Micro Focus  
Fortify Extension for Visual Studio  
Software Version: 22.1.0  
User Guide  
Document Release Date: June 2022  
Software Release Date: June 2022  
User Guide  
Legal Notices  
Micro Focus  
The Lawn  
22-30 Old Bath Road  
Newbury, Berkshire RG14 1QN  
UK  
Warranty  
The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the  
express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an  
additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The  
information contained herein is subject to change without notice.  
Restricted Rights Legend  
Confidential computer software. Except as specifically indicated otherwise, a valid license from Micro Focus is required for  
possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software  
Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard  
commercial license.  
Copyright Notice  
© Copyright 2009 - 2022 Micro Focus or one of its affiliates  
Trademark Notices  
All trademarks, service marks, product names, and logos included in this document are the property of their respective owners.  
Documentation Updates  
The title page of this document contains the following identifying information:  
l
Software Version number  
l
Document Release Date, which changes each time the document is updated  
l
Software Release Date, which indicates the release date of this version of the software  
This document was produced on May 16, 2022. To check for recent updates or to verify that you are using the most recent  
edition of a document, go to:  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 2 of 96  
User Guide  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 5 of 96  
User Guide  
Preface  
Preface  
Contacting Micro Focus Fortify Customer Support  
Visit the Support website to:  
l
Manage licenses and entitlements  
l
Create and manage technical assistance requests  
l
Browse documentation and knowledge articles  
l
Download software  
l
Explore the Community  
For More Information  
For more information about Fortify software products:  
About the Documentation Set  
The Fortify Software documentation set contains installation, user, and deployment guides for all  
Fortify Software products and components. In addition, you will find technical notes and release notes  
that describe new features, known issues, and last-minute updates. You can access the latest versions  
of these documents from the following Micro Focus Product Documentation website:  
To be notified of documentation updates between releases, subscribe to Fortify Product  
Announcements on the Micro Focus Community:  
Fortify Product Feature Videos  
You can find videos that highlight Fortify products and features on the Fortify Unplugged YouTube  
channel:  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 7 of 96  
 
 
 
 
 
User Guide  
Change Log  
Change Log  
The following table lists changes made to this document. Revisions to this document are published  
between software releases only if the changes made affect product functionality.  
Software Release /  
Document Version  
Changes  
22.1.0  
Updated:  
l
l
"Grouping Issues" on page 44 - Added additional grouping options  
available when you remediate analysis results on Micro Focus Fortify  
Software Security Center  
21.2.0  
21.1.0  
Updated:  
l
users to issues  
Updated:  
l
l
l
l
Focus Fortify ScanCentral SAST  
solution  
ScanCentral SAST  
"BIRT Reports" on page 67 - Report template renamed CWE Top 25  
to accommodate multiple versions now supported  
20.2.0  
Updated:  
l
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 8 of 96  
 
User Guide  
Change Log  
Software Release /  
Document Version  
Changes  
authentication token  
l
l
l
l
l
l
"Adding a Custom Tag" on page 60 - New ability to make a custom  
"BIRT Reports" on page 67 - Added a description of a new  
Replaced all references to Micro Focus Fortify ScanCentral with the  
new product name: Fortify ScanCentral SAST  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 9 of 96  
Chapter 1: Introduction  
This guide describes how to use the Fortify Extension for Visual Studio to scan and analyze your  
project source code to uncover security vulnerabilities (issues), which you can then evaluate and  
remediate.  
This section contains the following topics:  
Fortify Extension for Visual Studio  
The Fortify Extension for Visual Studio works with the Visual Studio integrated development  
environment (IDE). The extension integrates into the Visual Studio IDE as a software extension.  
Software security analysis typically consists of the following phases:  
l
Analysis—Scan a codebase for vulnerabilities  
l
Auditing—Review the analysis results to eliminate false positives and prioritize remediation efforts  
Remediation—Fix and eliminate security vulnerabilities in your code  
l
The Fortify Extension for Visual Studio uses Micro Focus Fortify Static Code Analyzer and Fortify  
Secure Coding Rulepacks to locate security vulnerabilities in your solutions and projects (includes  
support for the following languages: C/C++, C#, Visual Basic (VB.NET), and ASP.NET). The analysis  
results are displayed in Visual Studio and include a list of issues uncovered, descriptions of the  
vulnerability type each issue represents, and suggestions on how to fix them.  
Your organization can also use the Fortify Extension for Visual Studio with Micro Focus Fortify  
Software Security Center to manage applications and assign specific issues to developers. You can  
connect with Fortify Software Security Center to review the reported vulnerabilities and implement  
appropriate solutions from Visual Studio.  
Fortify Security Content  
Micro Focus Fortify Static Code Analyzer uses a knowledge base of rules to enforce secure coding  
standards applicable to the codebase for static analysis. Fortify Security Content consists of Fortify  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 10 of 96  
 
 
 
User Guide  
Chapter 1: Introduction  
Secure Coding Rulepacks and external metadata:  
l
Secure Coding Rulepacks describe general secure coding idioms for popular languages and public  
APIs  
l
External metadata includes mappings from the Fortify vulnerability categories to alternative  
categories (such as CWE, OWASP Top 10, and PCI)  
Fortify provides the ability to write custom rules that add to the functionality of Fortify Static Code  
Analyzer and the Secure Coding Rulepacks. For example, you might need to enforce proprietary  
security guidelines or analyze a project that uses third-party libraries or other pre-compiled binaries  
that are not already covered by the Secure Coding Rulepacks. You can also customize the external  
metadata to map Fortify issues to different taxonomies, such as internal application security  
standards or additional compliance obligations. For instructions on how to create your own custom  
rules or custom external metadata, see the Micro Focus Fortify Static Code Analyzer Custom Rules  
Guide.  
If you are using collaborative auditing with Micro Focus Fortify Software Security Center, make sure  
that any custom rules or external metadata changes are also made in Fortify Software Security  
Center.  
Typically, you obtain the current Fortify Security Content when you install Fortify Extension for Visual  
Studio. For information about updating Fortify Security Content, see "Updating Security Content" on  
About Analyzing the Source Code  
You analyze the source code from Visual Studio at the solution or project level. A security analysis  
with Micro Focus Fortify Static Code Analyzer consists of the following main phases:  
l
Translate all .NET files and other existing supported files, such as T-SQL, into intermediate files  
l
Scan the intermediate files to complete the security analysis  
There are two ways to analyze your source code:  
l
Use the locally installed Fortify Static Code Analyzer to perform the entire analysis (translation and  
scan phases). For information about how to configure and run the analysis locally, see "About  
After the scan is complete, Fortify Extension for Visual Studio displays the analysis results in Visual  
Studio.  
l
Use Micro Focus Fortify ScanCentral SAST to perform the entire analysis (translation and scan  
phases) or only the scan phase. For information about how to configure and run the analysis using  
Note: If you use Fortify ScanCentral SAST to perform only the scan phase, then the Fortify  
Extension for Visual Studio performs the translation phase using the locally installed Fortify  
Static Code Analyzer.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 11 of 96  
 
User Guide  
Chapter 1: Introduction  
To view the analysis results, configure the Fortify Extension for Visual Studio to upload the analysis  
results to a Micro Focus Fortify Software Security Center server (see "Remediating Results from  
Alternatively, you can use the provided job token in the Fortify ScanCentral SAST command-line  
interface to retrieve the analysis results (FPR) file, and then open them in Visual Studio (see  
Installation  
You install the Fortify Extension for Visual Studio by selecting the extension during the Micro Focus  
Fortify Static Code Analyzer and Applications installation (which includes Audit Workbench and other  
plugins that you can install). For installation instructions, see the Micro Focus Fortify Static Code  
Analyzer User Guide.  
During the Fortify Static Code Analyzer installation, make sure that you select the extension that  
corresponds to the Visual Studio version installed on your system.  
If you plan to scan your code from Visual Studio, make sure that you select the Update security  
content after installation? check box at the end of the Micro Focus Fortify Static Code Analyzer and  
Applications installation unless your administrator has set up an alternative way to deliver Fortify  
Security Content to you (see "Updating Security Content" on page 21).  
Upgrades  
After you install the Fortify Extension for Visual Studio, when you subsequently upgrade Micro Focus  
Fortify Static Code Analyzer and select to also install the Fortify Extension for Visual Studio, the new  
version of the extension is automatically upgraded. You can upgrade Fortify Static Code Analyzer  
(along with Audit Workbench and any plugins you have installed) manually or automatically from  
Audit Workbench. For instructions, see the Micro Focus Fortify Audit Workbench User Guide.  
Related Documents  
This topic describes documents that provide information about Micro Focus Fortify software  
products.  
Note: You can find the Micro Focus Fortify Product Documentation at  
https://www.microfocus.com/support/documentation. Most guides are available in both PDF and  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 12 of 96  
 
 
 
User Guide  
Chapter 1: Introduction  
All Products  
The following documents provide general information for all products. Unless otherwise noted, these  
documents are available on the Micro Focus Product Documentation website.  
Document / File Name  
Description  
About Micro Focus Fortify Product  
Software Documentation  
This paper provides information about how to access  
Micro Focus Fortify product documentation.  
About_Fortify_Docs_<version>.pdf  
Note: This document is included only with the  
product download.  
Micro Focus Fortify License and  
Infrastructure Manager Installation  
and Usage Guide  
This document describes how to install, configure, and use  
the Fortify License and Infrastructure Manager (LIM),  
which is available for installation on a local Windows  
server and as a container image on the Docker platform.  
LIM_Guide_<version>.pdf  
Micro Focus Fortify Software System This document provides the details about the  
Requirements  
environments and products supported for this version of  
Fortify Software.  
Fortify_Sys_Reqs_<version>.pdf  
Micro Focus Fortify Software Release This document provides an overview of the changes made  
Notes  
to Fortify Software for this release and important  
information not included elsewhere in the product  
documentation.  
FortifySW_RN_<version>.pdf  
What’s New in Micro Focus Fortify  
Software <version>  
This document describes the new features in Fortify  
Software products.  
Fortify_Whats_New_<version>.pdf  
Micro Focus Fortify ScanCentral SAST  
The following document provides information about Fortify ScanCentral SAST. Unless otherwise  
noted, these documents are available on the Micro Focus Product Documentation website at  
Document / File Name  
Description  
Micro Focus Fortify ScanCentral SAST This document provides information about how to install,  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 13 of 96  
 
 
User Guide  
Chapter 1: Introduction  
Document / File Name  
Description  
Installation, Configuration, and Usage configure, and use Fortify ScanCentral SAST to streamline  
Guide  
the static code analysis process. It is written for anyone  
who intends to install, configure, or use Fortify  
ScanCentral SAST to offload the resource-intensive  
translation and scanning phases of their Fortify Static  
Code Analyzer process.  
SC_SAST_Guide_<version>.pdf  
Micro Focus Fortify Software Security Center  
The following document provides information about Fortify Software Security Center. Unless  
otherwise noted, these documents are available on the Micro Focus Product Documentation website  
Document / File Name  
Description  
Micro Focus Fortify Software  
Security Center User Guide  
This document provides Fortify Software Security Center  
users with detailed information about how to deploy and use  
Software Security Center. It provides all of the information  
you need to acquire, install, configure, and use Software  
Security Center.  
SSC_Guide_<version>.pdf  
It is intended for use by system and instance administrators,  
database administrators (DBAs), enterprise security leads,  
development team managers, and developers. Software  
Security Center provides security team leads with a high-level  
overview of the history and current status of a project.  
Micro Focus Fortify Static Code Analyzer  
The following documents provide information about Fortify Static Code Analyzer. Unless otherwise  
noted, these documents are available on the Micro Focus Product Documentation website at  
Document / File Name  
Description  
Micro Focus Fortify Static Code  
Analyzer User Guide  
This document describes how to install and use Fortify  
Static Code Analyzer to scan code on many of the major  
programming platforms. It is intended for people  
responsible for security audits and secure coding.  
SCA_Guide_<version>.pdf  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 14 of 96  
 
User Guide  
Chapter 1: Introduction  
Document / File Name  
Description  
Micro Focus Fortify Static Code  
Analyzer Custom Rules Guide  
This document provides the information that you need to  
create custom rules for Fortify Static Code Analyzer. This  
guide includes examples that apply rule-writing concepts  
to real-world security issues.  
SCA_Cust_Rules_Guide_<version>.zip  
Note: This document is included only with the  
product download.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 15 of 96  
Chapter 2: Using the Fortify Extension for  
Visual Studio  
Use the Fortify Extension for Visual Studio to perform Micro Focus Fortify Static Code Analyzer scans,  
review and audit analysis results, and remediate issues in Visual Studio.  
This section contains the following topics:  
Working with Fortify Software Security Center  
You need to configure a connection to Micro Focus Fortify Software Security Center to perform any of  
the following tasks:  
l
Upload your analysis results to Fortify Software Security Center  
l
Audit applications collaboratively using Fortify Software Security Center  
l
Update your Fortify Security Content from Fortify Software Security Center  
The following sections describe how to configure a connection to the Fortify Software Security Center  
server, the different ways to login to Fortify Software Security Center and how to synchronize your  
work on audit projects with Fortify Software Security Center.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 16 of 96  
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Configuring a Connection to Fortify Software Security Center  
Before you can upload to or access the audit results on Micro Focus Fortify Software Security Center,  
you need to configure your connection to Fortify Software Security Center.  
To configure a connection to Fortify Software Security Center:  
1. From the Fortify extension menu, select Options.  
2. In the left pane, select Server Configuration.  
3. Under Software Security Center, specify the Server URL for Fortify Software Security Center.  
Tip: Click Test Connection to confirm that the URL is valid and you can successfully connect  
to the Fortify Software Security Center server.  
4. Click OK.  
Logging in to Fortify Software Security Center  
The first time you perform an operation that requires a connection to Fortify Software Security Center  
such as uploading an audit project or opening a collaborative application, you are prompted to log in.  
To log in to Fortify Software Security Center:  
1. From the Login method list, select the login method set up for you on Fortify Software Security  
Center.  
2. To save your login information, select the Save login method check box.  
The Fortify Extension for Visual Studio saves your login information for all future use of this  
extension until you install a new Fortify Extension for Visual Studio.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 17 of 96  
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
3. Depending on the login method you selected, do one of the following:  
Login Method  
Procedure  
Username/Password  
Type your Fortify Software Security Center user name and  
password.  
Authentication Token  
Specify the decoded value of a Fortify Software Security  
Center authentication token of type ToolsConnectToken.  
Note: For instructions about how to create an authentication  
token from Fortify Software Security Center, see the Micro  
Focus Fortify Software Security Center User Guide  
X.509 SSO  
Fortify Software Security Center must be configured to use X.509  
Certification-based SSO.  
Note: Your certificate must be in the current user certificate  
store and in the Personal store.  
a.  
Click Browse for Certificate  
.
b. Select the certificate for the sign-on, and then click OK.  
Kerberos SSO  
Fortify Software Security Center must be configured to use  
SPNEGO-based Kerberos authentication.  
Note: Support for Kerberos SSO is limited to Windows  
systems.  
4. Click OK to connect to Fortify Software Security Center.  
Synchronizing with Fortify Software Security Center  
The Fortify Extension for Visual Studio supports the ability to synchronize the local version of your  
project with the corresponding application version on the Micro Focus Fortify Software Security  
Center server. With synchronization to the server enabled, each time you load, merge, scan, or save  
your project locally on your system, the extension automatically uploads your changes to the version  
of your project on the server. This automatic synchronization prevents work loss during a power  
outage and enables you to work locally and synchronize your work when you connect later.  
If synchronization is enabled, then when you perform a scan, partial scan, save, or merge on your  
project, a dialog box prompts you to specify whether you want to auto-synchronize your project with  
the server.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 18 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
To change whether synchronization occurs automatically with the server:  
1. From the Fortify extension menu, select Options.  
2. In the left pane, select Project Configuration.  
3. Select the Synchronization Options tab.  
4. Either clear the Auto Synchronize all Projects with Server Application check box to disable  
automatic synchronization or select it to enable automatic synchronization.  
You can customize which action synchronizes your local version project with the server. For instance,  
you can customize so that synchronization occurs only when you merge or scan a project.  
To customize the actions that trigger synchronization with the server:  
1. From the Fortify extension menu, select Options.  
2. In the left pane, select Project Configuration.  
3. Select the Synchronization Options tab.  
4. Select any action to exclude from automatic synchronization, and then click OK.  
Configuring Security Content Updates  
You can configure the server from which to update security content and whether to have the security  
content updated from a server automatically.  
To update security content from your local system (if you do not have an internet connection or a  
Micro Focus Fortify Software Security Center server), see "Updating Security Content" on page 21.  
To configure the server from where you will obtain security content:  
1. From the Fortify extension menu, select Options.  
The Options dialog box opens to the Server Configuration section.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 19 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
2. To update security content from your Fortify Software Security Center server, do the following:  
a. Under Security Content Update, select the Update from Software Security Center check  
box.  
b. Under Software Security Center, specify the Server URL for Fortify Software Security  
Center (for example, http://my.domain.com:8080/ssc).  
3. To specify a server from which to update security content, under Security Content Update, do  
the following:  
a. Select the Update from Fortify Update Server check box.  
b. In the Server URL box, type the URL for the Fortify Rulepack update server.  
4. To update security content from a server automatically and with a specific frequency:  
a. Under Security Content Update, select the Update security content automatically check  
box.  
b. In the Update Frequency (Days) box, specify how often to update the security content.  
See Also  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 20 of 96  
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Updating Security Content  
To optimize the Fortify Extension for Visual Studio functionality to scan with Micro Focus Fortify  
Static Code Analyzer, you must have up-to-date security content. You can update Fortify security  
content from a configured server or from your local system.  
To update security content:  
1. From the Fortify extension menu, select Options.  
2. In the left pane, select Security Content Management.  
3. To update Fortify security content from a server, do the following:  
a. (Optional) From the Locale list, select the language you want for the Fortify Security  
Content.  
By default, English is the selected language.  
b. Click Update.  
All existing security content is replaced with the Fortify security content from the server.  
4. To update Fortify security content from your local system, under Update Security Content from  
Local System, do the following:  
a. Click Fortify Security Content.  
b. Navigate to a Fortify security content ZIP file, and then click Open.  
5. Click OK to accept the update confirmation message.  
Any existing custom security content is unchanged.  
See Also  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 21 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Importing Custom Security Content  
You can import custom security content to use in your scans. Fortify Extension for Visual Studio  
stores custom rules in the <sca_install_dir>\Core\config\customrules directory.  
Note: To import custom external metadata, you must place your external metadata file in the  
<sca_install_dir>\Core\config\CustomExternalMetadata directory.  
To import custom rules:  
1. From the Fortify extension menu, select Options.  
2. In the left pane, select Security Content Management.  
3. Under Update Security Content from Local System, click Custom Security Content.  
The Select Security Content dialog box opens.  
4.  
Select the custom rules files to import (*.xml and *.bin), and then click Open.  
About Scanning Locally  
This section describes how to perform a scan of your source code on the local system. In the analysis  
configuration, you can specify the SQL type, how much memory to use for the scan, select the security  
content you want to use, whether you want to scan in quick scan mode, and other advanced scanning  
options.  
Fortify strongly recommends that you periodically update the security content, which contains Fortify  
Secure Coding Rulepacks and external metadata. For information about how to update the security  
About Quick Scan Mode  
Quick scan mode provides a way to quickly scan your projects for critical- and high-priority issues.  
Fortify Static Code Analyzer performs the scan faster by reducing the depth of the analysis and  
applying the Quick View filter set. Quick scan settings are configurable. For more details about the  
configuration of quick scan mode, see the Micro Focus Fortify Static Code Analyzer User Guide.  
Quick scans are a great way to get many applications through an assessment so that you can quickly  
find issues and begin remediation. The performance improvement you get depends on the complexity  
and size of the application. Although the scan is faster than a full scan, it does not provide as robust a  
result set. Other issues that a quick scan cannot detect might exist in your application. Fortify  
recommends that you run full scans whenever possible.  
Note: By default, Micro Focus Fortify Software Security Center ignores uploaded scans performed  
in quick scan mode. However, you can configure your Fortify Software Security Center application  
version so that it processes uploaded audit projects scanned in quick scan mode. For more  
information, see analysis results processing rules in the Micro Focus Fortify Software Security  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 22 of 96  
 
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Center User Guide.  
You can use quick scan mode for scans that use a locally installed Fortify Static Code Analyzer. Audit  
quick analysis results just as you audit full analysis results. To perform a quick scan, see "Configuring  
Configuring Local Scan Options  
Use the analysis configuration to customize the security content, specify the SQL type, and specify  
the amount of memory Micro Focus Fortify Static Code Analyzer uses during a local scan.  
To configure the analysis options:  
1. With a solution open in Visual Studio, select Options from the Fortify extension menu.  
2. In the left pane, select Project Configuration.  
The Project Configuration dialog box opens to show the Analysis Configuration tab.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 23 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
3. To specify the scope of the configuration, do one of the following:  
l
To configure the settings for the projects in the open solution only, select the Enable Project  
Specific Settings check box.  
l
To change the default scan configuration for all projects scanned from this Visual Studio  
instance, click Configure Defaults.  
4. By default, Fortify Static Code Analyzer treats SQL files as T-SQL. If your files use PL/SQL, from  
the SQL Type list, select PL/SQL.  
Note: The SQL Type setting notifies Fortify Static Code Analyzer about the SQL type that  
the project uses. Fortify Static Code Analyzer only scans SQL code if it is included in the  
project.  
5. To specify the amount of memory to use for the scan, type an integer in the Memory (MB) box.  
Note: Do not allocate more than two thirds of the available physical memory.  
6. To customize the security content that you want to use, clear the Use all installed security  
content check box, and then select the Secure Coding Rulepacks and any specific custom  
security content that you want to use.  
7. Click OK.  
Configuring Advanced Local Scan Options  
Use the advanced scan options to enable or disable quick scan mode and customize Fortify Static  
Code Analyzer translation and scan command-line options.  
To change the advanced translation and scan options:  
1. With a solution open in Visual Studio, select Options from the Fortify extension menu.  
2. In left pane, select Project Configuration.  
3. To specify the scope of the settings, do one of the following:  
l
To customize the settings for the projects in the open solution only, select Enable Project  
Specific Settings.  
l
To change the default scan settings for all projects scanned from this Visual Studio instance,  
click Configure Defaults.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 24 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
4. Select the Advanced Scan Options tab.  
5. Select the Use Additional SCA Options check box and type Fortify Static Code Analyzer  
command-line options for either the translation or scan phase.  
Note: These options are also included in a Fortify ScanCentral SAST analysis.  
For detailed information about the available Fortify Static Code Analyzer options and the proper  
syntax, see the Micro Focus Fortify Static Code Analyzer User Guide.  
Under Local Scan Options, the Command-Line Preview box shows the complete Fortify Static  
Code Analyzer scan command line.  
6. (Optional) In the Build ID box, type a build ID for the scan.  
The default build ID is the name of the project or solution.  
7. To disable merging the results of the next scan you run with results from the previous scan, clear  
the Merge with Previous Scan check box.  
By default, when you rescan a project from Visual Studio, the scan merges results from the  
previous scan with the results from the new scan. This enables you to see specifically which  
issues have been fixed and which issues were introduced since the earlier scan.  
8. To perform a quick scan, select the Enable Quick Scan Mode check box.  
For information about quick scans, see "About Quick Scan Mode" on page 22.  
9. Click OK to save the advanced scan options.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 25 of 96  
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Scanning Projects or Solutions Locally  
Before you perform the scan, make sure that the active solution configuration is valid for the projects  
loaded in the solution. If the configuration is invalid, Fortify Static Code Analyzer cannot successfully  
scan the solution and a message indicating that the configuration is invalid is written to the log file.  
Note: Micro Focus Fortify Static Code Analyzer runs scans in a Java Virtual Machine (JVM).  
To scan a solution or project on the local system, start the scan in one of the following ways:  
l
To scan at the solution level, select Analyze Solution from the Fortify extension menu.  
l
To scan at the project level, select a project, and then select Analyze Project from the Fortify  
extension menu.  
After the scan has finished, the Fortify Extension for Visual Studio displays the results in the auditing  
interface.  
You can now audit the analysis results in Visual Studio. For instructions, see "Auditing Issues" on  
page 56. If the codebase was audited before, results from the previous audit are automatically  
integrated with the new analysis results.  
By default, the analysis results are stored as an FPR file in the folder that contains the solution or  
project. To save this file to a different location, select Fortify > Save Audit Project As.  
About Scanning with Fortify ScanCentral SAST  
This section describes the requirements for using Micro Focus Fortify ScanCentral SAST to analyze  
your code and to upload the analysis results to Micro Focus Fortify Software Security Center. For  
instructions about how to configure the Fortify ScanCentral SAST options, see "Configuring Fortify  
With Fortify Extension for Visual Studio, you can either:  
l
Perform the entire analysis (translation and scan) with Fortify ScanCentral SAST  
l
Perform the translation locally and then automatically upload the translated project to Fortify  
ScanCentral SAST for the scan phase  
You must translate the project or solution locally if it uses a language that Fortify ScanCentral  
SAST does not support for remote translation. For a list of languages supported with remote  
translation, see the Micro Focus Fortify Software System Requirements document.  
Make sure that the Fortify Security Content version on the local system is the same as the version  
on the Fortify ScanCentral sensor. Fortify strongly recommends that you periodically update the  
security content. For information about how to update the security content locally, see "Updating  
Security Content" on page 21. Use the fortifyupdate utility to update security content on the  
ScanCentral sensor (see the Micro Focus Fortify Static Code Analyzer User Guide).  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 26 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
To analyze your code with Fortify ScanCentral SAST, you need the following:  
l
A properly configured Fortify ScanCentral SAST installation. For more information, see the Micro  
Focus Fortify ScanCentral SAST Installation, Configuration, and Usage Guide.  
l
To connect to Fortify ScanCentral SAST, you need either:  
l
A ScanCentral Controller URL  
Important! If the ScanCentral Controller uses an SSL connection from an internal certificate  
authority or a self-signed certificate, you must add the certificate to the Java Keystore for  
Fortify Static Code Analyzer (in <sca_install_dir>/jre/lib/security/cacerts). For  
more information, see the Micro Focus Fortify ScanCentral SAST Installation, Configuration,  
and Usage Guide.  
l
A Fortify Software Security Center URL and an authentication token of type  
ToolsConnectToken  
To configure the Fortify Software Security Center URL, see "Configuring a Connection to Fortify  
token, see the Micro Focus Fortify Software Security Center User Guide.  
Important! If the Fortify Software Security Center or the ScanCentral Controller uses an  
SSL connection from an internal certificate authority or a self-signed certificate, you must  
add the certificate to the Java Keystore for Fortify Static Code Analyzer (in <sca_  
install_dir>/jre/lib/security/cacerts). For more information, see the Micro Focus  
Fortify Software Security Center User Guide or the Micro Focus Fortify ScanCentral SAST  
Installation, Configuration, and Usage Guide.  
To send the analysis results to a Fortify Software Security Center server, you need the following:  
l
A Fortify Software Security Center URL or a ScanCentral Controller that is integrated with a Fortify  
Software Security Center server  
Note: Fortify recommends that the Fortify Software Security Center URL configured in the  
Server Configuration options is the same as the Fortify Software Security Center server  
integrated with the ScanCentral Controller.  
l
A Fortify Software Security Center authentication token of type ToolsConnectToken  
For instructions on how to create an authentication token, see the Micro Focus Fortify Software  
Security Center User Guide.  
l
An application and application version that exists in Fortify Software Security Center  
l
Permission to access the application and application version to which you want to upload  
Configuring Fortify ScanCentral SAST Options  
This section describes how to configure the default Fortify ScanCentral SAST options to use when  
you submit a solution or project for analysis to Fortify ScanCentral SAST. You can specify the  
translation type (local or remote), the Fortify Static Code Analyzer translation and scan options, the  
sensor pool selection, and whether to upload analysis results to Fortify Software Security Center. To  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 27 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
change the analysis options and perform a scan for a specific solution, see "Advanced Scanning of  
To configure the Fortify ScanCentral SAST options:  
1. From the Fortify extension menu, select Options.  
2. In the left pane, select ScanCentral SAST Configuration.  
3. Select Enable ScanCentral SAST Upload.  
4. To specify how to connect to Fortify ScanCentral SAST, do one of the following:  
l
Select Use Controller URL, and then in the Controller URL box, type the URL for the  
ScanCentral Controller.  
Example: https://<controller_host>:<port>/scancentral-ctrl  
Tip: Click Test Controller Connection to confirm that the URL is valid, and the Controller  
is accessible.  
l
Select Get Controller URL from SSC, and then in the Token box, paste the decoded token  
value for an authentication token of type ToolsConnectToken.  
Make sure that you have the Fortify Software Security Center URL that is associated with the  
ScanCentral Controller provided in the Server Configuration options (see "Configuring a  
Tip: Click Test SSC Connection to confirm that the URL and token is valid, and the server  
is accessible.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 28 of 96  
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
5. To upload the analysis results to Fortify Software Security Center, select the Send Scan Results  
to SSC check box.  
l
In the Token box, paste the decoded token value for an authentication token of type  
ToolsConnectToken.  
Note: If you connect to Fortify ScanCentral SAST using a Controller URL, Fortify  
Extension for Visual Studio uploads analysis results to the Fortify Software Security  
Center server specifically integrated with the ScanCentral Controller.  
6. Under Default Translation Type, specify where to run the translation phase of the analysis by  
selecting one of the following:  
l
Local—Run the translation phase on the local system and the scan phase with Fortify  
ScanCentral SAST.  
l
Remote—Run the entire analysis using Fortify ScanCentral SAST.  
7. (Optional) To specify Fortify Static Code Analyzer command-line options for the translation or  
scan phase:  
a. Click Advanced Scan Options.  
The Project Configuration page opens to the Advanced Scan Options tab.  
b. Select the Use Additional SCA Options check box and type Fortify Static Code Analyzer  
command-line options for the translation or scan phase.  
For detailed information about the available Fortify Static Code Analyzer options and the  
proper syntax, see the Micro Focus Fortify Static Code Analyzer User Guide.  
c. In the left pane, select ScanCentral SAST Configuration to return to the Fortify ScanCentral  
SAST option configuration.  
8. Under Sensor Pool, specify whether to use the default sensor pool or be provided a list of sensor  
pools to choose from when you start a scan with Fortify ScanCentral SAST.  
9. (Optional) in the Notification Email box, type an email address to receive job status  
notifications.  
10. Click OK to save your configuration.  
Scanning Projects or Solutions with Fortify ScanCentral SAST  
Before you can scan your project or solution with Fortify ScanCentral SAST, you must configure the  
Fortify ScanCentral SAST options as described in "Configuring Fortify ScanCentral SAST Options" on  
page 27. In addition, make sure that the active solution configuration is valid for the projects loaded in  
the solution. If the configuration is invalid, Fortify Static Code Analyzer cannot successfully scan the  
solution and a message indicating that the configuration is invalid is written to the log file.  
To scan a project or solution with Fortify ScanCentral SAST:  
1. To start the scan with Fortify ScanCentral SAST, do one of the following:  
l
To scan at the solution level, select ScanCentral > Upload Solution from the Fortify  
extension menu.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 29 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
l
To scan at the project level, select a project and then select ScanCentral > Upload Project  
from the Fortify extension menu.  
l
To scan at the solution level with custom Fortify ScanCentral SAST options for this solution,  
2. If prompted, select the application version where you want to upload the analysis results, and  
then click OK.  
3. If prompted, select a sensor pool from the Select Sensor Pool dialog box, and then click OK.  
Note: The following Select Sensor Pool dialog box contains sample sensor pool names.  
To view the analysis results, you can either:  
l
Copy the provided job token and use it in the Fortify ScanCentral SAST command-line interface to  
retrieve the analysis results (see the Micro Focus Fortify ScanCentral SAST Installation,  
Configuration, and Usage Guide). You can then open the analysis results in Fortify Extension for  
Visual Studio (see "Opening Audit Projects" on page 79).  
l
If you uploaded the analysis results to Fortify Software Security Center, you can check the status of  
the job (and view the results) on the Fortify Software Security Center server. After the scan is  
complete, you can open the analysis results in Fortify Extension for Visual Studio (see either  
Advanced Scanning of Solutions with Fortify ScanCentral SAST  
You can customize the Fortify ScanCentral SAST scan configuration for the current solution. You can  
adjust the translation type (local or remote), Fortify Static Code Analyzer options for translation and  
scan, whether to upload analysis results to Fortify Software Security Center, and the sensor pool  
selection.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 30 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
To run a customized scan using Fortify ScanCentral SAST:  
1. From the Fortify extension menu, select ScanCentral > Advanced Scan.  
Any existing Fortify ScanCentral SAST configuration options are displayed in the ScanCentral  
SAST Advanced Scan dialog box.  
2. Specify where to run the translation phase of the analysis by selecting one of the following:  
l
Local—Run the translation phase on the local system and the scan phase with Fortify  
ScanCentral SAST.  
l
Remote—Run the entire analysis using Fortify ScanCentral SAST.  
3. To specify Fortify Static Code Analyzer command-line options for the translation or scan phase,  
under SCA Options, type command-line options for the translation and scan phase.  
For detailed information about the available Fortify Static Code Analyzer options and the proper  
syntax, see the Micro Focus Fortify Static Code Analyzer User Guide.  
4. To upload the analysis results to Fortify Software Security Center, select the Send Scan Results  
to SSC check box.  
Important! Make sure you have the following configured an authentication token in the  
ScanCentral SAST Configuration options (see "Configuring Fortify ScanCentral SAST  
5. Specify whether to use the default sensor pool or be prompted to select a sensor pool from a list.  
6. Click Scan.  
7. If prompted, select the application version where you want to upload the analysis results, and  
then click OK.  
8. If prompted, select a sensor pool from the Select Sensor Pool dialog box, and then click OK.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 31 of 96  
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
To view the analysis results, you can either:  
l
Copy the provided job token and use it in the Fortify ScanCentral SAST command-line interface to  
retrieve the analysis results (see the Micro Focus Fortify ScanCentral SAST Installation,  
Configuration, and Usage Guide). You can then open the analysis results in Fortify Extension for  
Visual Studio (see "Opening Audit Projects" on page 79).  
l
If you uploaded the analysis results to Fortify Software Security Center, you can check the status of  
the job (and view the results) on the Fortify Software Security Center server. After the scan is  
complete, you can open the analysis results in Fortify Extension for Visual Studio (see either  
Viewing Analysis Results  
After a scan has been performed (or after you open an existing audit project), a summary of the  
analysis results is displayed in the Analysis Results window and in the Project Summary window. The  
Analysis Trace and Issue Auditing windows are open, but do not contain any information until you  
select an issue from the Analysis Results window.  
Window  
For More Information  
Analysis Trace  
Issue Auditing  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 32 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Analysis Results Window  
The Analysis Results window enables you to group, filter, and select the issues you want to audit.  
Filter Sets  
The selected filter set controls which issues the Analysis Results window displays. The filter set  
determines the number and types of containers (folders) and how issues are displayed.  
Each project can have unique sets because the filter sets are saved in an audit project results file.  
The filter sets sort the issues into Critical, High, Medium, and Low folders, based on potential  
severity. All default filter sets have the same sorting mechanism.  
The Fortify Extension for Visual Studio provides the following filter sets:  
l
Quick View—This is the default filter set for new projects. The Quick View filter set provides a  
view only of issues in the Critical folder (these have a potentially high impact and a high likelihood  
of occurring) and the High folder (these have a potentially high impact and a low likelihood of  
occurring). The Quick View filter set provides a useful first look at results that enables you to  
quickly address the most serious issues.  
l
Security Auditor View— This view shows all security issues detected. The Security Auditor View  
filter contains no visibility filters, and therefore all issues are shown.  
If you open an FPR file that contains no custom filtertemplate.xml file or if you open an FVDL file  
or a webinspect.xml file, the audit project results open with the Quick View filter set selected.  
For information about how to create your own filter sets, see "Creating a Filter Set" on page 62.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 33 of 96  
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Folders (Tabs)  
The tabs on the Analysis Results window are called folders. You can customize the settings for the  
color-coded folders. The number of folders, names, colors, and the issue list can vary between filter  
sets and audit projects. For information about how to create your own folders, see "Creating a Folder"  
Within each color-coded folder, issues are grouped into subfolders. At the end of each folder name,  
enclosed in brackets, is the number of audited issues and the total number of issues in the folder. For  
example, a folder with the name Command Injection - [1 / 3] indicates that one issue out of three  
categorized as Command Injection has been audited.  
Each folder contains a list of issues. An issue is sorted into a folder if its attributes match the folder  
filter conditions. One folder in each filter set is the default folder, indicated by (default) in the  
folder name. If an issue does not match any of the folder filters, the issue is listed in the default folder.  
Note: To show or hide suppressed, hidden, and removed issues, use the visibility menu ( ). For  
more information, see "Customizing the Issues Display" below.  
Group By List  
The Group By option sorts the issue list into subfolders. The selected option is applied to all visible  
folders. Use the <none> option to list all issues in the folder without any groups. The Group By  
settings are for the application instance. You can apply the Group By option to any audit project  
opened with that instance of the application.  
You can customize the existing groups by changing which attributes the groups are sorted by, adding  
or removing the attributes to create sub-groupings, and adding your own group options.  
Customizing the Issues Display  
You can customize the issues displayed in the Analysis Results window. Determine which issues it  
displays by using the visibility menu ( ) in the Analysis Results toolbar.  
The visibility options are as follows:  
l
Show Removed Issues—Shows all the issues you have removed or fixed. If you merged audit data  
into your current audit project, shows all the issues that were removed since the previous analysis.  
l
Show Suppressed Issues—Shows all the issues that you have suppressed.  
l
Show Hidden Issues—Shows all the issues that have been hidden.  
l
Show My Issues—Shows only your issues.  
l
Use Short File Name—References the issues in the Issues view by file name only, instead of by  
relative path. This option is enabled by default.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 34 of 96  
 
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Viewing Project Summary Information  
The Project Summary window provides detailed information about the scan.  
To open the Project Summary dialog box:  
1. Open an audit project file (FPR, FVDL, or XML).  
2. From the Fortify extension menu, select Project Summary.  
The following table describes the information provided on the Project Summary tabs.  
Tab  
Description  
Summary  
Certification  
Displays high level audit project information.  
Displays the result certification status. Results certification is a check to  
make sure that the analysis has not been altered since Fortify Static Code  
Analyzer produced it.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 35 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Tab  
Description  
Build Information  
Displays the following scan information:  
l
Build details such as the build ID, number of files scanned, lines of code,  
and the date of the scan, which might be different than the date the  
files were translated  
l
List of files scanned with file sizes and timestamps  
l
Libraries referenced for the scan  
Analysis Information  
Displays the Fortify Static Code Analyzer version, computer details, and  
the name of the user who performed the scan. The Analysis Information  
subtabs contain the following information:  
l
Security Content—Lists information about the Rulepacks (including  
the Rulepack name, version, ID, and SKU) and the external metadata  
used in the scan  
l
Properties—Displays the Micro Focus Fortify Static Code Analyzer  
properties files settings  
l
Commandline Arguments—Displays the command-line options used to  
scan the project  
l
Warnings—Lists all errors and warnings that occurred during the  
analysis. To view more information about an item, click it.  
Analysis Trace Window  
When you select an issue, the Analysis Trace window displays the trace that the analyzer used to  
detect the issue.  
This trace is presented in sequential order. For dataflow issues, this trace is a presentation of the path  
that the tainted data follows from the source function to the sink function. For example, when you  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 36 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
select an issue that is related to potentially tainted dataflow, the Analysis Trace window shows the  
direction of the dataflow in this section of the source code.  
The Analysis Trace window uses the icons described in the following table to show how the dataflow  
moves in this section of the source code or execution order.  
Icon  
Description  
Data is assigned to a field or variable  
Information is read from a source external to the code (HTML form, URL, and so on)  
Data is assigned to a globally scoped field or variable  
A comparison is made  
The function call receives tainted data  
The function call returns tainted data  
Passthrough, tainted data passes from one parameter to another  
Note: This is typically shown as functionA(x : y) to indicate that data is transferred  
from x to y. The x and y values are either:  
l
An argument index  
l
return—The return value of a function  
l
this—The instance of the current object  
l
A specific object field or key  
An alias is created for a memory location  
Data is read from a variable  
Data is read from a global variable  
Tainted data is returned from a function  
A pointer is created  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 37 of 96  
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Icon  
Description  
A pointer is dereferenced  
The scope of a variable ends  
The execution jumps  
A branch is taken in the code execution  
A branch is not taken in the code execution  
Generic  
A runtime source, sink, or validation step  
Taint change  
The Analysis Trace window can contain inductions. Inductions provide supporting evidence for their  
parent nodes. Inductions consist of:  
l
A text node displayed in italics as a child of the trace node. This text node is expanded by default.  
l
An induction trace, displayed as a child of the text node.  
To display the induction reference information for that induction, click it.  
Issue Auditing Window  
The Issue Auditing window displays detailed information about each issue on the following tabs:  
l
The Audit tab displays information about the selected issue and enables auditors to add an audit  
evaluation, comments, and custom tag values.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 38 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
The following table describes the elements of the Audit tab.  
Element  
Issue  
Description  
Displays the issue location, which includes the file name and line number.  
Analysis  
Lists values that the auditor can use to assess the issue. Valid values for  
the Analysis tag are Not an Issue, Reliability Issue, Bad Practice,  
Suspicious, and Exploitable.  
<custom_tagname> Displays any custom tags if defined for the audit project.  
If the audit results have been submitted to Audit Assistant in Micro  
Focus Fortify Software Security Center, then in addition to any other  
custom tags, the tab displays the following tags:  
l
AA_Prediction—Exploitability level that Audit Assistant assigned to  
the issue. You cannot change this tag value.  
l
AA_Confidence—Confidence level from Audit Assistant for the  
accuracy of its AA_Prediction value. This is a percentage, expressed in  
values that range from 0.000 to 1.000. For example, a value of 0.982  
indicates a confidence level of 98.2 percent. You cannot change this  
tag value.  
l
AA_Training—Whether to include or exclude the issue from Audit  
Assistant training. You can change this value.  
For more information about Audit Assistant tags, see the Micro Focus  
Fortify Software Security Center User Guide.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 39 of 96  
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Element  
Suppress  
File Bug  
Description  
Suppresses the issue.  
Provides access to a supported bug tracking system, such as Bugzilla or  
Azure DevOps Server. For a list of supported bug tracking systems, see  
the Micro Focus Fortify Software System Requirements document.  
Comments  
Appends additional information about the issue as a comment.  
Rule Information  
Shows information, such as the category and kingdom that describes the  
issue.  
More Information  
Recommendations  
Opens the Details tab.  
Opens the Recommendations tab.  
For information about auditing, see "Auditing Issues" on page 56.  
l
The Details tab provides a detailed description of the selected issue and offers guidelines to  
address it.  
The Details tab includes some or all the sections described in the following table.  
Element  
Description  
Abstract/Custom  
Abstract  
Provides a summary of the issue, including any custom abstracts  
defined by your organization.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 40 of 96  
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Element  
Description  
Explanation/Custom  
Explanation  
Provides a description of the conditions in which this type of issue  
occurs.  
This description includes a discussion of the vulnerability, the  
constructs typically associated with it, how it can be exploited, and the  
potential ramifications of an attack.  
This element also includes any custom explanations defined by your  
organization.  
Instance ID  
Provides a unique identifier for the issue.  
Identifies the primary rule that found the issue.  
Includes IMPACT and LIKELIHOOD values.  
Primary Rule ID  
Priority Metadata  
Values  
Legacy Priority  
Includes SEVERITY and CONFIDENCE values.  
Metadata Values  
l
The Recommendations tab provides suggestions and examples of how to secure the vulnerability  
or remedy the bad practice. The recommendations include some or all the sections described in the  
following table.  
Element  
Description  
Recommendations/Custom  
Recommendations  
Provides recommendations for how to resolve this type of issue,  
including examples, and any custom recommendations defined  
by your organization.  
Tips/Custom Tips  
Provides tips for this type of issue, including any custom tips  
defined by your organization.  
References/Custom  
References  
Provides reference information, including any custom references  
defined by your organization.  
l
l
The History tab shows a complete list of audit actions, including details such as the date and time,  
and the name of the user who modified the issue.  
The Diagram tab presents a graphical representation of the node execution order, call depth, and  
expression type of the selected issue. The tab displays information relevant to the rule type. The  
vertical axis shows the execution order.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 41 of 96  
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
For dataflow issues, the trace starts with the first function to call the taint source, then traces the  
calls to the source (blue node) and ends the trace at the sink (red node). In the diagram, the source  
(src) and sink nodes are also labeled. A red X on a vertical axis indicates that the function called  
finished executing.  
The horizontal axis shows the call depth. A line shows the direction that control is passed. If control  
passes with tainted data traveling through a variable the line is red, and when it is without tainted  
data, the line is black.  
The icons used for the expression type of each node in the diagram are the same icons used in the  
Analysis Trace window. To see the icons and the descriptions, see "Analysis Trace Window" on  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 42 of 96  
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
l
The Filters tab displays all the filters in the selected filter set.  
The following table describes the elements of the Filters tab.  
Element  
Description  
Filters  
Displays a list of the visibility and folder filters configured in the selected filter set  
where:  
l
Visibility Filters show or hide issues  
l
Folder Filters sort the issues into the folder tabs in the Analysis Results  
window  
Right-click a filter to show issues that match the filter or to enable, disable, copy, or  
delete it.  
If  
Displays the conditions for the selected filter.  
The first list displays issue attributes, the second list specifies how to match the  
attribute, and the third list shows the value the filter matches.  
Then  
Displays the type of the selected filter, where Hide Issue is a visibility filter and Set  
Folder to is a folder filter.  
For more information about creating filters, see "Creating a Filter from the Filters Tab" on page 63.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 43 of 96  
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Code Editor  
The Code Editor shows the section of code related to the issue selected in the Analysis Results  
window. When multiple nodes represent an issue in the Analysis Trace window, the Code Editor shows  
the code associated with the selected node.  
Grouping Issues  
The items visible in the Analysis Results window vary depending on the selected grouping option.  
The value you select from the Group By list sorts issues in all visible folders into subfolders.  
To list all issues in a folder without any grouping, select <none>.  
You can view issues using any of the Group By options, and you can create and edit customized  
groups. The Group By options enable you to group and view the issues in different ways. The  
following table describes the standard Group By options.  
Option  
Description  
Analysis  
Groups issues by the audit analysis, such as Suspicious, Exploitable,  
and Not an Issue.  
Analysis Type  
Groups issues by analyzer product, such as SCA, WEBINSPECT, and  
SECURITYSCOPE (WebInspect Agent).  
Analyzer  
Groups issues by analyzer group, such as Control Flow, Data Flow,  
Semantic, and Structural.  
App Defender Protected  
Groups issues by whether Application Defender can protect the  
vulnerability category.  
Category  
Groups issues by vulnerability category. This is the default setting.  
A custom group that groups issues by category and then by analyzer.  
Groups issues by custom tag.  
Category Analyzer  
<custom_tagname>  
File Name  
Groups issues by file name.  
Fortify Priority Order  
Groups issues as Critical, High, Medium, and Low based on the  
combined values of Micro Focus Fortify Static Code Analyzer impact  
and likelihood.  
Kingdom  
Groups issues by the Seven Pernicious Kingdoms classification.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 44 of 96  
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Option  
Description  
<metadata_listname>  
Groups issues using the alternative metadata external list names (for  
example, OWASP Top 10 <year>, CWE, PCI SSF <version>,  
STIG <version>, and so on).  
New Issue  
Shows which issues are new since the last scan. For example, if you  
run a new scan, any issues that are new display in the tree under the  
New Issue subfolder and the others are displayed in the Existing  
Issue subfolder. Issues not found in the latest scan are displayed in  
the Removed subfolder.  
Note: If you are remediating results that reside on Fortify  
Software Security Center, these subfolders are named NEW,  
UPDATED, and REMOVED, respectively.  
Package  
Groups issues by package or namespace. Does not appear for projects  
for which this option is not applicable, such as C projects.  
Priority by Category  
A custom group that groups issues by Fortify Priority Order and then  
by category.  
Sink  
Groups issues that share the same dataflow sink functions.  
Groups issues that share the same dataflow source functions.  
Groups issues by the taint flags that they contain.  
Displays a flat view without grouping.  
Source  
Taint Flag  
<none>  
<Edit>  
Use to create a custom grouping option.  
Creating a Custom Group By Option  
You can create a custom Group By option that groups issues in a hierarchical format in sequential  
order based on specific options.  
To create a new Group By option:  
1. From the Group by list, select <Edit>.  
The Edit Custom Groupings dialog box opens.  
2. To create a grouping from a provided set of group types, select a grouping type from the  
Grouping Types list.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 45 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
For example, selecting Category Analyzer group type creates a list that has top-level nodes that  
contain the category of the issue, such as Buffer Overflow, with the issues grouped below by  
analyzer, such as semantic, or dataflow, followed by the issues.  
-Buffer Overflow [0/2]  
--DataFlow [0/1]  
----Main.cs:234  
-+Semantic [0/1]  
3. To create a custom group by option, select Create New from the Grouping Types list, and then  
do the following:  
a. In the Create New dialog box, type a group name, and then click OK.  
b. From the list on the left, select a grouping type, and then click the right arrow to move the  
option to the Grouping Order column.  
c. Repeat step b to select additional grouping types.  
Searching for Issues  
You can use the search box located below the issue tree to find specific issues and to limit the issues  
displayed in a folder. After you type a search term, the label next to the folder name changes to  
indicate the number of issues that match the search as a subset of the total.  
To indicate the type of comparison to perform, wrap the search terms with delimiters. The following  
table shows the syntax to use for the search string.  
Comparison  
contains  
equals  
Description  
Searches for a term without any qualifying delimiters  
Searches for an exact match if the term is wrapped in quotation marks ("")  
regex  
Searches for values that match a Java-style regular expression delimited by a  
forward slash (/)  
Example, /eas.+?/  
Note: This search comparison is not available when you remediate audit  
results stored on Micro Focus Fortify Software Security Center.  
number range  
Searches for a range of numbers using the standard mathematical interval  
notation of parentheses and/or brackets to indicate whether the endpoints are  
excluded or included, respectively.  
Example: (2,4] indicates greater than two and less than or equal to four  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 46 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Comparison  
Description  
not equals  
Excludes issues specified by the string by preceding the string with an  
exclamation character (!)  
Example, file:!Main.java returns all issues that are not in Main.java.  
You can further qualify search terms with modifiers. The syntax for using a modifier is  
modifier:<search_term>. For more information, see "Search Modifiers" below.  
A search string can contain multiple modifiers and search terms. If you specify more than one  
modifier, the search returns only issues that match all the modified search terms. For example,  
file:ApplicationContext.java category:SQL Injection returns only SQL injection issues  
found in ApplicationContext.java.  
If you use the same modifier more than once in a search string, then the search terms qualified by  
those modifiers are treated as an OR comparison. For example, file:ApplicationContext.java  
category:SQL Injection category:Cross-Site Scripting returns SQL injection issues and  
cross-site scripting issues found in ApplicationContext.java.  
For complex searches, you can also insert the AND or the OR keyword between your search queries.  
Note that AND and OR operations have the same priority in searches.  
Search Modifiers  
You can use a search modifier to specify to which issue attribute the search term applies.  
Note: To use a modifier that contains a space in the name, such as the name of the custom tag,  
you must enclose the modifier in brackets. For example, to search for issues that are new, type  
[issue age]:new.  
A search that is not qualified by a modifier matches the search string on the following attributes:  
kingdom, primary rule id, analyzer, filename, severity, class name, function name, instance id, package,  
confidence, type, subtype, taint flags, category, sink, and source.  
l
To apply the search to all modifiers, type a string, such as control flow. This searches all the  
modifiers and returns any results that contain the “control flow” string.  
l
To apply the search to a specific modifier, type the modifier name and the string as follows:  
analyzer:control flow. This returns all results detected by the Control Flow Analyzer.  
The following table lists descriptions of the search modifiers. A few modifiers have a shortened  
modifier name indicated in parentheses in the Modifier column. You can use either modifier name.  
Modifier  
Description  
Searches for issues based on the accuracy value specified (0.1  
through 5.0).  
accuracy  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 47 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Modifier  
Description  
Searches for issues that have the specified audit analysis value  
analysis  
such as exploitable, not an issue, and so on.  
[analysis type]  
analyzer  
Searches for issues by analyzer product such as SCA and  
WEBINSPECT.  
Searches the issues for the specified analyzer such as  
control flow, data flow, structural, and so on.  
Searches for issues based on whether Application Defender  
[app defender protected]  
(def)  
can protect the vulnerability category (protected or not  
protected).  
audience  
Searches for issues based on intended audience such as dev,  
targeted, medium, broad, and so on.  
Note: This metadata is legacy information that is no longer  
used and will be removed in a future release. Fortify  
recommends that you do not use this search modifier.  
audited  
Searches the issues to find true if the primary tag is set and  
false if the primary tag is not set. The default primary tag is  
the Analysis tag.  
Searches for the given category or category substring.  
Searches for issues based on the specified class name.  
Searches the comments submitted on the issue.  
category (cat)  
class  
comments  
(comment, com)  
Searches for issues with comments from a specified user.  
commentuser  
Searches for issues that have the specified confidence value.  
Micro Focus Fortify Static Code Analyzer calculates the  
confidence value based on the number of assumptions made in  
code analysis. The more assumptions made, the lower the  
confidence value.  
confidence (con)  
Searches for issues based on the value of the specified custom  
tag.  
<custom_tagname>  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 48 of 96  
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Modifier  
Description  
You can search a list-type custom tag using a range of values.  
The values of a list-type custom tag are an enumerated list  
where the first value is 0, the second is 1, and so on. You can  
use the search syntax for a range of numbers to search for  
ranges of list-type custom tag values. For example, analysis:  
[0,2] returns the issues that have the values of the first three  
Analysis values, 0, 1, and 2 (Not an Issue, Reliability Issue, and  
Bad Practice).  
To search a date-type custom tag, specify the date in the  
format: yyyy-mm-dd.  
Searches for issues that have the specified dynamic hot spot  
ranking value.  
dynamic  
Searches for issues where the primary location or sink node  
function call occurs in the specified file path.  
file  
Searches for issues that have a priority level that matches the  
specified priority determined by the Fortify analyzers. Valid  
[fortify priority order]  
values are critical, high, medium, and low, based on the  
expected impact and likelihood of exploitation.  
The impact value indicates the potential damage that might  
result if an issue is successfully exploited. The likelihood value  
is a combination of confidence, accuracy of the rule, and  
probability that and attacker can exploit the issue.  
Searches for issues that have audit data modified by the  
specified user.  
historyuser  
impact  
Searches for issues based on the impact value specified (0.1  
through 5.0).  
Searches for an issue based on the specified instance ID.  
[instance id]  
[issue age]  
Searches for the issue age, which is new, updated,  
reintroduced, or removed.  
Searches for audited issues based on whether the issue is an  
open issue or not an issue (determined by the level of analysis  
set for the primary tag).  
[issue state]  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 49 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Modifier  
Description  
Searches for all issues in the specified kingdom.  
kingdom  
Searches for issues based on the specified likelihood value (0.1  
through 5.0).  
likelihood  
Searches for issues on the primary location line number. For  
dataflow issues, the value is the sink line number. Also see  
line  
Searches for all issues that have a confidence value up to and  
including the number specified as the search term.  
maxconf  
Searches for all issues that have a confidence greater than or  
equal to the specified value.  
minconf  
Searches for issues based on the value of the specified  
<metadata_listname>  
metadata external list. Metadata external lists include [owasp  
top ten <year>], [cwe top 25 <version>], [pci ssf  
<version>], [stig <version>], and others.  
Searches for issues where the primary location occurs in the  
specified package or namespace. (For dataflow issues, the  
primary location is the sink function.)  
package  
Searches for issues where the primary location or sink node  
function call occurs in the specified code context. Also see  
[primary context]  
Searches for issues that have the specified primary tag value.  
By default, the primary tag is the Analysis tag.  
primary  
Searches for all issues related to the specified sink rule.  
primaryrule (rule)  
Searches for issues based on the probability value specified  
(1.0 through 5.0).  
probability  
Searches for issues based on the remediation effort value  
specified. The valid values are whole numbers from 1.0 to 12.0.  
[remediation effort]  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 50 of 96  
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Modifier  
Description  
Searches for all issues reported by the specified rule IDs used  
to generate the issue source, sink, and all passthroughs.  
ruleid  
Note: This search modifier is not available when you  
remediate audit results that are stored on Micro Focus  
Fortify Software Security Center.  
Searches for issues based on the specified severity value  
(legacy metadata).  
severity (sev)  
sink  
Searches for issues that have the specified sink function name.  
Searches for dataflow issues that have the specified source  
function name. Also see "[source context]" below.  
source  
Searches for dataflow issues that have the source function call  
contained in the specified code context. Also see "source"  
[source context]  
Searches for dataflow issues with the source function call that  
the specified file contains. Also see "file" on page 49.  
sourcefile  
sourceline  
status  
Searches for dataflow issues having taint source entering the  
flow on the specified line. Also see "line" on the previous page.  
Searches issues that have the status reviewed, unreviewed,  
or under review.  
Searches for suppressed issues.  
suppressed  
taint  
Searches for issues that have the specified taint flag.  
Searches for issues that have the specified string in the  
dataflow trace.  
trace  
Note: This search modifier is not available when you  
remediate audit results that are stored on Fortify Software  
Security Center.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 51 of 96  
 
 
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Modifier  
Description  
Enables you to search on the nodes within an issue’s analysis  
trace. Each tracenode search value is a concatenation of the  
tracenode’s file path, line number, and additional information.  
tracenode  
Note: This search modifier is not available when you  
remediate audit results that are stored on Fortify Software  
Security Center.  
Searches for the specified value in all the steps of the analysis  
trace.  
tracenodeallpaths  
Note: This search modifier is not available in the  
remediation plugin.  
Searches for issues based on the specified URL.  
Searches for issues assigned to the specified user.  
url  
user  
Search Query Examples  
Consider the following search query examples:  
l
To search for all privacy violations in file names that contain jsp with getSSN() as a source, type  
the following:  
category:"privacy violation" source:getssn file:jsp  
l
To search for all file names that contain com/fortify/awb, type the following:  
file:com/fortify/awb  
l
To search for all paths that contain traces with mydbcode.sqlcleanse as part of the name, type  
the following:  
trace:mydbcode.sqlcleanse  
l
To search for all paths that contain traces with cleanse as part of the name, type the following:  
trace:cleanse  
l
To search for all issues that contain cleanse as part of any modifier, type the following:  
cleanse  
l
To search for all suppressed vulnerabilities with asdf in the comments, type the following:  
suppressed:true comments:asdf  
l
To search for all categories except for SQL Injection, type the following:  
category:!SQL Injection  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 52 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Performing Simple Searches  
To use the search box to perform a simple search, do one of the following:  
l
Type a search query in the search box, and then press Enter.  
When you remediate analysis results stored on Micro Focus Fortify Software Security Center, the  
search box appears as shown below:  
l
To select a search term you used previously (during the current session), click the arrow in the  
search box, and then select a search term from the list. Fortify Extension for Visual Studio discards  
saved search terms after you exit Visual Studio, saved.  
Note: Saved search terms are not available when you remediate analysis results stored on  
Fortify Software Security Center.  
The Analysis Results window lists the query results (if any).  
Performing Advanced Searches  
You can use the advanced search feature to build complex search strings.  
Note: Advanced search is not available when you remediate audit results that are stored on Micro  
Focus Fortify Software Security Center.  
To use the advanced search feature:  
1.  
To the right of the search box, click the Advanced Search icon  
.
The Advanced Search dialog box opens.  
2. From the first list on the left select a modifier.  
If you plan to specify an unqualified search term, select Any Attribute from the modifier list.  
3. From the middle list, select a comparison term.  
4. In the combo box on the right, either type a search term, or select one from the list.  
The search term list includes the known values in the current scan for the specified attribute.  
However, you can type any value into this field.  
5. To add an AND or OR row to the query, click the Add Criteria icon.  
6. To set the operator, click either AND or OR.  
7. Specify the modifier, comparison term, and search term.  
8. Add as many rows as you need for the search query.  
9. To remove a row, to the right of the row, click Delete  
.
10. To remove all rows, at the bottom of the dialog box, click Clear.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 53 of 96  
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
11. To submit your completed search query, click Find.  
Note: Find is only enabled after you create a complete search query.  
Filtering Issues with the Audit Guide  
You can use the Audit Guide wizard to filter vulnerability issues in your audit project based on a set of  
security-related questions.  
To use the Audit Guide:  
1. From the Fortify extension menu, select Audit Guide.  
2. Select the settings for the types of issues you want to display.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 54 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
3. To use the advanced filtering options, select the Advanced tab.  
l
In the Audit Guide Filters list, select the types of issues to filter out and ignore.  
To see a description on the right side, click an issue type.  
As you select items in the Audit Guide Filters list, the Fortify Extension for Visual Studio  
displays the filter details for this issue type below the Audit Guide Filters list and shows the  
number of issues found by each filter.  
4. Click OK to apply your filter selections.  
Auditing Analysis Results  
The security team examines the Fortify Project Results (FPR) and assigns values to custom tags  
associated with audit project issues during a code audit. The development team can then use these  
tag values to determine which issues to address and in what order.  
To enable project auditing out of the box, Micro Focus Fortify Software Security Center provides a  
single default tag named Analysis. Valid values for the Analysis tag are Not an Issue, Reliability Issue,  
Bad Practice, Suspicious, and Exploitable. You can change the Analysis tag attributes, revise the tag  
values, or add new values based on your auditing needs.  
To refine your audit process, you can define your own custom tags. For example, you could create a  
custom tag to track the sign-off process for an issue. After a developer audits his own issues, a  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 55 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
security expert can review those same issues and mark each as “approved” or “not approved.” For  
You can also define custom tags from Fortify Software Security Center, either directly with issue  
template uploads through Fortify Software Security Center, or through issue templates in audit  
project files.  
Note: Although you can add new custom tags as you audit a project, if these custom tags are not  
defined in Fortify Software Security Center for the issue template associated with the application  
version, then the new tags are lost if you upload the audit project (FPR) to Fortify Software  
Security Center.  
Auditing Issues  
To evaluate and assign audit values to an issue or group of issues:  
1. Select the issue or group of issues in the Analysis Results window.  
For information about the Analysis Results window, see "Analysis Results Window" on page 33.  
2. Read the abstract on the Audit tab, which provides high-level information about the issue, such  
as the analyzer that found the issue.  
For example, “Command Injection (Input Validation and Representation, data flow)” indicates  
that this issue, detected by the Dataflow Analyzer, is a Command Injection issue in the Input  
Validation and Representation kingdom.  
3. Click the More Information link or the Details tab to get more details about the issue.  
4. On the Audit tab, assign an Analysis value to the issue to represent your evaluation.  
5. Specify values for any custom tags as required by your organization.  
To specify a date in a date-type custom tag, click Select Date( ) to select a date from a  
calendar.  
To specify text in a text-type custom tag, click Edit Text ( ), and then enter text in the Edit  
Text Value dialog box.  
6. If the audit results have been submitted to Audit Assistant in Micro Focus Fortify Software  
Security Center, then you can specify whether to include or exclude the issue from Audit  
Assistant training from the AA_Training list.  
Note: If you select a different value for Analysis than the AA_Prediction value set by Audit  
Assistant, and you select Include from the AA_Training list, then the next time the data is  
submitted to Audit Assistant, it updates the information used to predict whether an issue  
represents a true vulnerability. For more information about Audit Assistant tags, see the  
Micro Focus Fortify Software Security Center User Guide.  
7. (Optional) In the Comments box, click to add comments relevant to the issue and your  
evaluation, and then click Add Comment  
.
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 56 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Suppressing Issues  
You can suppress issues that are either fixed or issues that you do not plan to fix.  
To suppress an issue, do one of the following:  
l
Select the issue in the Analysis Results window, and then click Suppress on the Audit tab.  
l
Right-click the issue in the Analysis Results window, and then select Suppress Issue.  
Viewing Suppressed Issues  
To review results that have been suppressed:  
l
On the Analysis Results toolbar, select the Visibility menu and then click Show Suppressed  
Issues.  
Submitting an Issue as a Bug  
You can submit issues to your bug tracking application if integration between the applications has  
been configured. For a list of supported client-side bug tracking plugins, see the Micro Focus Fortify  
Software System Requirements document.  
To submit an issue as a bug:  
1. In the Analysis Results window, select an issue.  
2. In the Issue Auditing window, select the Audit tab, and then click File Bug.  
If this is the first time you are submitting a bug, the Select Bug Tracker Integration dialog box  
opens. Select the bug tracking application, and then click Select.  
3. If a login for the bug tracker is required, provide your login credentials.  
4. Specify the values if changes are needed and review the issue description.  
Depending on the integration and your bug tracking application, the values include items such as  
product name, severity level, summary, and version.  
5. Click File Bug.  
The issue is submitted as a bug in the bug tracking application.  
Using Issue Templates  
Micro Focus Fortify Static Code Analyzer produces comprehensive results for source code analysis.  
On large codebases, these results can be overwhelming. Issue templates provide features to sort and  
filter the results in ways that best suit your needs. The filtering and sorting mechanisms appropriate  
during a given phase in the development process can change depending on the phase of  
development. Similarly, the filtering and sorting mechanisms might vary depending on the role of the  
user.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 57 of 96  
 
 
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
You can sort issues by grouping issues into folders, which are logically defined sets of issues  
presented in the tabs on the Analysis Results window. You can further customize the sorting by  
providing custom definitions for the folders into which the issues are sorted. You can provide  
definitions for any number of folders, whose contents are then defined by filters. Filters can either  
alter the visibility of an issue or place it into a folder. When used to sort issues into folders, you can  
define the nature of the issues that appear in the customized folders.  
You group filters into filter sets and then use the filter sets to sort and filter the issues displayed. An  
issue template can contain definitions for multiple filter sets. Using multiple filter sets in an audit  
project enables you to quickly change the sorting and visibility of the issues you are auditing. For  
example, the default issue template used in the interface provides two filter sets. These filter sets  
provide an increasingly restrictive view of security-related issues. Defining multiple filter sets for an  
audit project enables different views for different users, and a customized view does not affect any  
other views.  
In addition to providing sorting and filtering mechanisms, you can also customize the auditing process  
by defining custom tags in the issue template. Auditors associate custom tags with issues during the  
audit. For example, you can use custom tags to track impact, severity, or priority of an issue using the  
same names and values used to track these attributes in other systems, such as a bug tracking  
system. For more information about custom tags, see "Configuring Custom Tags for Auditing" on the  
Issue templates contain the following settings:  
l
Folder filters—Control how issues are sorted into the folders  
l
Visibility filters—Control which issues are shown and hidden  
l
Filter sets—Group folder and visibility filters  
l
Folder properties—Name, color, and the filter set in which it is active  
l
Custom tags—Specify which audit fields are displayed and the values for each  
The issue template applied to a project uses the following order of preference:  
1. The template that exists in the audit project  
2.  
3.  
The template <sca_install_dir>\Core\config\filters\defaulttemplate.xml  
The template <sca_install_dir>\Core\config\rules\defaulttemplate.xml  
4. The embedded Fortify default template  
Saving Issue Templates  
Once an issue template is associated with an audit project, all changes made to that template, such as  
the addition of folders, custom tags, filter sets, or filters, apply to the audit project, and the issue  
template is stored in the FPR when the project is saved. For information about how to change the  
issue template associated with an audit project, see "Importing Issue Templates" on the next page.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 58 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Exporting Issue Templates  
Exporting an issue template creates a file that contains the filter sets and custom tags for the current  
audit project. This is useful if you want to import the issue template into another audit project file.  
To export an issue template:  
1. From the Fortify extension menu, select Project Configuration.  
2. Select the Filter Sets tab.  
3. Click Export Issue Template.  
4. Browse to the location where you want to save the file.  
5. Type a file name without an extension, and then click Save.  
The template settings are saved to the new XML file.  
Importing Issue Templates  
Importing an issue template overwrites the project configuration settings. The filter sets and custom  
tags are replaced with the ones in the issue template.  
To import an issue template:  
1. From the Fortify extension menu, select Project Configuration.  
2. Select the Filter Sets tab.  
3. Click Import Issue Template.  
4. Select the issue template file to import.  
The filter sets and custom tags are updated.  
To revert to the default issue template settings, click Reset Issue Template to Default.  
Configuring Custom Tags for Auditing  
Custom tags enable auditors to set additional attributes that describe the issue. You can use custom  
tag values to filter and find issues.  
The Analysis tag is configured by default and when you apply the Analysis tag to an issue, the icon  
in the Analysis Results issue list indicates the analysis status.  
To refine your auditing process, you can define your own custom tags. You can create the following  
types of custom tags: list, decimal, string, and date. For example, you could create a list-type custom  
tag to track the sign-off process for an issue. After a developer audits his own issues, a security expert  
can review those same issues and mark each as “approved” or “not approved.”  
After you define a custom tag, the Audit tab displays it below the Analysis tag, which enables you to  
specify values as they relate to specific issues. The tag is also available in other areas of the interface,  
such as in the Group By list as a way to group issues in a folder, in the search field as a search  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 59 of 96  
 
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
modifier (similarly available as a modifier for filters), and in the project summary graph as an attribute  
by which to graphically sort issues.  
Adding a Custom Tag  
You can add custom tags to use when you audit results. Custom tags are saved as part of an issue  
template.  
To add a custom tag:  
1. From the Fortify extension menu, select Project Configuration.  
2. Select the Custom Tags tab.  
3. Next to Tags, click Create Tag  
.
Note: Any previously hidden tags are listed, and you can re-enable them. To create a new  
tag, click Create New.  
4. In the Create New Tag dialog box, type a name for the tag.  
5. From the Type list, select the type of tag. The following tag types are available:  
l
List—Accepts selection from a list of values that you specify for the tag  
l
Date—Accepts a calendar date  
l
Decimal—Accepts a number with a precision of up to 18 (up to 9 decimal places)  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 60 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
l
Text—Accepts a string with up to 500 characters (HTML/XML tags and newlines are not  
allowed)  
6. Click OK.  
The Tags list now includes the new tag.  
7. To add a value for a list-type tag, do the following:  
a. From the Tags list, select the tag.  
b. Next to Values, click Add Value  
.
c. In the Add Value dialog box, type a value, and then click OK.  
d. To use this value as the default for the new tag, select a value in the Values list, and then  
select Default on the right.  
If no default is selected, the default value for the custom tag is empty.  
e. To add a description for the value, type it in the Description box.  
f. Repeat steps b through e until you have added all the tag values.  
8. To add a description for any tag type:  
a. From the Tags list, select the tag.  
b. Type a description in the Description box on the right.  
9. To make this custom tag the primary tag:  
Note: You can only set a list-type tag as a primary tag.  
a. Click Set Primary Tag.  
b. Select the custom tag from the Primary Tag list, and then click OK.  
The primary tag determines the audit status for each issue as well as the audit icon in the  
Analysis Results window. By default, the primary tag is Analysis.  
Hiding a Custom Tag  
If you hide a custom tag, it is no longer available on the Audit tab or as a search or filter option. If you  
hide a custom tag that was set for any issues, that tag and values are hidden from the issue. You can  
make this tag available again when you create a custom tag (see "Adding a Custom Tag" on the  
previous page). If you make the tag available again, the tag and values are restored.  
Note: You cannot hide a custom tag that is set as the primary tag.  
To hide a custom tag:  
1. From the Fortify extension menu, select Project Configuration.  
2. Select the Custom Tags tab.  
3. Select the tag from the Tags list.  
4. Next to Tags, click Hide Tag  
5. Click OK.  
.
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 61 of 96  
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
If you hide a tag that has an associated filter, you are prompted to delete the filter.  
Creating a Filter Set  
To create a new filter set, copy an existing set, and change the settings.  
To create a new filter set:  
1. From the Fortify extension menu, select Project Configuration.  
2. Select the Filter Sets tab.  
3. Next to Filter Sets, click Create Filter Set  
.
4. In the Create New Filter Set dialog box, type a name for the new filter set.  
5. Select an existing filter set to copy, and then click OK.  
6. To change the description of the new filter set, select it in the Filter Sets list, and then edit the  
text in the Description box on the right.  
A new filter set with the same folders, visibility filters, and folder filters as the copied filter set is  
created.  
Creating a Filter from the Analysis Results Window  
If you find an issue in a folder list that you want to hide or direct to another folder, you can create a  
new filter with the filter wizard. The wizard displays all the attributes that match the filter conditions.  
Note: To find the filter that directed the issue to the folder, right-click the issue, and select Why  
is this issue here? To find the filter that hid an issue, right-click the issue, and then select Why is  
this issue hidden?  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 62 of 96  
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
To create a new filter from an issue:  
1. In the Analysis Results window, select a filter set from the Filter Set list.  
2. Right-click an issue, and then select Generate Filter.  
The Create Filter dialog box opens and displays a list of suggested conditions.  
3. To expand the conditions list, click More Choices.  
4. Select the conditions to use in the filter. You can fine tune the filter later from the Filter tab.  
5. To specify the type of filter you want to create, do one of the following:  
l
To create a visibility filter, select Hide Issue.  
l
To create a folder filter, select Set Folder to, and then select the folder name or select Create  
New to create a new folder.  
A new folder is displayed only in this filter set.  
6. Click Create Filter.  
The new filter is placed at the end of the filter list. For folder filters, this gives the new filter the  
highest priority. Issues matching the new folder filter appear in the targeted folder.  
7. To change the priority of a folder filter, drag the filter higher in the folder filter list.  
Note: The filter is created only in the selected filter set.  
Creating a Filter from the Filters Tab  
Use the Filters tab option to create general filters for the attributes and values you want to filter. The  
filter is created in the selected filter set only.  
Folder filters are applied in order and the issue is directed to the last folder filter it matches in the list.  
The wizard places your new filter at the end of the list.  
To create a new filter on the Filters tab:  
1. From the Filter Set list, select a filter set.  
2. Right-click Visibility Filters or Folder Filters, and then select Create New Filter.  
3. From the first list, select an issue attribute.  
4. From the second list, select a value to specify how to match the value.  
The third list automatically displays the attribute values.  
5. From the third list, select a value or specify a range as instructed in the If line.  
6. Set Then to one of the following options:  
l
To create a visibility filter, select Hide Issue.  
l
To create a folder filter, select Set Folder to, and then select the folder name or select Create  
New to create a new folder.  
The new filter displays at the end of the list. For folder filters, this gives the new filter the highest  
priority. Issues that match the new folder filter are displayed in the targeted folder.  
7. To change the priority, drag the filter higher in the folder filter list.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 63 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
The issues are sorted based on the new filter.  
Note: The filter is created in the selected filter set only.  
Copying a Filter to Another Filter Set  
Filter settings are local to the filter set. However, you can copy the filter to another filter set in the  
project. If you copy a folder filter to another filter set and that folder is not already active in the filter  
set, the folder is automatically added.  
To copy a filter:  
1. From the Filter Set list, select a filter set.  
2. On the Filters tab, right-click a filter, and then select Copy Filter To.  
The Select a Filter Set dialog box lists the filter sets.  
3. Select a filter set, and then click OK.  
The filter is added to the destination filter set in the last position.  
4. To change the order of the folder filters, drag the filters in the list.  
Managing Folders  
Folders are logical sets of issues that are defined by the filters in the active filter set. Even though a  
folder can appear in more than one filter set, the contents might differ depending on the filters in that  
filter set that target the folder. To accommodate filter sets that attempt to provide sorting  
mechanisms that have little overlap, it is possible to have filter sets with different folders. Folders are  
defined without any relation to the filter sets in which they might appear.  
Creating a Folder  
You can add a new folder to a filter set so that you can display a group of issues you have filtered to  
the folder.  
To create a folder:  
1. From the Fortify extension menu, select Project Configuration.  
2. Select the Folders tab.  
Currently defined folders are listed on the left. Fields that indicate the name, color, and  
description of the selected folder are on the right.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 64 of 96  
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
3. To associate the new folder with an existing filter set, select a filter set from the Folders for  
Filter Set list.  
This selection updates the Folders list to display folders associated with the selected filter set.  
4. To add a folder:  
a. Next to Folders, click Create Folder  
.
The Create New Folder dialog box opens.  
b. Type a unique name for the new folder, select a folder color, and then click OK.  
The folder is added to the bottom of the Folders list.  
5. To sort all issues that do not match a folder filter into this folder, select Default Folder.  
6. Click OK.  
The new folder is added to the local issue template. The folder displays as a tab with the other folders  
in the Analysis Results window.  
Note: To display issues in this folder, create a folder filter that targets the new folder (see  
Adding a Folder to a Filter Set  
This section describes how to enable an existing folder in a filter set. Create a new folder that only  
appears in the selected filter set using the instructions in "Creating a Folder" on the previous page. To  
display issues in this folder, create a folder filter that targets the new folder.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 65 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
To add a folder to a filter set:  
1. From the Fortify extension menu, select Project Configuration.  
2. Select the Folders tab.  
3. From the Folder for Filter Set list, select a filter set to which you want to add an existing folder.  
This selection updates the Folders list to display folders associated with the selected filter set.  
4. Next to Folders, click +  
.
The Enable New Folder to the Filter Set dialog box opens. If all folders are already associated  
with the selected filter set, the Create New Folder dialog box opens.  
5. Select the folder to add, and then click Select.  
The selected folder is listed.  
6. Click OK.  
The folder is displayed as a tab with the other folders in the Analysis Results window.  
Renaming a Folder  
You can rename a folder. Modifying the name of a folder is a global change reflected in all filter sets.  
To rename a folder:  
1. From the Fortify extension menu, select Project Configuration.  
2. Select the Folders tab.  
3. From the Folders for Filter Set list, select a filter set that displays the folder you want to  
rename.  
4. Select the folder in the Folders list.  
The folder properties are displayed on the right.  
5. In the Name box, type the new folder name.  
6. Click OK.  
The tab displays the new folder name.  
Removing a Folder  
You can remove a folder from a filter set without removing it from the other filter sets.  
To remove a folder:  
1. From the Fortify extension menu, select Project Configuration.  
2. Select the Folders tab.  
3. From the Folders for Filter Set list, select a filter set that contains the folder you want to  
remove.  
The folders in the selected filter set are listed.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 66 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
4. Next to Folders, select the folder, and then click -.  
The folder is removed only from the selected filter set.  
If the folder is a target of a folder filter, the Conflicts Occurred Removing Folder dialog box opens.  
Do one of the following:  
l
To target the filter to a different folder, select a folder from the Retarget the filters list, and  
then click Retarget Filters.  
l
To delete the filter, click Delete Filters, and then click Yes to confirm the deletion.  
5. Click OK to close the Project Configuration dialog box.  
The folder is no longer displayed as a tab.  
Generating Analysis Results Reports  
The following topics provide information about generating BIRT and legacy reports for your analysis  
results.  
BIRT Reports  
You can generate BIRT reports from Fortify Extension for Visual Studio or from the command line  
(BIRTReportGenerator utility). For information on how to generate BIRT reports from the command  
line, see the Micro Focus Fortify Static Code Analyzer User Guide.  
The following table describes the BIRT reports available.  
Report Template  
Description  
CWE Top 25  
This report lists the most widespread and critical weaknesses that can lead  
to serious software vulnerabilities (based on the National Vulnerability  
Database).  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 67 of 96  
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Report Template  
Description  
CWE/SANS Top 25  
This report details issues related to the CWE/SANS Top 25 Most  
Dangerous Programming Errors and provides information about where and  
how to fix the issues. It describes the technical risk posed by unremediated  
issues discovered during analysis and provides an estimate of the  
development effort needed to test, verify, and fix them.  
Developer Workbook This report provides the information a developer needs to understand and  
fix the issues discovered during an application audit.  
DISA CCI 2  
This report provides a standard identifier for policy-based requirements  
that connects high-level policy expressions and low-level technical  
implementations.  
DISA STIG  
This report addresses DISA compliance based on STIG violations and  
provides information about where and how to fix the issues. It describes  
the technical risk posed by unremediated issues and provides an estimate  
of the development effort required to test, verify, and fix them.  
FISMA Compliance:  
FIPS 200  
This report addresses FISMA compliance related to FIPS-200 through  
controls specified in NIST SP 800-53. It details policy violations and  
provides information about where and how to fix the issues. It describes  
the technical risks posed by unremediated violations and provides an  
estimate of the development effort required to test, verify, and fix them.  
GDPR  
This report groups all detected issues that are relevant to privacy under  
the EU General Data Protection Regulation (GDPR) legislation. Use this as  
a framework to help identify and protect personal data as it relates to  
application security.  
MISRA  
This report addresses compliance with either the Motor Industry Software  
Reliability Association (MISRA) C or C++ guidelines. The results focus on  
the security relevant guidelines and can be used to help create a  
compliance matrix for MISRA. This report describes the technical risk  
posed by the unremediated issues discovered during analysis and an  
provides an estimate of the development effort needed to test, verify, and  
fix them.  
OWASP ASVS 4.0  
This report groups detected issues based the OWASP Application Security  
Verification Standard security requirements for secure development.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 68 of 96  
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Report Template  
Description  
OWASP Mobile  
Top 10  
This report details the top ten OWASP mobile-related issues and provides  
information about where and how to fix them. It describes the technical risk  
posed by the unremediated issues discovered during analysis and gives an  
estimate of the development effort required to test, verify, and fix them.  
OWASP Top 10  
This report details the top ten OWASP-related issues and provides  
information about where and how to fix them. It describes the technical  
risks posed by unremediated issues discovered during analysis and gives  
an estimate of the development effort required to test, verify, and fix the  
issues.  
PCI DSS Compliance: This report summarizes the application security portions of PCI DSS. It  
Application Security includes tests for 21 application security-related requirements across  
Requirements  
sections 3, 4, 6, 7, 8, and 10 of PCI DSS and reports whether each  
requirement is either “In Place” or “Not In Place.”  
PCI SSF Compliance: This report summarizes the application security portions of PCI SSF. It  
Secure Software  
Requirements  
includes tests for 23 application security-related control objectives across  
Control Objective sections 2, 3, 4, 5, 6, 7,8, and A.2 of PCI SSF and reports  
whether each control objective is "In Place" or "Not In Place."  
Generating BIRT Reports  
To generate a report:  
1. From the Fortify extension menu, select Generate BIRT Report.  
The Generate BIRT Report dialog box opens.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 69 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
2. From the Report Template list, select the type of report you want.  
3. If available for the template, select the template version from the Options list.  
4. Select the information you want to include in the report.  
Note: Not all options are available for all report types.  
a. To include detailed descriptions of reported issues, select the Detailed Report check box.  
b. To categorize issues by Fortify Priority instead of folder names, select the Categories By  
Fortify Priority check box.  
c. To include Description of Key Terminology in the report, select the Key Terminology check  
box.  
d. To include the About Fortify Solutions section in the report, select the About  
Fortify Solutions check box.  
5. To filter information from the report, select the optional issue filter settings as follows:  
l
Click Removed to include removed issues in the report.  
l
Click Suppressed to include suppressed issues in the report.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 70 of 96  
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
l
Click Hidden to include hidden issues in the report.  
l
Click Collapse Issues to collapse issues of the same sink and type into a single issue.  
l
Click Only My Issues to include only issues assigned to your user name.  
l
Click Advanced to build a search query to further filter the issues to include in the report. For  
more information about the search modifiers, see "Search Modifiers" on page 47.  
6. From the Format list, select a format for the report (PDF, HTML, DOC, or XLS).  
Note: When you open the XLS file in Excel, you might get a warning that the file format and  
the file extension do not match. You can safely open the file in Excel.  
7. To specify an alternate location to save the report, click Browse and select a location.  
8. Click Generate.  
9. If a report with the same file name already exists, you are prompted to either:  
l
Click No to overwrite the existing report.  
l
Click Yes to have the report saved to a file with a sequential number appended to the file  
name (for example: Sample1_DISA_STIG(1).pdf).  
Legacy Reports  
The legacy reports include user-configurable report templates. Report templates provide several  
optional sections and subsections that gather and present specific types of data. You can generate  
legacy reports from Fortify Extension for Visual Studio or from the command line (ReportGenerator  
utility). For information on how to generate legacy reports from the command line, see the Micro  
Focus Fortify Static Code Analyzer User Guide.  
The following sections describe the default reports and report templates, instructions on how to  
modify existing reports, and how to create your own reports.  
Generating Legacy Reports  
After you select the report template and report settings, you generate the report to view the results.  
You can save report results as PDF and XML files.  
To generate a report:  
1. From the Fortify extension menu, select Generate Legacy Report.  
2. From the Report list, select a report template.  
3. (Optional) Change the report section settings.  
4. Click Print Report.  
5. Specify a file name and a location to save the report.  
6. Select the report file format (PDF or XML).  
7. Click Save.  
Fortify Extension for Visual Studio generates the report in the format you selected.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 71 of 96  
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Legacy Report Templates  
This section describes how to select and edit a legacy report template. You can modify legacy report  
templates from the Generate Legacy Report dialog box, or you can edit report templates directly in  
XML (see "Legacy Report Template XML Files" on page 76). If you or another user have edited or  
created additional legacy report templates, you might not see the default report templates described  
in this section.  
The legacy report templates include:  
l
Fortify Security Report—A mid-level report that provides comprehensive information on the  
analysis performed and the high-level details of the audit that was performed. It also provides a  
high-level description and examples of categories that are of the highest priority.  
l
Fortify Developer Workbook—Provides a comprehensive list of all categories of issues found and  
multiple examples of each issue. It also gives a high-level summary of the number of issues in each  
category.  
l
OWASP Top Ten <year>—Provides high-level summaries of uncovered vulnerabilities organized  
based on the top ten issues that the Open Web Security Project (OWASP) has identified.  
l
Fortify Scan Summary—Provides high-level information based on the category of issues that  
Micro Focus Fortify Static Code Analyzer found as well as a project summary and a detailed project  
summary  
The following sections describe how to view report templates and customize them to address your  
reporting needs.  
Opening Legacy Report Templates  
To open a report template:  
1. From the Fortify extension menu, select Generate Legacy Report.  
2. Select a report template from the Report list.  
The Generate Legacy Report dialog box displays the report template settings.  
Selecting Legacy Report Sections  
You can choose which sections to include in the report.  
To select the sections to include in a report:  
1. Click a section title to view the contents of the section.  
The section details display in the right side of the dialog box.  
2. To include a section in the report, select the section title check box in the list on the left side.  
3. To remove a section from the report, clear the check box next to the section title.  
For details on how to edit each section, see "Editing Legacy Report Subsections" on the next page.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 72 of 96  
 
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Editing Legacy Report Subsections  
When you select a section title, you can edit the contents that display in the report. You can edit text,  
add or change text variables, or customize the issues shown in a chart or results list.  
Editing Text Subsections  
To edit a text subsection:  
1. Select the check box next to the subsection title to include this text in the report.  
A description of the text is displayed below the subsection title.  
2. Click Edit.  
The text box displays the text and variables to include in the report.  
3. Edit the text and text variables.  
As you edit text subsections, you can insert variables that are defined when you run the report. The  
following table describes these variables.  
Variable  
Description  
$AUDIT_GUIDE_  
SUMMARY$  
List of filters created with answers to Audit Guide Wizard questions  
$CLASSPATH_  
LISTING$  
JAR files used in the scan, one relative path per line  
$COMMANDLINE_  
ARGS$  
Complete list of command-line options (same format as project  
summary)  
$FILE_LISTING$  
List of files scanned, each file in the following format:  
<relative_file_path> # Lines # kb <timestamp>  
$FILTERSET_  
DETAILS$  
List of filters used by the current filter set  
$FILTERSET_NAME$  
Name of the current filter set  
$FORTIFY_SCA_  
VERSION$  
Micro Focus Fortify Static Code Analyzer version  
$LIBDIR_LISTING$  
$LOC$  
Libdirs specified during scan, one relative path per line  
Total lines of code  
$NUMBER_OF_FILES$ Total number of files scanned  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 73 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Variable  
Description  
$PROJECT_BUILD_  
LABEL$  
Build label of project  
$PROJECT_NAME$  
$PROPERTIES$  
Build ID  
Complete list of properties set during analysis phase (same format as  
project summary)  
$RESULTS_  
CERTIFICATION$  
Complete certification detail with list of validity on a per file basis (same  
format as project summary)  
$RESULTS_  
Short certification description (same format as project summary)  
CERTIFICATION_  
SUMMARY$  
$RULEPACKS$  
Complete list of Rulepacks used during the analysis (same format as  
project summary)  
$SCAN_COMPUTER_  
ID$  
Hostname of the machine on which the scan was performed  
$SCAN_DATE$  
Date of the analysis with the default formatting style for the locale  
$SCAN_SUMMARY$  
Summary of the codebase scanned in the format: # files, # lines  
of code  
$SCAN_TIME$  
$SCAN_USER$  
Time of the analysis phase  
User name of the user who performed the scan  
Source base path of the codebase  
$SOURCE_BASE_  
PATH$  
$TOTAL_FINDINGS$  
$VERSION_LABEL$  
Number of issues, excluding suppressed or removed issues  
Label of the scanned project (available only if the Fortify Static Code  
Analyzer -build-label option was used in the scan)  
$WARNINGS$  
Complete list of warnings issued (same format as project summary)  
Number of warnings found in the scan  
$WARNING_  
SUMMARY$  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 74 of 96  
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Editing Results List Subsections  
To edit a result list subsection:  
1. Select the check box next to the subsection title to include this text in the report.  
A description of the results list is displayed below the subsection title.  
2. Click the issues list heading to expand the options.  
3. Select the attributes used to group the results list.  
If you group by category, the recommendations, abstract, and explanation for the category are  
also included in the report.  
4. (Optional) Refine the issues shown in this subsection with a search query.  
For more details about the search syntax, see "Searching for Issues" on page 46.  
Editing Chart Subsections  
To edit a chart subsection:  
1. Select the check box next to the subsection title to include this text in the report.  
A chart description is displayed below the subsection title.  
2. Select the attributes used to group the chart data.  
3. (Optional) Refine the issues shown in this subsection with a search query.  
For information about search syntax, see "Searching for Issues" on page 46.  
4. Select the chart format (table, pie, or bar).  
Saving Legacy Report Templates  
You can save the current report settings as a new template that you can select later to run more  
reports.  
To save settings as a report template:  
1. From the Fortify extension menu, select Generate Legacy Report.  
2. From the Report list, select a report template.  
3. Make changes to the report section and subsection settings.  
4. Click Save as New Template.  
When you select the report template name from the Report list, the report settings are displayed in  
the Generate Legacy Report dialog box.  
Saving Changes to Legacy Report Templates  
You can save changes to a report template so that your new settings are displayed as the default  
settings for that template.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 75 of 96  
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
To save changes to a report template:  
1. From the Fortify extension menu, select Generate Legacy Report.  
2. From the Report list, select the report template to save as the default report template.  
3. (Optional) Make changes to the report section and subsection settings.  
4. Click Save Settings as Default.  
Legacy Report Template XML Files  
Report templates are saved as XML files. You can edit the XML files to make changes or to create new  
report template files. When you edit the XML files, you can choose the sections and the contents of  
each section to include in the report template.  
The default location for the report template XML files is <sca_install_  
dir>\Core\config\reports.  
To customize the logos used in the reports, you can replace header.jpg and footer.jpg in this  
directory.  
Adding Legacy Report Sections  
You can add report sections by editing the XML files. In the structure of the XML, the  
ReportSection element defines a new section. It includes a Title element for the section name,  
and it must include at least one Subsection element to define the section contents in the report. The  
following XML is the Results Outline section of the Fortify Security Report:  
<ReportSection enabled="true" optionalSubsections="true">  
<Title>Results Outline</Title>  
<SubSection enabled="true">  
<Title>Overall number of results</Title>  
<Description>Results count</Description>  
<Text>The scan found $TOTAL_FINDINGS$ issues.</Text>  
</SubSection>  
<SubSection enabled="true">  
<Title>Vulnerability Examples by Category</Title>  
<Description>Results summary for critical and high priority issues.  
Vulnerability examples are provided by category.  
</Description>  
<IssueListing limit="1" listing="true">  
<Refinement>[fortify priority order]:critical OR  
[fortify priority order]:high</Refinement>  
<Chart chartType="list">  
<Axis>Category</Axis>  
</Chart>  
</IssueListing>  
</SubSection>  
</ReportSection>  
In this example, the Results Outline section contains two subsections. The first is a text  
subsection titled Overall number of results. The second subsection is a results list titled  
Vulnerability Examples by Category. A section can contain multiple subsections.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 76 of 96  
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Adding Report Subsections  
In the report sections, you can add subsections or edit subsection content. Subsections can generate  
text, results lists, or charts.  
Adding Text Subsections  
In a text subsection, you can include the Title element, the Description element, and the Text  
element. In the Text element, you can provide the default content although the user can edit the  
content before generating a report. For a description of the text variables available to use in text  
subsections, see "Editing Legacy Report Subsections" on page 73. The following XML is the Overall  
<SubSection enabled="true">  
<Title>Overall number of results</Title>  
<Description>Results count</Description>  
<Text>The scan found $TOTAL_FINDINGS$ issues.</Text>  
</SubSection>  
In this example, the text subsection is titled Overall number of results. The text that describes  
the purpose of the text is Results count. The text in the text field that the user can edit before  
running a report uses one variable named $TOTAL_FINDINGS$.  
Adding Results List Subsections  
In a results list subsection, you can include the Title element, the Description element, and the  
IssueListing element. In the IssueListing element, you can define the default content for the  
limit and set listing to true. You can include the Refinement element either with or without a  
default statement although the user can edit the content before they generate a report. To generate  
a results list, the Chart element's attribute chartType is set to list. You can also include the Axis  
element. The following XML is the Vulnerability Examples by Category subsection in the  
Results Outline section:  
<SubSection enabled="true">  
<Title>Vulnerability Examples by Category</Title>  
<Description>Results summary for critical and high priority issues.  
Vulnerability examples are provided by category.  
</Description>  
<IssueListing limit="1" listing="true">  
<Refinement>[fortify priority order]:critical OR  
[fortify priority order]:high</Refinement>  
<Chart chartType="list">  
<Axis>Category</Axis>  
</Chart>  
</IssueListing>  
</SubSection>  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 77 of 96  
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
In this example, the results list subsection title is Vulnerability Examples by Category. The  
text Results summary for critical and high priority issues. Vulnerability  
examples are provided by category. is used to describe the purpose of the subsection. This  
subsection lists (listing=true) one issue (limit="1") per category (the value of the Axis  
element) where there are issues matching the statement [fortify priority order]:critical  
OR [fortify priority order]:high (the value of the Refinement element).  
Adding Chart Subsections  
In a chart subsection, you can include the Title element, the Description element, and the  
IssueListing element. In the IssueListing element, you can define the default content for the  
limit and set listing to false. You can include the Refinement element either with or without a  
default statement although the user can edit the content before generating a report. To generate a  
pie chart, set the Chart element's attribute chartType to pie. The options are table, pie, and bar.  
The user can change this setting before generating the report. You can also define the Axis element.  
The following code shows an example of a chart subsection:  
<SubSection enabled="true">  
<Title>New Issues</Title>  
<Description>A list of issues discovered since the previous  
analysis.</Description>  
<Text>The following issues have been discovered since the  
last scan:</Text>  
<IssueListing limit="-1" listing="false">  
<Refinement />  
<Chart chartType="pie">  
<Axis>New Issue</Axis>  
</Chart>  
</IssueListing>  
</SubSection>  
In this subsection, a chart (limit="-1" listing="false") has the title New Issues and a text  
section that contains The following issues have been discovered since the last  
scan:. This chart includes all issues (the Refinement element is empty) and groups the issues based  
on the value of New Issue (the value of the Axis element). The subsection includes a pie chart  
(chartType="pie").  
Working with Audit Projects  
This section provides information about how to open an audit project, migrate audit data, merge audit  
data, audit projects collaboratively, and upload audit results to Micro Focus Fortify Software Security  
Center.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 78 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Opening Audit Projects  
To open an audit project file:  
1. Open a solution or project.  
2. From the Fortify extension menu, select Open Audit Project.  
3. Browse to and select an audit project file (FPR, FVDL, or XML).  
4. Click Open.  
5. If the source code is not available in the FPR, you are prompted to select the root directory for  
your project's source code. Select the root directory, and then click OK.  
The Fortify Extension for Visual Studio displays the project in the auditing interface.  
About Merging Audit Data  
You can merge audit data into your project from another file. Audit data includes the custom tags and  
comments that were added to an issue. Comments are merged into a chronological list, while the  
custom tag values are updated.  
Note: Issues are not merged. Only the newer scanned issues are shown. Issues in the older file  
that are not in the newer file are marked as removed.  
Make sure that the projects you merge contain the same analysis information, that the scan was on  
the same source code (no missing libraries or files), the Micro Focus Fortify Static Code Analyzer  
options were the same, and the scan was performed with the same set of Secure Coding Rulepacks  
and custom Rulepacks.  
Merging Audit Data  
To merge audit projects:  
1. Open an audit project in Visual Studio.  
2. From the Fortify extension menu, select Merge Audit Projects.  
The Select Audit Project dialog box opens.  
3. Select an audit project (FPR, FVDL, or XML file), and then click Open.  
The audit projects are merged.  
4. To confirm the number of issues added or removed from the file, click OK.  
Note: If the scan is identical, the process does not add or remove issues.  
The audit project now contains all audit data from both files.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 79 of 96  
 
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Performing a Collaborative Audit  
You can audit a project on Micro Focus Fortify Software Security Center collaboratively with other  
Fortify Software Security Center users.  
To start a collaborative audit:  
1. If necessary, configure a connection to Fortify Software Security Center:  
a. From the Fortify extension menu, select Options.  
b. In the left pane, select Server Configuration.  
c. Under Software Security Center, specify the Server URL for Fortify Software Security  
Center.  
Tip: Click Test Connection to confirm that the URL is valid and you can successfully  
connect to the Fortify Software Security Center server.  
d. Click OK.  
2. From the Fortify extension menu, select Open Collaborative Audit.  
If you already have an audit project open, close it.  
3. If prompted, type your Fortify Software Security Center login credentials.  
For information about logging into Fortify Software Security Center, see "Logging in to Fortify  
4. In the Download Collaborative Audit dialog box, select an application version, and then click  
Select.  
The Fortify Extension for Visual Studio downloads the audit project file from Fortify Software  
Security Center and opens it in the auditing interface.  
5. Audit the project as described in "Auditing Issues" on page 56.  
6. When you have completed the audit, select Upload Audit Project from the Fortify extension  
menu.  
Note: If necessary, update your audit permission settings from Fortify Software Security Center  
by selecting Refresh Permissions from the Fortify extension menu.  
Uploading Results to Fortify Software Security Center  
You can manually upload analysis results to Micro Focus Fortify Software Security Center any time  
after a scan is completed. However, before you do, a corresponding application version must already  
exist in Fortify Software Security Center.  
Important! If Fortify Software Security Center uses an SSL connection from an internal certificate  
authority or a self-signed certificate, you must import the Fortify Software Security Center  
certificate into the local Windows certificate store.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 80 of 96  
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Note: By default, Micro Focus Fortify Software Security Center ignores uploaded scans performed  
in quick scan mode. However, you can configure your Fortify Software Security Center application  
version so that it processes uploaded audit projects scanned in quick scan mode. For more  
information, see analysis results processing rules in the Micro Focus Fortify Software Security  
Center User Guide.  
To upload results to Micro Focus Fortify Software Security Center:  
1. If necessary, configure a connection to Fortify Software Security Center:  
a. From the Fortify extension menu, select Options.  
b. In the left pane, select Server Configuration.  
c. Under Software Security Center, specify the Server URL for Fortify Software Security  
Center.  
Tip: Click Test Connection to confirm that the URL is valid and you can successfully  
connect to the Fortify Software Security Center server.  
d. Click OK.  
2. From the Fortify extension menu, select Upload Audit Project.  
3. If prompted, type your Fortify Software Security Center credentials.  
For information about logging into Fortify Software Security Center, see "Logging in to Fortify  
The Upload Audit Project dialog box lists the current applications.  
4. Select an application version, and then click Select.  
Note: If you are working on a collaborative audit for an application you just downloaded,  
then the audit project is automatically uploaded to the same application version. You are not  
prompted to select an application.  
Integrating with a Bug Tracker Application  
The Fortify Extension for Visual Studio provides a plugin interface to integrate with bug tracker  
applications. This enables you to file bugs directly from the Fortify Extension for Visual Studio. For a  
list of supported bug tracker applications, see the Micro Focus Fortify Software System Requirements  
document.  
Filing Bugs to Azure DevOps Server  
The Fortify Extension for Visual Studio supports integration with bug tracker applications so that you  
can file bugs directly to Azure DevOps Server. For a list of supported versions, see the Micro Focus  
Fortify Software System Requirements document.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 81 of 96  
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
To file a bug to Azure DevOps Server:  
1. Open an audit project in Visual Studio.  
2. In the Analysis Results window, select an issue.  
3. In the Issue Auditing window, select the Audit tab, and then click File Bug.  
4. If this is the first time you have filed a bug, the Select Bug Tracker Integration dialog box opens.  
Do the following:  
a. Select Azure DevOps Server, and then click Select.  
b. Click Servers, and then click Add.  
c. In the Add Azure DevOps Server dialog box, provide the necessary information, and then  
click OK.  
d. Click Close to close the Add/Remove DevOps Server dialog box.  
e. In the Connect to Azure DevOps Server dialog box, select a server, a Team Project Collection,  
and a Team Project, and then click Connect.  
5. Specify the following information for your installation:  
Project: <team_project_name>  
WorkItem Type: Bug  
6. Click OK.  
7. (Optional) In the Azure DevOps Server dialog box, provide the information to file the bug report.  
8. Click File Bug.  
Troubleshooting  
The following topics provide information on how to troubleshoot problems you might encounter  
working with the Fortify Extension for Visual Studio.  
Enabling Debug Mode  
If you encounter any errors, you can enable debug mode to help troubleshoot. When you enable  
debug mode, Fortify Extension for Visual Studio writes additional information to the log files.  
To enable debug mode:  
1.  
Navigate to the <sca_install_dir>\Core\config directory and open the  
fortify.properties file in a text editor.  
2. You can either enable debug mode for all Fortify Software components or for specific  
components. Remove the comment tag (#) from in front of the property and set the value to  
true.  
Property  
Description  
#com.fortify.Debug=false  
If set to true, all the Fortify Software components run  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 82 of 96  
 
 
User Guide  
Chapter 2: Using the Fortify Extension for Visual Studio  
Property  
Description  
in debug mode.  
#com.fortify.VS.Debug=false  
If set to true, the Fortify Extension for Visual Studio  
runs in debug mode.  
Locating the Log Files  
To get help with diagnosing an issue, send the log files to Micro Focus Fortify Customer Support. On  
Windows systems, the log files are in the following directories:  
l
C:\users\<username>\AppData\Local\Fortify\VS<VSversion>-<version>\log  
l
C:\users\<username>\AppData\Local\Fortify\sca<version>\log  
The log files in this directory are only available if you analyze the code locally with Micro Focus  
Fortify Static Code Analyzer.  
l
C:\users\<username>\AppData\Local\Fortify\scancentral-<version>\log  
The log files in this directory are only available if you analyze the code with Micro Focus Fortify  
ScanCentral SAST.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 83 of 96  
Chapter 3: Remediating Results from Fortify  
Software Security Center  
You can download audit results for your code from Micro Focus Fortify Software Security Center so  
that you can resolve security-related issues in Visual Studio.  
This section contains the following topics:  
Opening a Fortify Software Security Center  
Application  
To select an application on Fortify Software Security Center:  
1. If you have not already done so, configure a connection to a Fortify Software Security Center  
server:  
a. From the Fortify extension menu, select Options.  
b. In the left pane, select Server Configuration.  
c. Under Software Security Center, specify the Server URL for Fortify Software Security  
Center.  
Tip: Click Test Connection to confirm that the URL is valid and you can successfully  
connect to the Fortify Software Security Center server.  
d. Click OK.  
2. From the Fortify extension menu, select Connect to SSC.  
3. If prompted, type your Fortify Software Security Center login credentials.  
For information about logging into Fortify Software Security Center, see "Logging in to Fortify  
4. In the Select Application Version dialog box, select an application version to open, and then click  
OK.  
The Fortify Extension for Visual Studio downloads the analysis results for the application version from  
Fortify Software Security Center.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 84 of 96  
 
 
User Guide  
Chapter 3: Remediating Results from Fortify Software Security Center  
Note: To open a different application version in Fortify Software Security Center, reselect Fortify  
> Connect to SSC from the Fortify extension menu.  
Viewing Analysis Results from Fortify Software  
Security Center  
After you open an application version, you can see the analysis results in the Fortify Remediation  
window. This window displays all security issues, organized in folders (color-coded tabs) in an issues  
list.  
Folders contain logically defined sets of issues. For example, the Critical folder contains all critical  
issues for an application. Similarly, the Low folder contains all low-priority issues.  
Filters determine which issues are visible. The filters are organized into distinct groups called filter  
sets. An issue template can contain definitions for multiple filter sets. You can use multiple filter sets  
to change the sorting and visibility of issues.  
To remediate issues, the project you have open in Visual Studio must correspond to the application  
version you opened in Fortify Software Security Center (see "Opening a Fortify Software Security  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 85 of 96  
 
User Guide  
Chapter 3: Remediating Results from Fortify Software Security Center  
Viewing and Selecting Issues in an Application  
To view and select issues in an opened application version:  
1. From the Group By list, select a value to use to sort issues in all visible folders into groups.  
The default grouping is Category. For a description of the available Group By options, see  
2. To filter the issues within the selected grouping:  
a. From the Filter By list, select a filter category.  
b. To refine the issues further, select a filter option from the list to the right of the selected filter  
category.  
3. By default, issues assigned to all users are visible. To select issues assigned to a specific user, do  
the following:  
a. Click Select User ( ).  
b. In the Select User dialog, select a user name, and then click OK.  
Only issues assigned to the selected user are shown in the Fortify Remediation window.  
Tip: To see only issues assigned to you, from the Filter By list, select Assignments and My  
Assignments.  
Note: To remove the assigned user selection, clear the search box, and then press Enter.  
4. Click a folder (tab) to view the associated issues.  
Note: The folders shown depends on your Group By, Filter By, Assigned User, and Filter  
Set selections. It is possible that not all folders are shown. The folders shown also depends  
on the issue template associated with the application version.  
l
The Critical folder contains issues that have a high impact and a high likelihood of  
exploitation. Fortify recommends that you remediate critical issues immediately.  
l
The High folder contains issues that have a high impact and a low likelihood of exploitation.  
Fortify recommends that you remediate high issues with the next patch release.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 86 of 96  
 
User Guide  
Chapter 3: Remediating Results from Fortify Software Security Center  
l
The Medium folder contains issues that a have low impact and a high likelihood of  
exploitation. Fortify recommends that you remediate medium issues as time permits.  
l
The Low folder contains issues that have a low impact and a low likelihood of exploitation.  
Fortify recommends that you remediate low issues as time permits (your organization can  
customize this category).  
l
The All folder contains all issues.  
Within each color-coded folder, issues are grouped into subfolders. At the end of each folder  
name, enclosed in brackets, is the number of audited issues and the total number of issues in the  
folder. For example, a folder with the name Command Injection - [1 / 3] indicates that one issue  
out of three categorized as Command Injection has been audited.  
5. Expand the Additional Settings section to access the filter set and issue visibility settings.  
6. From the Filter Set list, select a filter to apply:  
l
Select Security Auditor View to list all issues relevant to a security auditor.  
l
Select Quick View to list only issues in the Critical folder (these have a potentially high  
impact and a high likelihood of occurring) and the High folder (these have a potentially high  
impact and a low likelihood of occurring).  
Note: You might see different filter sets depending on the filter sets associated with the  
application you opened.  
7. Select a subfolder ( ) to expand it and view the associated issues.  
The Fortify Extension for Visual Studio retrieves the corresponding issues from Fortify Software  
Security Center.  
8. Select an issue to view the issue information.  
Grouping Issues  
The items visible in the Fortify Remediation window issues list vary depending on the selected  
grouping option. The value you select from the Group By list sorts issues in all visible folders into  
subfolders. Use the Group By options to group and view the issues in different ways. The following  
table describes the available Group By options.  
Option  
Description  
Analysis  
Groups issues by the audit analysis, such as Suspicious, Exploitable,  
and Not an Issue.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 87 of 96  
 
User Guide  
Chapter 3: Remediating Results from Fortify Software Security Center  
Option  
Description  
Analysis Type  
Groups issues by analyzer product, such as SCA, WEBINSPECT, and  
SECURITYSCOPE (WebInspect Agent).  
Analyzer  
Groups issues by analyzer group, such as Control Flow, Data Flow,  
Semantic, and Structural.  
App Defender Protected  
Groups issues by whether Application Defender can protect the  
vulnerability category.  
Category  
Groups issues by vulnerability category. This is the default setting.  
Groups issues by custom tag.  
<custom_tagname>  
File Name  
Groups issues by file name.  
Folder  
Groups issues by folders defined in the issue template.  
Fortify Priority Order  
Groups issues as Critical, High, Medium, and Low based on the  
combined values of Micro Focus Fortify Static Code Analyzer impact  
and likelihood.  
Introduced date  
Issue State  
Groups issues by the date the issue was first detected.  
Groups audited issues by whether the issue is an open issue or not an  
issue based on the level of analysis set for the primary tag. Values  
equivalent to suspicious and exploitable are considered open issue  
states.  
Kingdom  
Manual  
Groups issues by the Seven Pernicious Kingdoms classification.  
Groups issues by whether they were manually created by penetration  
test tools, and not automatically produced by a web crawler such as  
Fortify WebInspect.  
<metadata_listname>  
Groups issues using the alternative metadata external list names (for  
example, OWASP Top 10 <year>, CWE, PCI SSF <version>,  
STIG <version>, and others).  
New Issue  
Shows which issues are new since the last scan. For example, if you  
run a new scan, any issues that are new display in the tree under the  
NEW group and the others are displayed in the UPDATED group. If  
removed issues are visible, issues not found in the latest scan are  
displayed in the REMOVED list.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 88 of 96  
User Guide  
Chapter 3: Remediating Results from Fortify Software Security Center  
Option  
Description  
Package  
Groups issues by package or namespace. Does not appear for projects  
for which this option is not applicable, such as C projects.  
Primary Context  
Groups issues where the primary location or sink node function call  
occurs in the same code context.  
Sink  
Groups issues that share the same dataflow sink functions.  
Groups issues that share the same dataflow source functions.  
Source  
Source Context  
Groups dataflow issues that have the source function call contained in  
the same code context.  
Source File  
Status  
Groups dataflow issues by the source code file where the taint  
originated.  
Groups issues by the audit status (Reviewed, Unreviewed, or Under  
Review).  
Taint Flag  
URL  
Groups issues by the taint flags that they contain.  
Groups dynamic issues by the request URL.  
Customizing Issue Visibility  
You can customize the Fortify Remediation window to determine which issues it displays.  
To customize the display of hidden, removed, and suppressed issues:  
1. In the Fortify Remediation window, expand the Additional Settings section.  
2. Select or clear the following check boxes:  
l
To display all hidden issues, select Show Hidden.  
Note: The visibility filter settings in the issue template associated with the application  
version determine which issues are hidden.  
l
To display all issues that were detected in the previous analysis, but no longer exist, select  
Show Removed.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 89 of 96  
 
User Guide  
Chapter 3: Remediating Results from Fortify Software Security Center  
l
To display all suppressed issues, select Show Suppressed.  
Note: Users who audit issues can suppress specific types of issues that are not considered  
high priority or of immediate concern. For example, auditors can suppress issues that are  
fixed, or issues that your organization plans not to fix.  
The Fortify Remediation window displays issues based on your selection.  
Note: You can also specify the issue visibility settings from the Options dialog box (from the  
Fortify extension menu, select Options, and then select Remediation Configuration in the left  
pane).  
Searching for Issues  
You can use the search box below the issues list in the Fortify Remediation window to search for  
issues. For detailed instructions about the search capabilities, see "Searching for Issues" on page 46.  
Viewing Issue Information  
After you select an issue, the Fortify Extension for Visual Studio displays the issue-specific content in  
the Fortify Remediation window into the Audit, Recommendations, Details, and History tabs.  
Audit Tab  
The Fortify Remediation window Audit tab provides a dashboard of analysis information for the  
selected issue.  
Note: Any changes you make on the Audit tab are automatically uploaded to the application  
version on Micro Focus Fortify Software Security Center.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 90 of 96  
 
 
User Guide  
Chapter 3: Remediating Results from Fortify Software Security Center  
The following table describes the Audit tab features.  
Element  
Description  
User  
The user assigned to the selected issue. If the box is empty, no user is  
assigned to the selected issue. To assign a user to the issue, see "Assigning  
Analysis  
Your assessment for the selected issue. To change the assessment, select an  
item from the list. This is the primary tag as defined in Fortify Software  
Security Center. The default name of this tag is Analysis, but it might be  
different for your organization.  
<custom_  
tagname>  
Any custom tags your organization has defined in Micro Focus Fortify  
Software Security Center. If available, these are displayed below the Analysis  
(primary) tag.  
If the audit results have been submitted to Audit Assistant in Fortify  
Software Security Center, then in addition to any other custom tags, the tab  
displays the following tags:  
l
AA_Prediction—Exploitability level that Audit Assistant assigned to the  
issue. You cannot modify this tag value.  
l
AA_Confidence—Confidence level from Audit Assistant for the accuracy  
of its AA_Prediction value. This is a percentage, expressed in values that  
range from 0.000 to 1.000. For example, a value of 0.982 indicates a  
confidence level of 98.2 percent. You cannot change this tag value.  
l
AA_Training—Whether to include or exclude the issue from Audit  
Assistant training. You can modify this value.  
For more information about Audit Assistant, see the Micro Focus Fortify  
Software Security Center User Guide.  
File Path  
The path to the location of the source file for the selected issue.  
(top right)  
Issue Abstract  
A summary of the selected issue.  
(below File Path)  
Analysis Trace  
(bottom right)  
The items of evidence that the analyzer uncovered. The analysis trace is  
presented in the order it was discovered. For information about the Analysis  
Comments  
(bottom left)  
Any additional information added to the issue. For instructions on how to  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 91 of 96  
User Guide  
Chapter 3: Remediating Results from Fortify Software Security Center  
See Also  
Recommendations Tab  
The Recommendations tab provides suggestions and examples that show how to secure a  
vulnerability or remedy a bad practice. The following table describes the tab sections.  
Section  
Description  
Recommendations/Custom  
Recommendations  
Describes possible solutions for the selected issue. It can also  
include examples and recommendations that your organization has  
defined.  
Tips/Custom Tips  
Provides useful information specific to the selected issue, and any  
custom tips that your organization has defined.  
References/Custom  
References  
Lists references for the recommendations provided, including any  
custom references that your organization has defined.  
Details Tab  
The Details tab provides an abstract of the selected issue description. It might also provide more  
detailed explanations, including examples with descriptive text and code samples. The following table  
describes the tab sections.  
Section  
Description  
Abstract/Custom  
Abstract  
Displays a summary description of the selected issue, including custom  
abstracts defined by your organization.  
Explanation/Custom  
Explanation  
Displays a description of the conditions under which an issue of the  
selected type occurs. This includes a discussion of the vulnerability, the  
constructs typically associated with it, ways in which attackers can exploit  
it, and the potential ramifications of an attack. This section also provides  
custom explanations defined by your organization.  
Instance ID  
A unique identifier for the issue.  
Primary Rule ID  
The identifier for the primary rule that found the issue.  
Priority metadata values for an issue.  
Priority Metadata  
Values  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 92 of 96  
 
 
User Guide  
Chapter 3: Remediating Results from Fortify Software Security Center  
Section  
Description  
Legacy Priority  
Legacy priority metadata values for an issue.  
Metadata Values  
Remediation Effort  
The relative amount of effort required to fix and verify an issue.  
History Tab  
The History tab displays a history of audit actions, including details such as the time and date, and  
the name of the user who modified the issue.  
Updating Audit Information  
After you select and review an issue, you can update the audit information on the Audit tab.  
Assigning Users to Issues  
You can choose from a list of all users for the application version.  
To assign a user to an issue:  
1. From a folder in the Fortify Remediation window, select an issue.  
2. From the Audit tab, do one of the following:  
l
Click Assign Issue to User ( ), and then select a user name from the list.  
l
Click Assign to me to assign the issue to yourself.  
The Fortify Extension for Visual Studio makes the update to the application version on Micro Focus  
Fortify Software Security Center.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 93 of 96  
 
 
User Guide  
Chapter 3: Remediating Results from Fortify Software Security Center  
Assigning Tags to Issues  
To assign tag values to an issue:  
1. From a folder in the Fortify Remediation window, select an issue.  
2. From the Analysis list on the Audit tab, select a value that reflects your assessment of this issue.  
This is the primary tag as defined in Micro Focus Fortify Software Security Center. The default  
name of this tag is Analysis, but it might be different for your organization.  
3. If custom tags defined for the project exist, provide values for them.  
The Fortify Extension for Visual Studio displays all custom tags assigned to the application;  
however, you can only provide values for tags that your Fortify Software Security Center user  
account has permission to edit.  
For text- and decimal-type custom tags, type the value in the field, and then click Save ( ).  
Text-type custom tags accept up to 500 characters (HTML/XML tags and newlines are not  
allowed).  
For date-type custom tags, type a date or click Select Date ( ) to select a date from a calendar.  
If a list-type custom tag is extensible, you can add a new value to the tag by clicking Add Value.  
The Fortify Extension for Visual Studio makes the updates to the application version on Fortify  
Software Security Center.  
Adding Comments to Issues  
The comments box below the Analysis (primary tag) list displays any comments submitted for the  
selected issue.  
To add a comment to an issue:  
1. From a folder in the Fortify Remediation window, select an issue.  
2. Click Add Comment ( ).  
3. In the Add Comment for Issue dialog box, type a comment, and then click OK.  
The Fortify Extension for Visual Studio makes the updates to the application version on Micro Focus  
Fortify Software Security Center.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 94 of 96  
 
 
User Guide  
Chapter 3: Remediating Results from Fortify Software Security Center  
Locating Issues in Source Code  
Because the Fortify Extension for Visual Studio works as an extension to your Visual Studio IDE, you  
can use it to locate security-related issues in your code. The project you have open in Visual Studio  
must match the project (application version) you opened in the Fortify Extension for Visual Studio  
from Fortify Software Security Center.  
To locate an issue in the source code, do either of the following:  
l
From a folder in the Fortify Remediation window, select an issue.  
l
From the Audit tab, select a step from the Analysis Trace.  
The Fortify Extension for Visual Studio jumps to the line of code that contains the security-related  
issue in Visual Studio.  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 95 of 96  
 
Send Documentation Feedback  
If you have comments about this document, you can contact the documentation team by email.  
Note: If you are experiencing a technical issue with our product, do not email the documentation  
team. Instead, contact Micro Focus Fortify Customer Support at  
https://www.microfocus.com/support so they can assist you.  
If an email client is configured on this computer, click the link above to contact the documentation  
team and an email window opens with the following information in the subject line:  
Feedback on User Guide (Fortify Extension for Visual Studio 22.1.0)  
Just add your feedback to the email and click send.  
If no email client is available, copy the information above to a new message in a web mail client, and  
send your feedback to fortifydocteam@microfocus.com.  
We appreciate your feedback!  
Micro Focus Fortify Extension for Visual Studio (22.1.0)  
Page 96 of 96