WI Install 24.2.0
WI Install 24.2.0
WI Install 24.2.0
Installation Guide
Legal Notices
Open Text Corporation
275 Frank Tompa Drive, Waterloo, Ontario, Canada, N2L 0A1
Copyright Notice
Copyright 2004-2024 Open Text.
The only warranties for products and services of Open Text and its affiliates and licensors (“Open Text”) are as may be set forth
in the express warranty statements accompanying such products and services. Nothing herein should be construed as
constituting an additional warranty. Open Text shall not be liable for technical or editorial errors or omissions contained herein.
The information contained herein is subject to change without notice.
Trademark Notices
“OpenText” and other Open Text trademarks and service marks are the property of Open Text or its affiliates. All other
trademarks or service marks are the property of their respective owners.
Documentation Updates
The title page of this document contains the following identifying information:
l Software Version number
l Document Release Date, which changes each time the document is updated
l Software Release Date, which indicates the release date of this version of the software
This document was produced for OpenText™ Fortify WebInspect CE 24.2 on May 14, 2024. To check for recent updates or to
verify that you are using the most recent edition of a document, go to:
https://www.microfocus.com/support/documentation
Contents
Preface 6
Contacting Customer Support 6
For More Information 6
About the Documentation Set 6
Fortify Product Feature Videos 6
Change Log 7
Preface
https://www.microfocus.com/support
Change Log
The following table lists changes made to this document. Revisions to this document are published
between software releases only if the changes made affect product functionality.
Software Release /
Document Version Changes
24.2.0 Updated:
l Licensing information with new LIM URL format. See "Licensing with
the License Wizard" on page 29 and "Connect to LIM" on page 32.
Removed:
l Images from Setup Wizard content.
23.2.0 / Updated:
January 2024 l Licensing information to clarify LIM URL. See "Connect to LIM" on
page 32.
23.2.0 Updated:
l Minor edits to incorporate branding changes.
Removed:
l 15-day trial option from the License Wizard content.
l Content related to the 32-bit installer package for WebInspect SDK.
23.1.0 Added:
l Content for accessing Debricked open source health metrics. See
"Hacker-level Insights " on page 11 and "Using the WIConfig Program"
on page 20.
Removed:
l Content related to AutoPass licensing.
l Content related to Telemetry.
22.2.0 / Added:
December 2022
Software Release /
Document Version Changes
22.2.0 Updated:
l Features list with new API scanning functionality. See "The Main
Features of Fortify WebInspect" on page 9.
l
WIConfig information with 2FA server and OAST server options. See
"Using the WIConfig Program" on page 20.
When a crawl and an audit are combined into one function, it is termed a scan. A scan combines
application crawl and audit phases into a single fluid process. The scan is refined based on real-time
audit findings, resulting in a comprehensive view of an entire Web application’s attack surface.
Intelligent engines employ a structured, logic-based approach to analyzing an application and then
customize attacks based on the application’s behavior and environment. Fortify WebInspect combines
sophisticated, ground-breaking scanning technologies with a database of known Web application
vulnerabilities.
Reporting
Use Fortify WebInspect reports to gain valuable, organized application information. You can
customize report details, deciding what level of information to include in each report, and gear the
report for a specific audience. You can save reports in a variety of formats, and you can also include
graphic summaries of vulnerability data.
Scanning Policies
You can edit and customize scanning policies to suit the needs of your organization, reducing the
amount of time it takes for Fortify WebInspect to complete a full scan.
Fortify WebInspect also lets you extend the product’s capabilities to meet your organization’s specific
needs. You can configure Fortify WebInspect to adapt to any web application environment and use
the custom check wizard to create custom attacks.
API Discovery
With API discovery, any Swagger or OpenAPI schema that is detected during a scan will have its
endpoints added to the existing scan and authentication will be applied to the endpoints using
automatic state detection. In addition, probes will be sent to default locations of popular API
frameworks to discover schemas.
Integration Capabilities
You can integrate Fortify WebInspect with some of the most widely-used application security
development and testing tools, including the following:
l Burp
l Postman
l Selenium WebDriver
Export Wizard
Fortify WebInspect’s configurable XML export tool enables users to export (in a standardized XML
format) any and all information found during the scan. This includes comments, hidden fields,
JavaScript, cookies, Web forms, URLs, requests, and sessions. Users can specify the type of
information to be exported. The Export Wizard also includes a “scrubbing” feature that prevents any
sensitive data from being included in the export.
Hacker-level Insights
Fortify WebInspect flags libraries that are detected in the application during the scan. This
information provides developers and security professionals with context relating to the overall
security posture of their application. While these findings do not necessarily represent a security
vulnerability, it is important to note that attackers commonly perform reconnaissance of their target
in an attempt to identify known weaknesses or patterns.
If the detected library is open source, the hacker-level insights check includes information from the
National Vulnerability Database (NVD). If OpenText™ Debricked access is configured, then Debricked
health metrics for open source libraries is also included. For more information on configuring access to
the Debricked database, see "Using the WIConfig Program" on page 20
Testing Tools
A robust set of diagnostic and penetration testing tools is packaged with Fortify WebInspect. These
include:
l Audit Inputs Editor
l Compliance Manager
l Encoders/Decoders
l HTTP Editor
l Log Viewer
l Policy Manager
l Regular Expression Editor
l Server Analyzer
l SQL Injector
l Traffic Tool
l Web Discovery
l Web Form Editor
l Web Fuzzer
l Event-based Web Macro Recorder
l Session-based Web Macro Recorder
l Web Proxy
l Web Services Test Designer
Related Documents
This topic describes documents that provide information about Fortify software products.
All Products
The following documents provide general information for all products. Unless otherwise noted, these
documents are available on the Product Documentation website.
About Fortify Software This paper provides information about how to access
Documentation Fortify product documentation.
About_Fortify_Docs_<version>.pdf Note: This document is included only with the
product download.
Fortify Software System This document provides the details about the
Requirements environments and products supported for this version of
Fortify Software.
Fortify_Sys_Reqs_<version>.pdf
Fortify Software Release Notes This document provides an overview of the changes made
to Fortify Software for this release and important
FortifySW_RN_<version>.pdf
information not included elsewhere in the product
documentation.
What’s New in Fortify Software This document describes the new features in Fortify
<version> Software products.
Fortify_Whats_New_<version>.pdf
OpenText™ Fortify ScanCentral DAST This document provides information about how to
Configuration and Usage Guide configure and use Fortify ScanCentral DAST to conduct
dynamic scans of Web applications.
SC_DAST_Guide_<version>.pdf
OpenText™ Fortify License and This document describes how to install, configure, and use
Infrastructure Manager Installation the Fortify License and Infrastructure Manager (LIM),
OpenText™ Fortify WebInspect and This document describes how to download, configure, and
OAST on Docker User Guide use Fortify WebInspect and Fortify OAST that are
available as container images on the Docker platform. The
WI_Docker_Guide_<version>.pdf
Fortify WebInspect image is intended to be used in
automated processes as a headless sensor configured by
way of the command line interface (CLI) or the application
programming interface (API). It can also be run as a
Fortify ScanCentral DAST sensor and used in conjunction
with Fortify Software Security Center. Fortify OAST is an
out-of-band application security testing (OAST) server
that provides DNS service for the detection of
OAST vulnerabilities.
Fortify WebInspect
The following documents provide information about Fortify WebInspect. These documents are
available on the Product Documentation website at
https://www.microfocus.com/documentation/fortify-webinspect.
OpenText™ Fortify WebInspect User This document describes how to configure and use
Guide Fortify WebInspect to scan and analyze Web
applications and Web services.
WI_Guide_<version>.pdf
Note: This document is a PDF version of the Fortify
WebInspect help. This PDF file is provided so you
can easily print multiple topics from the help
information or read the help in PDF format. Because
this content was originally created to be viewed as
help in a web browser, some topics may not be
OpenText™ Fortify WebInspect and This document describes how to download, configure,
OAST on Docker User Guide and use Fortify WebInspect and Fortify OAST that are
available as container images on the Docker platform.
WI_Docker_Guide_<version>.pdf
The Fortify WebInspect image is intended to be used in
automated processes as a headless sensor configured by
way of the command line interface (CLI) or the
application programming interface (API). It can also be
run as a Fortify ScanCentral DAST sensor and used in
conjunction with Fortify Software Security Center.
Fortify OAST is an out-of-band application security
testing (OAST) server that provides DNS service for the
detection of OAST vulnerabilities.
OpenText™ Fortify License and This document describes how to install, configure, and
Infrastructure Manager Installation and use the Fortify License and Infrastructure Manager
Usage Guide (LIM), which is available for installation on a local
Windows server and as a container image on the Docker
LIM_Guide_<version>.pdf
platform.
OpenText™ Fortify WebInspect Tools This document describes how to use the Fortify
Guide WebInspect diagnostic and penetration testing tools and
configuration utilities packaged with Fortify WebInspect
WI_Tools_Guide_<version>.pdf
and Fortify WebInspect Enterprise.
OpenText™ Fortify WebInspect Agent This document describes how to install the OpenText™
Installation and Rulepack Guide Fortify WebInspect Agent and describes the detection
capabilities of the Fortify WebInspect Agent Rulepack
WI_Agent_Install_<version>.pdf
Kit. Fortify WebInspect Agent Rulepack Kit runs atop the
Fortify WebInspect Agent, allowing it to monitor your
code for software security vulnerabilities as it runs.
Fortify WebInspect Agent Rulepack Kit provides the
runtime technology to help connect your dynamic
results to your static ones.
OpenText™ Fortify WebInspect This document describes how to use Fortify WebInspect
Enterprise User Guide Enterprise to manage a distributed network of Fortify
WebInspect sensors to scan and analyze Web applications
WIE_Guide_<version>.pdf
and Web services.
OpenText™ Fortify WebInspect This document describes how to use the Fortify WebInspect
Tools Guide diagnostic and penetration testing tools and configuration
utilities packaged with Fortify WebInspect and Fortify
WI_Tools_Guide_<version>.pdf
WebInspect Enterprise.
Installation Recommendation
We recommend that you do not install Fortify WebInspect on the same machine as OpenText™ Fortify
WebInspect Enterprise. Doing so may result in known issues that affect the usability of the products.
Prerequisites
Before you install Fortify WebInspect, install a supported or recommended version of the following
third-party software:
l .NET Framework
l SQL Server or SQL Server Express
For information about the supported versions of these software products and other system
requirements, see the Fortify Software System Requirements.
Double-clicking any of the installer files launches the Setup Wizard which guides you through the
installation. For more information, see "Using the Setup Wizard" on the next page.
Installation Options
You can install Fortify WebInspect using the Setup Wizard or the msiexec program. You can use the
WIConfig program to override Fortify WebInspect configurations after installation.
Tip: You can use a classic Fortify WebInspect installation with the OpenText™ Fortify ScanCentral
DAST sensor service. For more information, see the OpenText™ Fortify ScanCentral DAST
Configuration and Usage Guide.
Note: After installing Fortify WebInspect, the program will auto launch and require that you
license the product before continuing. For information on licensing Fortify WebInspect, see
"Licensing with the License Wizard" on page 29.
c. In the Sensor Authentication group, enter the following Windows account credentials for this
sensor:
o In the User Name box, type the sensor user name.
o In the Password and Confirm Password boxes, type the password for the sensor user.
For important information about installing Fortify WebInspect as a sensor and configuring it
to work with Fortify WebInspect Enterprise, see the OpenText™ Fortify WebInspect
Enterprise Installation and Implementation Guide.
6. Click Next.
The Ready to install Fortify WebInspect window appears.
7. Click Install.
When the installation process is complete, the Completed the Fortify WebInspect Setup Wizard
window appears.
8. Select Launch Fortify WebInspect and click Finish.
The Setup Wizard closes and Fortify WebInspect launches.
Normal Installation
A normal installation includes a user interface that prompts you to accept or change the default
installation options. To run a normal installation, type the following at the command line prompt or in
a script:
msiexec /I "<directory>:\WebInspect64.msi"
Replace <directory> with the location where the WebInspect64.msi file resides on your machine.
messages during the installation. To suppress reboot messages, type the following at the command
line prompt or in a script:
msiexec /I "<directory>:\WebInspect64.msi" REBOOT=Suppress
Important! Using this method, the installation completes normally without any messages to
reboot. However, if files were in use during the installation and a reboot is required, Fortify
WebInspect may not run until you reboot your machine.
Silent Mode
You can suppress the user interface altogether by using the silent mode method. Using this method,
all user prompts and messages are suppressed, and the default installation options are used. To use
silent mode, type the following at the command line prompt or in a script:
msiexec /I "<directory>:\WebInspect64.msi" REBOOT=Suppress /qn
Important! There is no way to specify non-default installation options without user interaction.
To override the default configurations, use the WIConfig program. For information, see "Using
the msiexec Program" on the previous page.
Synchronous Installation
Installing Fortify WebInspect from the command line interface or with a script using the commands
described above starts the installation as a background task. You can type commands or run other
script operations while Fortify WebInspect is installing in the background. If you were to attempt to
run the WIConfig program immediately after submitting the msiexec command, the WIConfig
program would fail because the Fortify WebInspect installation would not have completed. You can
avoid this issue by running a synchronous installation, which means that you cannot further interact
with the command prompt or run the next line in a script until the installation is complete.
To run a synchronous installation, type the following at the command line prompt:
Start /wait msiexec /I "<directory>:\WebInspect64.msi" REBOOT=Suppress /qn
The following sample shows a PowerShell equivalent for a synchronous installation:
Syntax
WIConfig.exe [/?] [/AcceptUntrustedCerts] [/CreateDatabase]
[-DebrickedAccessToken <string>] [/DisableSmartUpdateOnStartup]
[/EnableAzureDatabaseSupport] [-FipsCompliance <string>]
[-LicenseFile <string>] [/LIMDeactivate] [-LIMPassword <string>] [-LIMPool
<string>] [-LIMUrl <string>] [-RCServerAuthType <string>] [-RCServerHost
<string>] [-RCServerPort <number>] [/RCServerUseHTTPS]
[-SensorID <string>] [-SensorProxyAddress <string>]
[-SensorProxyPassword <string>] [-SensorProxyPort <number>]
[-SensorProxyUsername <string>] [-SensorServicePassword
<string>] [-SensorServiceUsername <string>] [-SensorSqlConnString
<string>] [-SensorSqlConnType <string>] [-SensorWIEPassword <string>]
[-SensorWIEUsername <string>] [-SqlConnString <string>]
[-TwoFAListenerAddress <string>] [-TwoFAListenerPort <number>]
[-WIEUrl <string>] [-WIOASTServerAddress <string>] [-WISECluster <string>]
[-WISEClusterAuthToken <string>] [-WISEClusterMaxPoolSize <number>]
Parameters
The following table describes the optional parameters.
Parameter Description
Parameter Description
Example:
Parameter Description
{enable|disable}
{None|Basic|NTLM|ClientCert}
Parameter Description
Note: To configure a sensor, you must first install WebInspect to run as a sensor.
Parameter Description
Example:
-WIEUrl <https://server.domain.com/WIE/>
-SensorWIEUsername Specifies the domain and user account for the sensor
when connecting to the WebInspect Enterprise server.
Parameter Description
Parameter Description
-SensorServicePassword Specifies the password for the user account to be used for
the WebInspect Sensor Windows service.
-SensorSqlConnType Specifies the SQL connection type. The value can be one
of the following:
{SQLServer|SQLExpress}
If this parameter is not provided, the connection type
defined for Fortify WebInspect will be used. If this
parameter is defined, validation will occur to ensure the
connection.
Example:
Data Source=<server>;Initial
Catalog=<database>;Integrated
Security=False;User ID=<DB
user>;Password=<password>;User
Instance=False
Stage Description
wiconfig /EnableAzureDatabaseSupport
3. In Fortify WebInspect, configure the database connection and create a new database.
For more information, see the OpenText™ Fortify WebInspect User Guide.
Directory Structure
The following table describes the directories created and used by Fortify WebInspect, assuming that
the main drive is “C” and the user accepts the default directories suggested by the installation
program. This information can assist customers and Customer Support in troubleshooting.
local machine.
1 %localappdata% represents the location of local application data for your operating system. For
example, for Windows 10 (using the default C: drive), %localappdata% is
C:\Users\<username>\AppData\Local.
Disclaimer
Certain versions of Fortify WebInspect may contain branding from Hewlett-Packard Company (now
HP Inc.) and Hewlett Packard Enterprise Company.
This software was acquired by Micro Focus on September 1, 2017, and is now offered by OpenText, a
separately owned and operated company. Any reference to the HP and Hewlett Packard
Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks
are the property of their respective owners.
Note: To connect to a LIM, you must first install the LIM on a Windows server or run the
LIM Docker image. For more information on the LIM requirements, see the Fortify Software
System Requirements document. For information on installing and managing concurrent licenses
using the LIM, see OpenText™ Fortify License and Infrastructure Manager Installation and Usage
Guide.
l Connect to Fortify License and Infrastructure Manager - Select this option if licensing is
controlled by your local server running the LIM software.
3. Click Next.
If you chose Connect directly to OpenText corporate license server, the License Wizard displays
the Named License Activation window. Proceed to "Connect to OpenText" below.
If you chose Install License File, the License Wizard displays the License File Activation window. Go
to "License File Activation" below.
If you chose Connect to Fortify License and Infrastructure Manager, the License Wizard displays
the Concurrent License Activation window. Go to "Connect to LIM" on page 32.
Connect to OpenText
1. In the Activation Token area, enter the 32-digit license token sent to you by email from
OpenText. Omit any hyphens that may appear in the string (or copy the token, position your
cursor in the first block of the Activation Token field, and press Ctrl + V to paste the token).
Important! The default Fortify Service URL is https://licenseservice.fortify.microfocus.com/.
Change this URL only if directed to do so by Customer Support personnel.
2. If this computer accesses the Internet through a proxy, select the Network Proxy option and
select a setting from the Proxy Profile drop-down list. Click Edit and complete the Proxy Profile
dialog box as necessary.
l If you select Use PAC file to load proxy settings from a Proxy Automatic Configuration (PAC)
file, you must click Edit, enter the URL of the PAC file in the Configure proxy using PAC File
URL field, and click Save on the Proxy Profile dialog box.
l If you select Use Explicit Proxy Settings, you must click Edit, configure a proxy by entering
the requested information for the Explicitly configure proxy option, and click Save on the
Proxy Profile dialog box.
3. Enter the information requested in the User Information group. The information you provide is
kept in strict confidence and is not shared with anyone outside of OpenText.
4. Click Next.
The Congratulations window appears and Fortify WebInspect is activated.
Fortify Activation
For this option, you must create a license request file containing information about the computer
where Fortify WebInspect is installed. Then, using a separate Internet-connected computer, access a
web site (https://licenseservice.fortify.microfocus.com/OfflineLicensing.aspx) to transmit the file to a
server, which will download a license file that you can copy and install on the computer that is not
connected to the Internet.
To activate a license generated by the Fortify license server:
5. Click Save.
6. On a computer that is connected to the Internet, open a browser and navigate to
https://licenseservice.fortify.microfocus.com/OfflineLicensing.aspx.
7. Select the option that describes how the license request file was generated and click Next.
The Enter Request File for Processing page appears.
Connect to LIM
The LIM enables you to manage concurrent licenses for Fortify WebInspect in a manner that best
suits your organization’s development and testing environment. For example, your company may
have Fortify WebInspect software installed on 25 machines, but holds a concurrent license that
permits a maximum of 10 instances to be active at any one time. Using the LIM, you can allocate and
deallocate those 10 seats in any way you like, without coordinating or negotiating through the
OpenText central licensing facility.
Note: Contact your LIM administrator to obtain the information required to complete this
procedure.
1. In the URL field, type the URL of the LIM server in the format https://<server-url>:<port>.
Note: If using a version of the LIM prior to 24.2.0, the format is https://<server-
url>:<port>/<service-directory> where:
l server-url is the site specified during LIM initialization as the root web site.
l service-directory is the directory specified during LIM initialization as the Service Virtual
Directory name (the default is “LIM.Service” or "LIM.API").
2. Enter the name of the license pool and its password in the Pool Name and Password fields.
3. If authorization is required to access the LIM, select Network Authorization and then enter your
user name and password.
4. If this computer accesses the Internet through a proxy:
a. Select the Network Proxy option.
b. Select a setting from the Proxy Profile drop-down list.
c. Click Edit and complete the Proxy Profile dialog box as necessary.
o If you select Use PAC file to load proxy settings from a Proxy Automatic Configuration
(PAC) file, you must click Edit and enter the URL of the PAC file in the Configure proxy
using PAC File URL field.
o If you select Use Explicit Proxy Settings, you must click Edit and configure a proxy by
entering the requested information for the Explicitly configure proxy option.
d. Click Save on the Proxy Profile dialog box.
5. Click Next.
6. On the Complete on-site License Activation window, select the manner in which you want the
License and Infrastructure Manager to handle the license associated with Fortify WebInspect.
l Connected License - The computer can run the product only when the computer is able to
contact the LIM. Each time you start the software, the LIM allocates a seat from the license pool
to this installation. When you close the software, the seat is released from the computer and
allocated back to the pool, allowing another user to consume the license.
l Detached License - The computer can run the product anywhere, even when disconnected
from your corporate intranet (on which the LIM is normally located), but only until the
expiration date you specify. A detached license enables you to take your laptop to a remote
site and run the software. When you reconnect to the corporate intranet, you can access the
Application License settings and reconfigure from Detached to Connected.
7. Click Next.
Information pertaining to your installed license appears in the License Details section.
8. Click Finish.
This completes the licensing procedure.
License Revocation
If your Fortify WebInspect license expires, or if your facility is managing licenses through the LIM and
the administrator releases your license, you will not be able to conduct or schedule scans.
1. In the Fortify WebInspect menu bar, click Edit > Application Settings.
2. On the Application Settings window, select License from the left pane.
3. Verify your license data.
4. Click OK.
If necessary, contact Customer Support or your LIM administrator.
Options
The following table describes the options and the type of license to which the option applies.
-deactivate If used with the -p option, deactivates product license and Named User
exits using the command line arguments.
-limPacFile Configures the proxy using a PAC file URL. Concurrent User
-limPool Specifies the LIM pool name. If used with the -p, -limURL, Concurrent User
and -limPswd options, configures the product to use a
LIM for licensing.
-p Indicates the Fortify product you are licensing. If used Named User
alone, skips the product selection step.
-serviceURL Specifies the OpenText Fortify License Service URL. Named User
-token Specifies the Fortify Product Activation Token GUID. If Named User
used with the -p option, licenses the product and exits
using the command line arguments.
-topMost Places the application as the top window on the desktop. Both
7. In the Pool Name field, type the pool name from which to extract a license for this instance of
Fortify WebInspect.
8. In the Password field, type the password that will allow access to the specified license pool.
9. If network authentication is required, select the Network Authentication check box, and in the
User Name and Password fields, enter a valid user name and password.
10. Click Next.
11. Do one of the following:
l To allow others to use this license when Fortify WebInspect closes, select Concurrent License.
l To allow Fortify WebInspect to disconnect from the LIM for an extended period of time, select
Detached Lease and enter an Expiration Date.
12. Click Next.
13. Click Finish and OK.
5. In the Pool Name field, type the pool name from which to extract a license for this instance of
Fortify WebInspect.
6. In the Password field, type the password that will allow access to the specified license pool.
7. If network authentication is required, select the Network Authentication check box, and in the
User Name and Password fields, enter a valid user name and password.
8. Click Next.
9. Do one of the following:
l To allow others to use this license when Fortify WebInspect closes, select Concurrent License.
l To allow Fortify WebInspect to disconnect from the LIM for an extended period of time, select
Detached Lease and enter an Expiration Date.
10. Click Next.
11. Click Finish and OK.
Caution! We recommend that the WebInspect SDK be used only by qualified software developers
who have Visual Studio expertise.
For more information about the WebInspect SDK, see the WebInspect Help in Fortify WebInspect or
the WebInspect SDK Help which is available in Visual Studio after the SDK installation.
Installation Recommendation
The WebInspect SDK does not need to be installed on the same machine as a Fortify WebInspect
product. In most cases, it will be installed on the software developer’s development machine. However,
if you are developing new extensions that will require debugging, we recommend that you install
Fortify WebInspect on the development machine where you will be creating the extension. Doing so
will allow you to test your extension locally. For existing extensions that do not require debugging,
you do not need to install Fortify WebInspect locally.
For minimum requirements for installing and using the WebInspect SDK, see the Fortify Software
System Requirements.
1. Navigate to the Extensions folder and double click the WebInspectSDK.vsix file.
The VSIX Installer is launched.
2. When prompted, select the Visual Studio product(s) to which you want to install the extension
and click Install.
The WebInspect Audit Extension project template is created in Visual Studio. Continue with
"Verifying the Installation" on the next page.
To install the SDK where Fortify WebInspect is not installed on the developer's machine:
1. Navigate to the Extensions folder and copy the WebInspectSDK.vsix file to portable media,
such as a USB drive.
2. Insert the drive into the development box that has Visual Studio installed, as well as the other
required software and hardware.
3. Navigate to the USB drive and double click the WebInspectSDK.vsix file.
The VSIX Installer is launched.
4. When prompted, select the Visual Studio product(s) for which you want to install the extension
and click Install.
The WebInspect Audit Extension project template is created in Visual Studio. Continue with
"Verifying the Installation" below.
Note: If you are experiencing a technical issue with our product, do not email the documentation
team. Instead, contact Customer Support at https://www.microfocus.com/support so they can
assist you.
If an email client is configured on this computer, click the link above to contact the documentation
team and an email window opens with the following information in the subject line:
Feedback on Installation Guide (Fortify WebInspect 24.2.0)
Just add your feedback to the email and click send.
If no email client is available, copy the information above to a new message in a web mail client, and
send your feedback to fortifydocteam@opentext.com.
We appreciate your feedback!