User Guide
Chapter 3: Configuring Fortify Analysis with Freestyle Projects
13. To run a scan, select the Run Fortify SCA scan check box, and then specify the scan settings:
a. (Optional) In the Custom Rulepacks box, specify custom rules.
Specify custom rules files (*.xml) separated by spaces or a directory that contains custom
rules.
b. (Optional) Specify any additional scan options.
For detailed information about the scan options, see the Micro Focus Fortify Static Code
Note: Enclose each option and parameter in double quotes.
In the following example, two analyzers and quick scan mode are enabled for the scan:
"-analyzers" "controlflow,dataflow" "-quick".
c. (Optional) Enable the debug or verbose logging options.
d. (Optional) To specify a custom location for the Fortify Static Code Analyzer log file, type a file
name (or a full path) in the Log file location box.
By default, the log file is written to the workspace in /.fortify/sca<version>/log.
14. To upload the scan results to Fortify Software Security Center, select the Upload Fortify
SCA scan results to Fortify Software Security Center check box, and then specify the upload
settings:
a. Specify an application name and an application version.
Always specify both application name and application version. If you have a successful
connection to a Fortify Software Security Center server, you can search for an existing
application version. To search for an application name or version, type any part of the name
or version in the box, and then click Search ( ). You can also leave the name or version box
empty, and then click Search. This provides a list of all application names or versions within
the configured limit. This search is case-insensitive.
Note: The number of application names and application versions displayed in both these
lists is limited by the maximum application versions per list value specified in the Fortify
Jenkins Plugin configuration.
You can type an application name and version that does not exist in Fortify Software Security
Center. Fortify Jenkins Plugin will create it upon a successful build.
b. (Optional) Specify a filter set to use when retrieving scan results for display in Jenkins. If left
blank, the Fortify Jenkins Plugin uses the default filter set configured in Fortify
Software Security Center.
Note: If you specify an application version in the previous step that does not yet exist in
Fortify Software Security Center, then the Filter set list will be empty. You can configure
a filter set on the next job run.
The failure criteria and the Normalized Vulnerability Score (NVS) calculation depend on the
issues filtered by the filter set. For example, if a Quick View filter is applied to the project
issues (and no critical or high issues are found), then the failure criteria determines that there
Micro Focus Fortify Jenkins Plugin (22.1)
Page 35 of 67