on page 33 - Tab names changed for
consistency with Fortify Software Security Center
l "BIRT Reports" on page 61 - Support added for GDPR, MISRA, and
PCI SSF Compliance: Secure Software Requirements reports
l "Filing Bugs to Azure DevOps Server" on page 75 - Updated for
support with Azure DevOps Server
l "Configuring a Connection to Fortify Software Security Center" on
page 16 and "Customizing Issue Visibility" on page 82 - Options for
remediation were moved to the Fortify extension Options menu
The Fortify Extension for Visual Studio uses Micro Focus Fortify Static Code Analyzer and Fortify
Secure Coding Rulepacks to locate security vulnerabilities in your solutions and projects (includes
support for the following languages: C/C++, C#, Visual Basic (VB.NET), and ASP.NET). The scan results
are displayed in Visual Studio and include a list of issues uncovered, descriptions of the vulnerability
type each issue represents, and suggestions on how to fix them.
Your organization can also use the Fortify Extension for Visual Studio with Micro Focus Fortify
Software Security Center to manage applications and assign specific issues to developers. You can
connect with Fortify Software Security Center to review the reported vulnerabilities and implement
appropriate solutions from Visual Studio.
Installation
You install the Fortify Extension for Visual Studio by selecting the extension during the Micro Focus
Fortify Static Code Analyzer and Applications installation (which includes Audit Workbench and other
plugins that you can install). For installation instructions, see the Micro Focus Fortify Static Code
Analyzer User Guide.
During the Fortify Static Code Analyzer installation, make sure that you select the extension that
corresponds to the Visual Studio version installed on your system.
If you plan to scan your code from Visual Studio, make sure that you select the Update security
content after installation? check box at the end of the Micro Focus Fortify Static Code Analyzer and
Applications installation unless your administrator has set up an alternative way to deliver Fortify
Security Content to you (see "Manually Updating Security Content" on page 20).
Upgrades
After you install the Fortify Extension for Visual Studio, when you subsequently upgrade Micro Focus
Fortify Static Code Analyzer and select to also install the Fortify Extension for Visual Studio, the new
version of the extension is automatically upgraded. You can upgrade Fortify Static Code Analyzer
(along with Audit Workbench and any plugins you have installed) manually or automatically from Audit
Workbench. For instructions, see the Micro Focus Fortify Audit Workbench User Guide.
Related Documents
This topic describes documents that provide information about Micro Focus Fortify software products.
Note: You can find the Micro Focus Fortify Product Documentation at
https://www.microfocus.com/support/documentation. All guides are available in both PDF and
HTML formats.
All Products
The following documents provide general information for all products. Unless otherwise noted, these
documents are available on the Micro Focus Product Documentation website.
About Micro Focus Fortify Product This paper provides information about how to access Micro
Software Documentation Focus Fortify product documentation.
About_Fortify_Docs_<version>.pdf Note: This document is included only with the product
download.
Micro Focus Fortify Software System This document provides the details about the
Requirements environments and products supported for this version of
Fortify Software.
Fortify_Sys_Reqs_<version>.pdf
Micro Focus Fortify Software Release This document provides an overview of the changes made
Notes to Fortify Software for this release and important
information not included elsewhere in the product
FortifySW_RN_<version>.pdf
documentation.
What’s New in Micro Focus Fortify This document describes the new features in Fortify
Software <version> Software products.
Fortify_Whats_New_<version>.pdf
Micro Focus Fortify ScanCentral This document provides information about how to install,
SAST Installation, Configuration, and configure, and use Fortify ScanCentral SAST to streamline
Usage Guide the static code analysis process. It is written for anyone who
intends to install, configure, or use Fortify ScanCentral
SC_SAST_Guide_<version>.pdf
SAST to offload the resource-intensive translation and
scanning phases of their Fortify Static Code Analyzer
process.
Micro Focus Fortify Software Security This document provides Fortify Software Security Center
Center User Guide users with detailed information about how to deploy and
use Software Security Center. It provides all of the
SSC_Guide_<version>.pdf
information you need to acquire, install, configure, and use
Software Security Center.
It is intended for use by system and instance
administrators, database administrators (DBAs), enterprise
security leads, development team managers, and
developers. Software Security Center provides security
team leads with a high-level overview of the history and
current status of a project.
Micro Focus Fortify Static Code This document describes how to install and use Fortify
Analyzer User Guide Static Code Analyzer to scan code on many of the major
programming platforms. It is intended for people
SCA_Guide_<version>.pdf
responsible for security audits and secure coding.
Micro Focus Fortify Static Code This document provides the information that you need to
Analyzer Custom Rules Guide create custom rules for Fortify Static Code Analyzer. This
guide includes examples that apply rule-writing concepts to
SCA_Cust_Rules_Guide_<version>.zip
real-world security issues.
l Update your Fortify Security Content from Fortify Software Security Center
The following sections describe how to configure a connection to the Fortify Software Security Center
server, the different ways to login to Fortify Software Security Center and how to synchronize your
work on audit projects with Fortify Software Security Center.
2. To save your login information, select the Save login method check box.
The Fortify Extension for Visual Studio saves your login information for all future use of this
extension until you install a new Fortify Extension for Visual Studio.
Username/Password Type your Fortify Software Security Center user name and password.
X.509 SSO Fortify Software Security Center must be configured to use X.509
Certification-based SSO.
Note: Your certificate must be in the current user certificate store
and in the Personal store.
Kerberos SSO Fortify Software Security Center must be configured to use SPNEGO-
based Kerberos authentication.
Note: Support for Kerberos SSO is limited to Windows systems.
4. Either clear the Auto Synchronize all Projects with Server Application check box to disable
automatic synchronization or select it to enable automatic synchronization.
You can customize which action synchronizes your local version project with the server. For instance,
you can customize so that synchronization occurs only when you merge or scan a project.
To customize the actions that trigger synchronization with the server:
1. From the Fortify extension menu, select Options.
2. In the left panel, select Project Settings.
3. Select the Synchronization Options tab.
4. Select any action to exclude from automatic synchronization, and then click OK.
You can also import custom security content from the Fortify Extension for Visual Studio
(see "Importing Custom Security Content" on page 20).
4. If you selected Update from Fortify Software Security Center, do the following:
l Under Software Security Center, specify the Server URL for Fortify Software Security Center
3. (Optional) From the Locale list, select the language you want for the Fortify Security Content.
By default, English is the selected language.
4. Click Update.
If new content is available, it is updated and listed under Installed Fortify Security Content and
Main External List Mappings.
5. Click OK.
Note: To import custom external metadata, place your external metadata file in the <sca_
install_dir>\Core\config\CustomExternalMetadata directory.
1. With a solution open in Visual Studio, select Options from the Fortify extension menu.
2. In the left panel, select Project Settings.
The Project Settings dialog box opens to show the Analysis Configuration tab.
3. To specify the scope of the settings, do one of the following:
l To customize the settings for the projects in the open solution only, select the Enable Project
5. To specify the amount of memory to use for the scan, type an integer in the Memory (MB) box.
Note: Do not allocate more than two thirds of the available physical memory.
6. To customize the security content that you want to use, clear the Use all installed security
content check box, and then select the Secure Coding Rulepacks and any specific custom security
content that you want to use.
7. Click OK.
Note: By default, Micro Focus Fortify Software Security Center ignores uploaded scans performed
in quick scan mode. However, you can configure your Fortify Software Security Center application
version so that uploaded audit projects scanned in quick scan mode are processed. For more
information, see analysis results processing rules in the Micro Focus Fortify Software Security
Center User Guide.
Specific Settings.
l To change the default scan settings for all projects scanned from this Visual Studio instance,
click Configure Defaults.
4. Click the Advanced Scan Options tab.
5. (Optional) In the Build ID box, type a build ID for the scan.
The default build ID is the name of the project or solution.
6. Select Use additional SCA options and type command-line options for either the translation or
scan phase.
Note: Scan options specified in the Scan box are only used for local scans. To specify scan
options for a remote scan, see "Configuring Remote Scan Options" on page 25.
l To scan at the project level, select a project, and then select Analyze Project from the Fortify
extension menu.
Note: The Analyze Project command is not available for web site projects. To analyze a web
site project, choose Analyze Solution.
After the scan has finished, the Fortify Extension for Visual Studio displays the results in the auditing
interface.
You can now audit the results in Visual Studio. For information, see "Auditing Issues" on page 50. If the
codebase was audited before, results from the previous audit are automatically integrated with the new
analysis results.
Note: Micro Focus Fortify Static Code Analyzer runs scans in a Java Virtual Machine (JVM).
l Ensure that you have the same Fortify Security Content version on the local system for translation
and on the Fortify ScanCentral SAST sensor
To send the scan results to a Micro Focus Fortify Software Security Center server, you need the
following:
l Authentication token of type ScanCentralCtrlToken
For instructions on how to create an authentication token, see the Micro Focus Fortify Software
Security Center User Guide.
l An application and application version that exists in Fortify Software Security Center
l Permission to access the application and application version to which you want to upload
4. In the Controller URL box, type the URL for the ScanCentral Controller.
Example: https://<controller_host>:<port>/scancentral-ctrl
Note: The Fortify ScanCentral SAST Controller URL is not required if you specified a Fortify
Software Security Center URL in the Server Configuration options. Fortify Extension for
Visual Studio automatically determines the ScanCentral Controller that is associated with
Fortify Software Security Center.
5. (Optional) In the Pool UUID box, type the UUID for the sensor pool to which the ScanCentral
Controller will submit the job.
If no pool UUID is specified, the default sensor pool is used. For information about how to obtain a
sensor pool UUID, see the Micro Focus Fortify Software Security Center User Guide.
6. (Optional) in the Notification Email box, type an email address to receive job status notifications.
7. (Optional) In the Scan Options box, type any Fortify Static Code Analyzer scan command-line
options.
For information about the available scan options and the proper syntax, see the Micro Focus
Fortify Static Code Analyzer User Guide.
8. (Optional) To upload the scan results to Fortify Software Security Center, do the following:
a. Select the Send Scan Results to SSC check box.
b. In the Controller Token box, paste the decoded token string for an authentication token of
type ScanCentralCtrlToken.
Filter Sets
The selected filter set controls which issues the Analysis Results window displays. The filter set
determines the number and types of containers (folders) and how and where issues are displayed.
Each project can have unique sets because the filter sets are saved in an audit project results file.
The filter sets sort the issues into Critical, High, Medium, and Low folders, based on potential severity.
All default filter sets have the same sorting mechanism.
The Fortify Extension for Visual Studio provides the following filter sets:
l Quick View—This is the default filter set for new projects. The Quick View filter set provides a view
only of issues in the Critical folder (these have a potentially high impact and a high likelihood of
occurring) and the High folder (these have a potentially high impact and a low likelihood of
occurring). The Quick View filter set provides a useful first look at results that enables you to quickly
address the most serious issues.
l Security Auditor View— This view shows all security issues detected. The Security Auditor View
filter contains no visibility filters, and therefore all issues are shown.
If you open an FPR file that contains no custom filtertemplate.xml file or if you open an FVDL file
or a webinspect.xml file, the audit project results open with the Quick View filter set selected.
For information about how to create your own filter sets, see "Creating a Filter Set" on page 56.
Folders (Tabs)
The tabs on the Analysis Results window are called folders. You can customize the settings for the
color-coded folders. The number of folders, names, colors, and the issue list can vary between filter sets
and audit projects. For information about how to create your own folders, see "Creating a Folder" on
page 58.
Within each color-coded folder, issues are grouped into subfolders. At the end of each folder name,
enclosed in brackets, is the number of audited issues and the total number of issues in the folder. For
example, a folder with the name Command Injection - [1 / 3] indicates that one issue out of three
categorized as Command Injection has been audited.
Each folder contains a list of issues. An issue is sorted into a folder if its attributes match the folder filter
conditions. One folder in each filter set is the default folder, indicated by (default) in the folder name.
If an issue does not match any of the folder filters, the issue is listed in the default folder.
Note: To show or hide suppressed, hidden, and removed issues, use the Visibility menu . For
more information, see "Customizing the Issues Display" below.
Group By List
The Group By option sorts the issue list into subfolders. The selected option is applied to all visible
folders. Use the <none> option to list all issues in the folder without any groups. The Group By settings
are for the application instance. You can apply the Group By option to any audit project opened with
that instance of the application.
You can customize the existing groups by changing which attributes the groups are sorted by, adding
or removing the attributes to create sub-groupings, and adding your own group options.
The following table describes the information provided on the Project Summary tabs.
Tab Description
Certification Displays the result certification status. Results certification is a check to make
sure that the analysis has not been altered since Fortify Static Code Analyzer
produced it.
Tab Description
and the date of the scan, which might be different than the date the files
were translated
l List of files scanned with file sizes and timestamps
l Libraries referenced for the scan
Analysis Information Displays the Fortify Static Code Analyzer version, computer details, and the
name of the user who performed the scan. The Analysis Information subtabs
contain the following information:
l Security Content—Lists information about the Rulepacks (including the
Rulepack name, version, ID, and SKU) and the external metadata used in
the scan
l Properties—Displays the Micro Focus Fortify Static Code Analyzer
properties files settings
l Commandline Arguments—Displays the command-line options used to
scan the project
l Warnings—Lists all errors and warnings that occurred during the analysis.
To view more information about an item, click it.
This trace is presented in sequential order. For dataflow issues, this trace is a presentation of the path
that the tainted data follows from the source function to the sink function. For example, when you
select an issue that is related to potentially tainted dataflow, the Analysis Trace window shows the
direction of the dataflow in this section of the source code.
The Analysis Trace window uses the icons described in the following table to show how the dataflow
moves in this section of the source code or execution order.
Icon Description
Information is read from a source external to the code (HTML form, URL, and so on)
A comparison is made
Passthrough, tainted data passes from one parameter to another in a function call
A pointer is created
A pointer is dereferenced
Icon Description
Generic
Taint change
The Analysis Trace window can contain inductions. Inductions provide supporting evidence for their
parent nodes. Inductions consist of:
l A text node displayed in italics as a child of the trace node. This text node is expanded by default.
l An induction trace, displayed as a child of the text node.
To display the induction reference information for that induction, click it.
Element Description
Issue Displays the issue location, which includes the file name and line number.
Element Description
Analysis Lists values that the auditor can use to assess the issue. Valid values for the
Analysis tag are Not an Issue, Reliability Issue, Bad Practice, Suspicious, and
Exploitable.
<custom_ Displays any custom tags if defined for the audit project.
tagname> If the audit results have been submitted to Audit Assistant in Micro Focus
Fortify Software Security Center, then in addition to any other custom tags,
the tab displays the following tags:
l AA_Prediction—Exploitability level that Audit Assistant assigned to the
issue. You cannot modify this tag value.
l AA_Confidence—Confidence level from Audit Assistant for the accuracy
of its AA_Prediction value. This is a percentage, expressed in values that
range from 0.000 to 1.000. For example, a value of 0.982 indicates a
confidence level of 98.2 percent. You cannot modify this tag value.
l AA_Training—Whether to include or exclude the issue from Audit
Assistant training. You can modify this value.
For more information about Audit Assistant, see the Micro Focus Fortify
Software Security Center User Guide.
File Bug Provides access to a supported bug tracking system, such as Bugzilla or
Azure DevOps Server.
See the Micro Focus Fortify Software System Requirements document for a
list of supported bug tracking systems.
Rule Information Shows information, such as the category and kingdom that describes the
issue.
l The Details tab provides a detailed description of the selected issue and offers guidelines to address
it.
The Details tab includes some or all the sections described in the following table.
Element Description
Explanation/Custom Provides a description of the conditions in which this type of issue occurs.
Explanation This description includes a discussion of the vulnerability, the constructs
typically associated with it, how it can be exploited, and the potential
ramifications of an attack.
This element also provides custom explanations defined by your
organization.
Primary Rule ID Identifies the primary rule that found the issue.
l The Recommendations tab provides suggestions and examples of how to secure the vulnerability or
remedy the bad practice. The recommendations include some or all the sections described in the
following table.
Element Description
Tips/Custom Tips Provides tips for this type of issue, including any custom tips defined
by your organization.
l The History tab shows a complete list of audit actions, including details such as the date and time,
and the name of the user who modified the issue.
l The Diagram tab presents a graphical representation of the node execution order, call depth, and
expression type of the selected issue. The tab displays information relevant to the rule type. The
vertical axis shows the execution order.
For dataflow issues, the trace starts with the first function to call the taint source, then traces the calls
to the source (blue node), and ends the trace at the sink (red node). In the diagram, the source (src)
and sink nodes are also labeled. A red X on a vertical axis indicates that the function called finished
executing.
The horizontal axis shows the call depth. A line shows the direction that control is passed. If control
passes with tainted data traveling through a variable the line is red, and when it is without tainted
data, the line is black.
The icons used for the expression type of each node in the diagram are the same icons used in the
Analysis Trace window. To see the icons and the descriptions, see "Analysis Trace Window" on
page 31.
l The Filters tab displays all the filters in the selected filter set.
Element Description
Filters Displays a list of the visibility and folder filters configured in the selected filter set
where:
l Visibility Filters show or hide issues
l Folder Filters sort the issues into the folder tabs in the Analysis Results window
Right-click a filter to show issues that match the filter or to enable, disable, copy, or
delete it.
Then Displays the type of the selected filter, where Hide Issue is a visibility filter and Set
Folder to is a folder filter.
For more information about creating filters, see "Creating a Filter from the Filters Tab" on page 57.
Code Editor
The Code Editor shows the section of code related to the issue selected in the Analysis Results window.
When multiple nodes represent an issue in the Analysis Trace window, the Code Editor shows the code
associated with the selected node.
Grouping Issues
The items visible in the navigation tree vary according to which grouping option is selected in the
Analysis Results window. The value you select from the Group By list sorts issues in all visible folders
into subfolders.
To list all issues in a folder without any grouping, select <none>.
You can view issues using any of the Group By options, and you can create and edit customized groups.
The Group By options enable you to group and view the issues in different ways. In practice, you might
switch frequently between various groupings. The following table lists descriptions of the standard
Group By options.
Option Description
Analysis Groups issues by the audit analysis, such as Suspicious, Exploitable, and
Not an Issue.
Analysis Type Groups issues by analyzer product, such as SCA, WEBINSPECT, and
SECURITYSCOPE (WebInspect Agent).
Analyzer Groups issues by analyzer group, such as Control Flow, Data Flow,
Semantic, and Structural.
App Defender Protected Groups issues by whether Application Defender can protect the
vulnerability category.
Category Analyzer A custom group that groups issues by category and then analyzer.
Fortify Priority Order Groups issues as Critical, High, Medium, and Low based on the combined
values of Micro Focus Fortify Static Code Analyzer impact and likelihood.
New Issue Shows which issues are new since the last scan. For example, if you run a
new scan, any issues that are new display in the tree under the New Issue
subfolder and the others are displayed in the Existing Issue subfolder.
Issues not found in the latest scan are displayed in the Removed
subfolder.
Option Description
<metadata_listname> Groups issues using the alternative metadata external list names (for
example, OWASP Top 10 <year>, CWE, PCI <version>, STIG <version>,
and so on).
Package Groups issues by package or namespace. Does not appear for projects for
which this option is not applicable, such as C projects.
Priority by Category A custom group that groups issues by Fortify Priority Order and then by
category.
Sink Groups issues that share the same dataflow sink functions.
Source Groups issues that share the same dataflow source functions.
Taint Flag Groups issues by the taint flags that they contain.
For example, selecting Category Analyzer group type creates a list that has top-level nodes that
contain the category of the issue, such as Buffer Overflow, with the issues grouped below by
analyzer, such as semantic, or dataflow, followed by the issues.
-Buffer Overflow [0/2]
--DataFlow [0/1]
----Main.cs:234
-+Semantic [0/1]
3. To create a custom group by option, select Create New from the Grouping Types list, and then do
the following:
a. In the Create New dialog box, type a group name, and then click OK.
b. From the list on the left, select a grouping type, and then click the right arrow to move the
option to the Grouping Order column.
c. Repeat step b to select additional grouping types.
Comparison Description
equals Searches for an exact match if the term is wrapped in quotation marks ("")
regex Searches for values that match a Java-style regular expression delimited by a
forward slash (/)
Example, /eas.+?/
Note: This search comparison is not available when you remediate audit results
stored on Micro Focus Fortify Software Security Center.
number range Searches for a range of numbers using the standard mathematical interval notation
of parentheses and/or brackets to indicate whether the endpoints are excluded or
included, respectively.
Example: (2,4] indicates greater than two and less than or equal to four
Comparison Description
not equals Excludes issues specified by the string by preceding the string with an exclamation
character (!)
You can further qualify search terms with modifiers. The syntax for using a modifier is
modifier:<search_term>. For more information, see "Search Modifiers" below.
A search string can contain multiple modifiers and search terms. If you specify more than one modifier,
the search returns only issues that match all the modified search terms. For example,
file:ApplicationContext.java category:SQL Injection returns only SQL injection issues
found in ApplicationContext.java.
If you use the same modifier more than once in a search string, then the search terms qualified by those
modifiers are treated as an OR comparison. For example, file:ApplicationContext.java
category:SQL Injection category:Cross-Site Scripting returns SQL injection issues and
cross-site scripting issues found in ApplicationContext.java.
For complex searches, you can also insert the AND or the OR keyword between your search queries.
Note that AND and OR operations have the same priority in searches.
Search Modifiers
You can use a search modifier to specify to which issue attribute the search term applies.
Note: To use a modifier that contains a space in the name, such as the name of the custom tag, you
must enclose the modifier in brackets. For example, to search for issues that are new, type [issue
age]:new.
A search that is not qualified by a modifier matches the search string on the following attributes:
kingdom, primary rule id, analyzer, filename, severity, class name, function name, instance id, package,
confidence, type, subtype, taint flags, category, sink, and source.
l To apply the search to all modifiers, type a string, such as control flow. This searches all the
modifiers and returns any results that contain the string “control flow”.
l To apply the search to a specific modifier, type the modifier name and the string as follows:
analyzer:control flow. This returns all results with the analyzer “control flow”.
The following table lists descriptions of the search modifiers. A few modifiers have a shortened modifier
name indicated in parentheses in the Modifier column. You can use either modifier name.
Modifier Description
accuracy Searches for issues based on the accuracy value specified (0.1
through 5.0).
Modifier Description
analysis Searches for issues that have the specified audit analysis value
such as exploitable, not an issue, and so on.
[analysis type] Searches for issues by analyzer product such as SCA and
WEBINSPECT.
[app defender protected] Searches for issues based on whether Application Defender can
(def) protect the vulnerability category (protected or not
protected).
audited Searches the issues to find true if the primary tag is set and
false if the primary tag is not set. The default primary tag is the
Analysis tag.
confidence (con) Searches for issues that have the specified confidence value. Micro
Focus Fortify Static Code Analyzer calculates the confidence value
based on the number of assumptions made in code analysis. The
more assumptions made, the lower the confidence value.
dynamic Searches for issues that have the specified dynamic hot spot
ranking value.
file Searches for issues where the primary location or sink node
function call occurs in the specified file.
[fortify priority order] Searches for issues that have a priority level that matches the
specified priority determined by the Fortify analyzers. Valid values
are critical, high, medium, and low, based on the expected
Modifier Description
historyuser Searches for issues that have audit data modified by the specified
user.
impact Searches for issues based on the impact value specified (0.1
through 5.0).
[instance id] Searches for an issue based on the specified instance ID.
[issue age] Searches for the issue age, which is new, updated,
reintroduced, or removed.
[issue state] Searches for audited issues based on whether the issue is an open
issue or not an issue (determined by the level of analysis set for
the primary tag).
likelihood Searches for issues based on the specified likelihood value (0.1
through 5.0).
line Searches for issues on the primary location line number. For
dataflow issues, the value is the sink line number. Also see
"sourceline" on the next page.
maxconf Searches for all issues that have a confidence value up to and
including the number specified as the search term.
minconf Searches for all issues that have a confidence greater than or
equal to the specified value.
package Searches for issues where the primary location occurs in the
specified package or namespace. (For dataflow issues, the primary
location is the sink function.)
[primary context] Searches for issues where the primary location or sink node
function call occurs in the specified code context. Also see "sink"
Modifier Description
primary Searches for issues that have the specified primary tag value. By
default, the primary tag is the Analysis tag.
primaryrule (rule) Searches for all issues related to the specified sink rule.
probability Searches for issues based on the probability value specified (1.0
through 5.0).
[remediation effort] Searches for issues based on the remediation effort value
specified. The valid values are whole numbers from 1.0 to 12.0.
ruleid Searches for all issues reported by the specified rule IDs used to
generate the issue source, sink and all passthroughs.
severity (sev) Searches for issues based on the specified severity value (legacy
metadata).
sink Searches for issues that have the specified sink function name.
Also see "[primary context]" on the previous page.
source Searches for dataflow issues that have the specified source
function name. Also see "[source context]" below.
[source context] Searches for dataflow issues that have the source function call
contained in the specified code context.
Also see "source" above and "[primary context]" on the previous
page.
sourcefile Searches for dataflow issues with the source function call that the
specified file contains.
Also see "file" on page 42
sourceline Searches for dataflow issues having taint source entering the flow
on the specified line. Also see "line" on the previous page.
Modifier Description
under review.
taint Searches for issues that have the specified taint flag.
trace Searches for issues that have the specified string in the dataflow
trace.
tracenodeallpaths Searches for the specified value in all the steps of the analysis
trace.
Modifier Description
<metadata_listname> Searches the specified metadata external list (for example, [cwe
top 25 2019], [owasp top ten <year>], [pci dss
<version>], [stig <version>], and others.
When you remediate audit results stored on Micro Focus Fortify Software Security Center, the search
box appears as shown below:
l To select a search term you used previously (during the current session), click the arrow in the search
box, and then select a search term from the list. Fortify Extension for Visual Studio discards saved
search terms after you exit Visual Studio, saved.
Note: Saved search terms are not available when you remediate audit results stored on Fortify
Software Security Center.
The Analysis Results window lists the query results (if any).
Note: Advanced search is not available when you remediate audit results that are stored on Micro
Focus Fortify Software Security Center.
1. To the right of the search box, click the Advanced Search icon .
The Advanced Search dialog box opens.
2. From the first list on the left select a modifier.
If you plan to specify an unqualified search term, select Any Attribute from the modifier list.
3. From the middle list, select a comparison term.
4. In the combo box on the right, either type a search term, or select one from the list.
The search term list includes the known values in the current scan for the specified attribute.
However, you can type any value into this field.
5. To add an AND or OR row to the query, click the Add Criteria icon.
6. To set the operator, click either AND or OR.
7. Specify the modifier, comparison term, and search term.
8. Add as many rows as you need for the search query.
9. To remove a row, to the right of the row, click Delete .
10. To remove all rows, at the bottom of the dialog box, click Clear.
11. To submit your completed search query, click Find.
Note: Find is only enabled after you create a complete search query.
2. Select the settings for the types of issues you want to display.
l In the Audit Guide Filters list, select the types of issues to filter out and ignore.
To see a description on the right side, click an issue type.
As you select items in the Audit Guide Filters list, the Fortify Extension for Visual Studio
displays the filter details for this issue type below the Audit Guide Filters list and shows the
number of issues found by each filter.
4. Click OK to apply your filter selections.
You can also define custom tags from Fortify Software Security Center, either directly with issue
template uploads through Fortify Software Security Center, or through issue templates in audit project
files.
Note: Although you can add new custom tags as you audit a project, if these custom tags are not
defined in Fortify Software Security Center for the issue template associated with the application
version, then the new tags are lost if you upload the audit project (FPR) to Fortify Software
Security Center.
Auditing Issues
To evaluate and assign audit values to an issue or group of issues:
1. Select the issue or group of issues in the Analysis Results window.
For information about the Analysis Results window, see "Analysis Results Window" on page 28.
2. Read the abstract on the Audit tab, which provides high-level information about the issue, such as
the analyzer that found the issue.
For example, “Command Injection (Input Validation and Representation, data flow)” indicates that
this issue, detected by the Dataflow Analyzer, is a Command Injection issue in the Input Validation
and Representation kingdom.
3. Click the More Information link or the Details tab to get more details about the issue.
4. On the Audit tab, assign an Analysis value to the issue to represent your evaluation.
5. Specify values for any custom tags as required by your organization.
To specify a date in a date-type custom tag, click Select Date to select a date from a calendar.
6. If the audit results have been submitted to Audit Assistant in Micro Focus Fortify Software
Security Center, then you can specify whether to include or exclude the issue from Audit Assistant
training from the AA_Training list.
Note: If you select a different value for Analysis than the AA_Prediction value set by Audit
Assistant, and you select Include from the AA_Training list, then the next time the data is
submitted to Audit Assistant, it updates the information used to predict whether or not an
issue represents a true vulnerability. For more information about Audit Assistant, see the
Micro Focus Fortify Software Security Center User Guide.
7. (Optional) In the Comments box, add any comments relevant to the issue and your evaluation.
Suppressing Issues
You can suppress issues that are either fixed or issues that you do not plan to fix.
To suppress an issue, do one of the following:
l Select the issue in the Analysis Results window, and then click Suppress icon on the Audit tab.
l Right-click the issue in the Analysis Results window, and then select Suppress.
l On the Analysis Results toolbar, select the Visibility menu and then click Show Suppressed
Issues.
increasingly restrictive view of security-related issues. Defining multiple filter sets for an audit project
enables different views for different users, and a customized view does not affect any other views.
In addition to providing sorting and filtering mechanisms, you can also customize the auditing process
by defining custom tags in the issue template. Auditors associate custom tags with issues during the
audit. For example, you can use custom tags to track impact, severity, or priority of an issue using the
same names and values used to track these attributes in other systems, such as a bug tracking system.
Issue templates contain the following settings:
l Folder filters—Control how issues are sorted into the folders
l Visibility filters—Control which issues are shown and hidden
l Custom tags—Specify which audit fields are displayed and the values for each
The issue template applied to a project uses the following order of preference:
1. The template that exists in the audit project
2. The template <sca_install_dir>\Core\config\filters\defaulttemplate.xml
3. The template <sca_install_dir>\Core\config\rules\defaulttemplate.xml
4. The embedded Fortify default template
4. In the Create New Tag dialog box, type a name for the tag.
5. From the Type list, select the type of tag. The following tag types are available:
l List—Accepts selection from a list of values that you specify for the tag
d. To use this value as the default for the new tag, select a value in the Values list, and then select
Default on the right.
If no default is selected, the default value for the custom tag is empty.
e. To add a description for the value, type it in the Description box.
f. Repeat steps b through e until you have added all the tag values.
8. To add a description for any tag type:
a. From the Tags list, select the tag.
b. Type a description in the Description box on the right.
9. To make this custom tag the primary tag:
Note: You can only set a list-type tag as a primary tag.
Note: You cannot hide a custom tag that is set as the primary tag.
Note: To find the filter that directed the issue to the folder, right-click the issue, and select Why is
this issue here? To find the filter that hid an issue, right-click the issue, and then select Why is
this issue hidden?
l To create a folder filter, select Set Folder to, and then select the folder name or select Create
New to create a new folder.
A new folder is displayed only in this filter set.
6. Click Create Filter.
The new filter is placed at the end of the filter list. For folder filters, this gives the new filter the
highest priority. Issues matching the new folder filter appear in the targeted folder.
7. To change the priority of a folder filter, drag the filter higher in the folder filter list.
Note: The filter is created only in the selected filter set.
l To create a folder filter, select Set Folder to, and then select the folder name or select Create
New to create a new folder.
The new filter displays at the end of the list. For folder filters, this gives the new filter the highest
priority. Issues that match the new folder filter are displayed in the targeted folder.
7. To change the priority, drag the filter higher in the folder filter list.
The issues are sorted based on the new filter.
Managing Folders
Folders are logical sets of issues that are defined by the filters in the active filter set. Even though a
folder can appear in more than one filter set, the contents might differ depending on the filters in that
filter set that target the folder. To accommodate filter sets that attempt to provide sorting mechanisms
that have little overlap, it is possible to have filter sets with different folders. Folders are defined without
any relation to the filter sets in which they might appear.
Creating a Folder
You can add a new folder to a filter set so that you can display a group of issues you have filtered to the
folder.
To create a folder:
1. From the Fortify extension menu, select Project Configuration.
2. Click the Folders tab.
Currently defined folders are listed on the left. Fields that indicate the name, color, and description
of the selected folder are on the right.
3. To associate the new folder with an existing filter set, select a filter set from the Folders for Filter
Set list.
This selection updates the Folders list to display folders associated with the selected filter set.
4. To add a folder:
a. Next to Folders, click Create Folder .
The Create New Folder dialog box opens.
b. Type a unique name for the new folder, select a folder color, and then click OK.
The folder is added to the bottom of the Folders list.
5. To sort all issues that do not match a folder filter into this folder, select Default Folder.
6. Click OK.
The new folder is added to the local issue template. The folder displays as a tab with the other folders in
the Analysis Results window.
Note: To display issues in this folder, create a folder filter that targets the new folder (see "Creating
a Filter from the Analysis Results Window" on page 56 and "Creating a Filter from the Filters Tab"
on page 57).
Renaming a Folder
You can rename a folder. Modifying the name of a folder is a global change reflected in all filter sets.
To rename a folder:
1. From the Fortify extension menu, select Project Configuration.
2. Click the Folders tab.
3. From the Folders for Filter Set list, select a filter set that displays the folder you want to rename.
4. Select the folder in the Folders list.
The folder properties are displayed on the right.
5. In the Name box, type the new folder name.
6. Click OK.
The tab displays the new folder name.
Removing a Folder
You can remove a folder from a filter set without removing it from the other filter sets.
To remove a folder:
1. From the Fortify extension menu, select Project Configuration.
2. Click the Folders tab.
3. From the Folders for Filter Set list, select a filter set that contains the folder you want to remove.
The folders in the selected filter set are listed.
4. Next to Folders, select the folder, and then click -.
The folder is removed only from the selected filter set.
If the folder is a target of a folder filter, the Conflicts Occurred Removing Folder dialog box opens.
BIRT Reports
You can generate BIRT reports from Fortify Extension for Visual Studio or from the command line
(BIRTReportGenerator utility). For information on how to generate BIRT reports from the command
line, see the Micro Focus Fortify Static Code Analyzer User Guide.
The following table describes the BIRT reports available.
CWE Top 25 2019 This report lists the most widespread and critical weaknesses that can lead to
serious software vulnerabilities (based on the National Vulnerability Database).
CWE/SANS Top 25 This report details issues related to the CWE/SANS Top 25 Most Dangerous
Programming Errors and provides information about where and how to fix the
issues. It describes the technical risk posed by unremediated issues discovered
during analysis and provides an estimate of the development effort needed to
test, verify, and fix them.
Developer This report provides the information a developer needs to understand and fix
Workbook the issues discovered during an application audit.
DISA CCI 2 This report provides a standard identifier for policy-based requirements that
connects high-level policy expressions and low-level technical implementations.
DISA STIG This report addresses DISA compliance based on STIG violations and provides
information about where and how to fix the issues. It describes the technical
risk posed by unremediated issues and provides an estimate of the
development effort required to test, verify, and fix them.
FISMA Compliance: This report addresses FISMA compliance related to FIPS-200 through controls
FIPS 200 specified in NIST SP 800-53. It details policy violations and provides
information about where and how to fix the issues. It describes the technical
risks posed by unremediated violations and provides an estimate of the
development effort required to test, verify, and fix them.
GDPR This report groups all detected issues that are relevant to privacy under the EU
General Data Protection Regulation (GDPR) legislation. Use this as a
framework to help identify and protect personal data as it relates to application
security.
MISRA This report addresses compliance with either the Motor Industry Software
Reliability Association (MISRA) C or C++ guidelines. The results focus on the
security relevant guidelines and can be used to help create a compliance matrix
for MISRA. This report describes the technical risk posed by the unremediated
issues discovered during analysis and an provides an estimate of the
development effort needed to test, verify, and fix them.
OWASP ASVS 4.0 This report groups detected issues based the OWASP Application Security
Verification Standard security requirements for secure development.
OWASP Mobile This report details the top ten OWASP mobile-related issues and provides
Top 10 information about where and how to fix them. It describes the technical risk
posed by the unremediated issues discovered during analysis and gives an
estimate of the development effort required to test, verify, and fix them.
OWASP Top 10 This report details the top ten OWASP-related issues and provides information
about where and how to fix them. It describes the technical risks posed by
unremediated issues discovered during analysis and gives an estimate of the
development effort required to test, verify, and fix the issues.
PCI DSS This report summarizes the application security portions of PCI DSS. It
Compliance: includes tests for 21 application security-related requirements across sections
Application 3, 4, 6, 7, 8, and 10 of PCI DSS and reports whether each requirement is either
Security “In Place” or “Not In Place.”
Requirements
PCI SSF This report summarizes the application security portions of PCI SSF v1.0. It
Compliance: Secure includes tests for 23 application security-related control objectives across
Software Control Objective sections 2, 3, 4, 5, 6, 7,8, and A.2 of PCI SSF and reports
Requirements whether each control objective is "In Place" or "Not In Place."
2. From the Report Template menu, select the type of report you want.
3. If available for the template, select the template version.
4. Select the information you want to include in the report.
Note: Not all options are available for all report types.
a. To include detailed descriptions of reported issues, select the Detailed Report check box.
b. To categorize issues by Fortify Priority instead of folder names, select the Categories By
Fortify Priority check box.
c. To include Description of Key Terminology in the report, select the Key Terminology check
box.
d. To include the About Fortify Solutions section in the report, select the About
Fortify Solutions check box.
5. To filter information from the report, select the optional issue filter settings as follows:
l Click Removed to include removed issues in the report.
7. To specify an alternate location to save the report, click Browse and select a location.
8. Click Generate.
9. If a report with the same file name already exists, you are prompted to either:
l Click No to overwrite the existing report.
l Click Yes to have the report saved to a file with a sequential number appended to the file name
(for example: Sample1_DISA_STIG(1).pdf).
multiple examples of each issue. It also gives a high-level summary of the number of issues in each
category.
l OWASP Top Ten <year>—Provides high-level summaries of uncovered vulnerabilities organized
based on the top ten issues that the Open Web Security Project (OWASP) has identified.
l Fortify Scan Summary—Provides high-level information based on the category of issues that Micro
Focus Fortify Static Code Analyzer found as well as a project summary and a detailed project
summary
The following sections describe how to view report templates and customize them to address your
reporting needs.
Variable Description
$AUDIT_GUIDE_ List of filters created with answers to Audit Guide Wizard questions
SUMMARY$
$CLASSPATH_ JAR files used in the scan, one relative path per line
LISTING$
$LIBDIR_LISTING$ Libdirs specified during scan, one relative path per line
Variable Description
LABEL$
$PROJECT_NAME$ Build ID
$PROPERTIES$ Complete list of properties set during analysis phase (same format as
project summary)
$RESULTS_ Complete certification detail with list of validity on a per file basis (same
CERTIFICATION$ format as project summary)
$RULEPACKS$ Complete list of Rulepacks used during the analysis (same format as
project summary)
$SCAN_DATE$ Date of the analysis with the default formatting style for the locale
$VERSION_LABEL$ Label of the scanned project (available only if the Fortify Static Code
Analyzer -build-label option was used in the scan)
You can add report sections by editing the XML files. In the structure of the XML, the ReportSection
element defines a new section. It includes a Title element for the section name, and it must include at
least one Subsection element to define the section contents in the report. The following XML is the
Results Outline section of the Fortify Security Report:
In this example, the Results Outline section contains two subsections. The first is a text subsection
titled Overall number of results. The second subsection is a results list titled Vulnerability
Examples by Category. A section can contain multiple subsections.
In the report sections, you can add subsections or edit subsection content. Subsections can generate
text, results lists, or charts.
<SubSection enabled="true">
<Title>Overall number of results</Title>
<Description>Results count</Description>
<Text>The scan found $TOTAL_FINDINGS$ issues.</Text>
</SubSection>
In this example, the text subsection is titled Overall number of results. The text that describes
the purpose of the text is Results count. The text in the text field that the user can edit before
running a report uses one variable named $TOTAL_FINDINGS$.
Adding Results List Subsections
In a results list subsection, you can include the Title element, the Description element, and the
IssueListing element. In the IssueListing element, you can define the default content for the
limit and set listing to true. You can include the Refinement element either with or without a
default statement although the user can edit the content before they generate a report. To generate a
results list, the Chart element's attribute chartType is set to list. You can also include the Axis
element. The following XML is the Vulnerability Examples by Category subsection in the
Results Outline section:
<SubSection enabled="true">
<Title>Vulnerability Examples by Category</Title>
<Description>Results summary for critical and high priority issues.
Vulnerability examples are provided by category.
</Description>
<IssueListing limit="1" listing="true">
<Refinement>[fortify priority order]:critical OR
[fortify priority order]:high</Refinement>
<Chart chartType="list">
<Axis>Category</Axis>
</Chart>
</IssueListing>
</SubSection>
In this example, the results list subsection title is Vulnerability Examples by Category. The text
Results summary for critical and high priority issues. Vulnerability examples
are provided by category. is used to describe the purpose of the subsection. This subsection
lists (listing=true) one issue (limit="1") per category (the value of the Axis element) where
there are issues matching the statement [fortify priority order]:critical OR [fortify
priority order]:high (the value of the Refinement element).
In a chart subsection, you can include the Title element, the Description element, and the
IssueListing element. In the IssueListing element, you can define the default content for the
limit and set listing to false. You can include the Refinement element either with or without a
default statement although the user can edit the content before generating a report. To generate a pie
chart, set the Chart element's attribute chartType to pie. The options are table, pie, and bar. The
user can change this setting before generating the report. You can also define the Axis element.
The following code shows an example of a chart subsection:
<SubSection enabled="true">
<Title>New Issues</Title>
<Description>A list of issues discovered since the previous
analysis.</Description>
<Text>The following issues have been discovered since the
last scan.</Text>
<IssueListing limit="-1" listing="false">
<Refinement />
<Chart chartType="pie">
<Axis>New Issue</Axis>
</Chart>
</IssueListing>
</SubSection>
In this subsection, a chart (limit="-1" listing="false") has the title New Issues and a text
section that contains The following issues have been discovered since the last
scan.. This chart includes all issues (the Refinement element is empty) and groups the issues based
on the value of New Issue (the value of the Axis element). The subsection includes a pie chart
(chartType="pie").
5. If the source code is not available in the FPR, you are prompted to select the root directory for your
project's source code. Select the root directory, and then click OK.
The Fortify Extension for Visual Studio displays the project in the auditing interface.
Note: Issues are not merged. Only the newer scanned issues are shown. Issues in the older file that
are not in the newer file are marked as removed.
Make sure that the projects you merge contain the same analysis information, that the scan was on the
same source code (no missing libraries or files), the Micro Focus Fortify Static Code Analyzer options
were the same, and the scan was performed with the same set of Secure Coding Rulepacks and custom
Rulepacks.
The audit project now contains all audit data from both files.
The Fortify Software Security Center URL includes both the port number and the context path
/ssc. For example, http://my.domain.com:8080/ssc.
d. Click OK.
2. From the Fortify extension menu, select Open Collaborative Audit.
If you already have an audit project open, close it.
3. If prompted, type your Fortify Software Security Center login credentials.
For information about logging into Fortify Software Security Center, see "Logging in to Fortify
Software Security Center" on page 16.
4. In the Download Collaborative Audit dialog box, select an application version, and then click Select.
The Fortify Extension for Visual Studio downloads the audit project file from Fortify Software
Security Center and opens it in the auditing interface.
5. Audit the project as described in "Auditing Issues" on page 50.
6. When you have completed the audit, select Upload Audit Project from the Fortify extension
menu.
Note: If necessary, update your audit permission settings from Fortify Software Security Center by
selecting Refresh Permissions from the Fortify extension menu.
Important! If Fortify Software Security Center uses an SSL connection from an internal certificate
authority or a self-signed certificate, you must import the Fortify Software Security Center
certificate into the local Windows certificate store.
Note: By default, Micro Focus Fortify Software Security Center ignores uploaded scans performed
in quick scan mode. However, you can configure your Fortify Software Security Center application
version so that uploaded audit projects scanned in quick scan mode are processed. For more
information, see analysis results processing rules in the Micro Focus Fortify Software Security
Center User Guide.
Log Files
To get assistance in diagnosing an issue, send the log files to Micro Focus Fortify Customer Support. On
Windows systems, the log files are in the following directories:
l C:\users\<username>\AppData\Local\Fortify\sca<version>\log
l C:\users\<username>\AppData\Local\Fortify\VS<VSversion>-<version>\log
l C:\users\<username>\AppData\Local\Fortify\scancentral\log
This log file is only relevant for remote scanning.
For information about logging into Fortify Software Security Center, see "Logging in to Fortify
Software Security Center" on page 16.
4. In the Select Application Version dialog box, select the application version you want to open, and
then click OK.
The Fortify Extension for Visual Studio sends a request to Fortify Software Security Center and
downloads the results for the application version you selected.
l Select Quick View to list only issues in the Critical folder (these have a potentially high impact
and a high likelihood of occurring) and the High folder (these have a potentially high impact and
a low likelihood of occurring).
Note: You might see different filter sets depending on the filter sets associated with the
application.
3. From the Group By list, select a value to use to sort issues in all visible folders into groups.
The default grouping is Category. For a description of the Group By options, see "Grouping
Issues" on page 38.
4. From the Issues For list, select one of the following:
l <All Users>
l Your Fortify Software Security Center user name. This is the default.
5. Click one of the following category tabs (folders).
l The Critical tab contains issues that have a high impact and a high likelihood of exploitation.
Audit Tab
The Audit tab provides a dashboard for issues.
Element Description
User Select a name from this list to assign a user to the selected issue.
Analysis Displays the analysis type for the selected issue. To change the analysis type,
select an item from the list.
<custom_tagname> Any custom tags your organization has defined in Micro Focus Fortify
Software Security Center. If available, these are displayed below the Analysis
list.
If the audit results have been submitted to Audit Assistant in Fortify Software
Security Center, then in addition to any other custom tags, the tab displays the
following tags:
l AA_Prediction—Exploitability level that Audit Assistant assigned to the
issue. You cannot modify this tag value.
l AA_Confidence—Confidence level from Audit Assistant for the accuracy of
its AA_Prediction value. This is a percentage, expressed in values that range
from 0.000 to 1.000. For example, a value of 0.982 indicates a confidence
level of 98.2 percent. You cannot modify this tag value.
l AA_Training—Whether to include or exclude the issue from Audit
Element Description
File Path (top right) The path to the location of the source file for the selected issue.
Analysis Trace Lists the items of evidence that the analyzer uncovered. The analysis trace is
(bottom right) presented in the order it was discovered. For information about the Analysis
Trace icons, see "Analysis Trace Window" on page 31.
Recommendation Tab
The Recommendation tab provides suggestions and examples that show how to secure a vulnerability
or remedy a bad practice. The following table describes the tab sections.
Section Description
Recommendations Describes possible solutions for the selected issue. It can also include examples
and recommendations that your organization has defined.
Tips Provides useful information specific to the selected issue, including any custom
tips that your organization has defined.
References Lists references for the recommendations provided, including any custom
references that your organization has defined.
Details Tab
The Details tab provides an abstract of the selected issue. It might also provide more detailed
explanations, including examples with descriptive text and code samples. The following table describes
the tab sections.
Section Description
Explanation/Custom Displays a description of the conditions under which an issue of the selected
Explanation type occurs. This includes a discussion of the vulnerability, the constructs
typically associated with it, ways in which attackers can exploit it, and the
potential ramifications of an attack. This section also provides custom
explanations defined by your organization.
Remediation Effort The relative amount of effort required to fix and verify an issue.
History Tab
The tab History tab shows a history of audit actions, including details such as the time and date, and
the name of the user who modified the issue.
Note: The visibility filter settings in the issue template associated with the application
version determine which issues are hidden.
l To display all issues that were detected in the previous analysis, but no longer exist, select Show
Removed Issues.
Note: Users who audit issues can suppress specific types of issues that are not considered
high priority or of immediate concern. For example, auditors can suppress issues that are
fixed, or issues that your organization plans not to fix.
For text- and decimal-type custom tags, type the value in the field, and then click Save ( ). Text-
type custom tags accept up to 500 characters (HTML/XML tags and newlines are not allowed).
For date-type custom tags, type a valid date or click Select Date to select a date from a
calendar.
The Fortify Extension for Visual Studio jumps to the line of code that contains the security-related issue
displayed in Visual Studio.
Note: If you are experiencing a technical issue with our product, do not email the documentation
team. Instead, contact Micro Focus Fortify Customer Support at
https://www.microfocus.com/support so they can assist you.
If an email client is configured on this computer, click the link above to contact the documentation team
and an email window opens with the following information in the subject line:
Feedback on User Guide (Fortify Extension for Visual Studio 20.2.0)
Just add your feedback to the email and click send.
If no email client is available, copy the information above to a new message in a web mail client, and send
your feedback to FortifyDocTeam@microfocus.com.
We appreciate your feedback!