Fortify Software  
Document Release Date: October 2024  
What’s New in Fortify Software 24.4.0  
October 2024  
This release of Fortify Software includes the following new functions and features.  
Fortify Software Security Center  
The following features have been added to Fortify Software Security Center.  
Technology Preview: Magellan BI and Reporting Dashboards  
This release includes a preview of upcoming support for the inclusion of OpenText  
Magellan BI and Reporting dashboards in Fortify Software Security Center. The  
Magellan BI and Reporting dashboards provide a comprehensive application  
security program overview, insights into important vulnerability metrics, and  
consistent dashboard views among the Fortify product Suite. If you are interested in  
previewing the upcoming Magellan dashboard integration, contact Customer  
Support for the software and support required to run the Technology Preview.  
Audit Issue History Tracking  
l
You can track changes in the attributes of an issue as you upload new scans for  
an audit. The issue history includes all attributes that Fortify Software Security  
Center extracts from uploaded scans that can be searched or filtered on the audit  
page.  
OpenText™ Fortify Software (24.4.0)  
Page 1 of 33  
ScanCentral SAST Controller role  
l
The ScanCentral SAST Controller role is a new pre-configured role. This role is  
Intended for use only when configuring a Fortify ScanCentral SAST Controller. It  
allows users who are permitted to run scans but do not have upload analysis  
result permissions to upload scans.  
Kubernetes support  
l
Support added for Kubernetes versions 1.30 and 1.  
l
Support added for Helm command-line tool versions 3.15 and 3.16.  
OpenText™ Fortify Software (24.4.0)  
Page 2 of 33  
Fortify ScanCentral SAST  
The following features have been added to Fortify ScanCentral SAST.  
Uploading analysis results to Fortify Software Security Center  
l
You can configure the ScanCentral SAST Controller with a ScanCentral SAST  
Controller service account created in Fortify Software Security Center. This  
enables to upload the scan results to Fortify Software Security Center using the  
Controller service account. In this case, your Software Security Center user  
accounts do not require the upload analysis results permission.  
l
The start command -uptoken option is no longer required to upload scan results  
to Fortify Software Security Center if you specify the -sscurl and -ssctoken option  
pair.  
ScanCentral client  
l
You can add JVM system and ScanCentral SAST properties (for clients and  
sensors) to the ScanCentral client commands by adding the -D option to the  
SCANCENTRAL_VM_OPTS environment variable. You can add JVM system  
properties to the environment variable for use by the PackageScanner tool.  
l
You can retrieve your package (job file) from the Controller using the retrieve  
command --job-file option.  
l
The client start command -sargs option accepts the Fortify Static Code Analyzer -  
bin option.  
l
The client start command -targs option accepts the Fortify Static Code Analyzer -  
gotags option.  
l
When packaging PHP projects that use Composer for dependency management,  
the ScanCentral client will automatically restore the dependencies prior to  
generating the package.  
l
Support packaging Maven projects that use the -Dmaven.repo.localor  
-Dsettings.localRepositoryproperties to configure a non-default local  
repository location.  
Updated build tool support  
l
Support for Gradle 8.7 - 8.10  
ScanCentral SAST containers  
l
New ScanCentral SAST Windows Sensor container with Windows Server 2022  
as a base image  
l
New database migration container to migrate the ScanCentral SAST Controller  
database when upgrading  
OpenText™ Fortify Software (24.4.0)  
Page 3 of 33  
Fortify Static Code Analyzer  
The following features have been added to Fortify Static Code Analyzer.  
Platforms  
l
Linux on ARM support  
l
IBM AIX 7.3  
Languages  
l
.NET (Core) 9.x  
l
ABAP 7.x  
l
Angular 17  
l
Apex 61  
l
C# 13  
l
Go 1.23  
l
Kotlin 2.0  
l
PL/SQL 10, 11, 12, 18, 19, 21, and 23  
l
TypeScript 5.3 and 5.4  
Build tools  
l
Bazel 7.x  
l
Gradle 8.5  
l
MSBuild 17.11  
l
MSBuild and Bicep support on .NET 8  
Platforms and architectures  
l
Added support for IBM AIX 7.3.  
Features/Updates  
l
Updated the scan policies with the ability to exclude dataflow issues based on  
taint flags  
l
Added support for Go build tags with the -gotagscommand-line option  
l
Added support for Flask framework and Jinja2 templates  
OpenText™ Fortify Software (24.4.0)  
Page 4 of 33  
Fortify Static Code Analyzer Tools  
The following features have been added to Fortify Static Code Analyzer tools.  
Secure code plugins  
l
Support for Eclipse 2024-06  
l
Support for IntelliJ IDEA 2024.2  
l
Support for Android Studio 2023.3 and 2024.1  
l
Support for Azure DevOps Server 2022  
Fortify ScanCentral DAST  
The following features have been added to ScanCentral DAST.  
Scan Details now has Create By  
The scan details panel now displays the user that created/imported the scan.  
New REST endpoint to view messages  
SC DAST has added an endpoint to retrieve the polling messages that occur in the  
product. These are primarily the message that the global service is processing from  
the sensors.  
Linux containers now on UBI9  
The SC DAST containers on Linux is now on the RedHat UBI9 with .NET 8.  
OpenText™ Fortify Software (24.4.0)  
Page 5 of 33  
Fortify WebInspect  
The following features have been added to WebInspect.  
WebInspect CLI & API  
Support has been added for using an external SQL Server database when using  
either the WebInspect CLI or the WebInspect API.  
Expanded URL field  
URL field has been expanded for API scans using a postman collection. This allows  
the user to view the authentication endpoints and proceed with a dynamic token  
strategy.  
HAR improvements  
Updates to the HAR parser allows for a greater number of formats from different  
browsers.  
New logging option  
New environment variable for logging to stderr output.  
Linux containers now on UBI9  
The WebInspect container on Linux is now on the RedHat UBI9 with .NET 8.  
Contacting Customer Support  
Visit the Support website to:  
l
Manage licenses and entitlements  
l
Create and manage technical assistance requests  
l
Browse documentation and knowledge articles  
l
Download software  
l
Explore the Community  
We Welcome Your Feedback  
If you have comments or suggestions about the documentation, you can send these  
to the documentation team at fortifydocteam@opentext.com. Please use the  
subject line “Feedback on <Document_Title> <Product_Version>.” We appreciate  
your feedback!  
OpenText™ Fortify Software (24.4.0)  
Page 6 of 33  
Copyright 2024 Open Text.  
What’s New in Fortify Software 24.2.0  
May 2024  
This release of Fortify Software includes the following new functions and features.  
Fortify Software Security Center  
The following features have been added to Fortify Software Security Center.  
Data Retention  
Administrators can define time period for retaining application version artifacts.  
Customizable UI Theme  
You can now set the UI theme to dark, light, or automatic.  
Customized BIRT Reports  
l
Generate and download customized BIRT reports in XLSX format.  
l
Supports BIRT Report Designer 4.14.0  
Syncronize Audit History Changes in Fortify ScanCentral DAST using Kafka  
You can set up Kafka to synchronize audit history changes for suppressed issues,  
priority override, and analysis tag with Fortify ScanCentral DAST.  
fortfyclient Timeouts  
Set up timeouts for connect, read, and write for fortifyclient.  
OpenText™ Fortify Software (24.4.0)  
Page 7 of 33  
Kubernetes support  
1.29  
Helm support  
3.13 and 3.14  
Updated LOC (lines of code) calculation  
To better align with the LOC count shown by code editors, Fortify Static Code  
Analyzer now reports the total number of lines of code, including blank lines and  
comments. Due to this change, when you upload an artifact created with Fortify  
Static Code Analyzer 24.2.0 (or later) to an SSC application version that already  
contains artifacts generated by earlier versions of Fortify Static Code Analyzer, a  
one-time approval may be required if the following processing rule is enabled:  
Require approval if line count differs by more than 10%. Once  
a 24.2.0 artifact has been approved in an application version, subsequent 24.2.0  
uploads to that application version will no longer trigger the processing rule unless  
the LOC count changes due to significant code changes or changes in the scan  
setup.  
OpenText™ Fortify Software (24.4.0)  
Page 8 of 33  
Fortify ScanCentral SAST  
The following features have been added to Fortify ScanCentral SAST.  
Sensor Version Support  
Scan requests initiated from older clients can be assigned and processed by newer  
sensor versions.  
Encoded Tokens  
Added support for encoded tokens (decoded tokens are deprecated).  
ScanCentral SAST Client  
l
Ability to use the Debricked CLI for open source software composition analysis  
(for use with Fortify on Demand only).  
l
Simplified commands by automatically detecting requirements.txtfor Python  
projects, the PHP version for PHP projects, and setting a default value for  
package name.  
ScanCentral Controller  
You can configure the Controller to disallow queuing multiple scan requests that are  
uploaded to the same application version. If enabled, newer scan requests will  
replace the one that is in the queue while keeping its priority. It can be overridden  
with an option for individual scan requests.  
Updated Build Tool Support  
l
Support for Gradle 8.6  
l
Support for dotnet 8.0  
l
Support for MSBuild 17.9  
OpenText™ Fortify Software (24.4.0)  
Page 9 of 33  
Fortify Static Code Analyzer  
The following features have been added to Fortify Static Code Analyzer.  
Platforms  
l
macOS 14 support  
Languages  
l
Angular 16.1 and 16.2  
l
Apex 59 and 60  
l
C23  
l
Dart 3.1  
l
Django 5.0  
l
Flutter 3.13  
l
Go 1.21 and 1.22  
l
Java 21  
l
Kotlin 1.9  
l
PHP 8.3  
l
Scala 3, versions 3.3-3.4  
l
Swift 5.10  
l
TypeScript 5.1 and 5.2  
l
Visual Basic (VB.NET) 16.9  
Compilers  
l
gcc 13  
l
g++ 13  
l
Swiftc 5.9.2, 5.10  
Build tools  
l
Bazel 6.4.0  
l
CMake 3.23.3 and later  
l
MSBuild 17.9  
l
xcodebuild 15.3  
OpenText™ Fortify Software (24.4.0)  
Page 10 of 33  
Features/Updates  
l
ARM JSON Templates (IaC)  
l
AWS CloudFormation (IaC)  
l
Scanning .NET requires .NET SDK 8.0.  
l
The default python version is now 3.  
l
The default scan policy has changed from classic to security. The security scan  
policy excludes issues related to code quality from the analysis results.  
l
Ability to specify the location of a custom supported JDK or JRE version that is not  
included in the Fortify Static Code Analyzer installation  
l
Fortify Static Code Analyzer automatically detects the content of files with a .cls  
extension to determine if they are Apex or Visual Basic code. This removes the  
need to include the -apex option, which is now deprecated.  
l
Updated LOC (lines of code) calculation: To better align with the LOC count  
shown by code editors, Fortify Static Code Analyzer now reports the total number  
of lines of code, including blank lines and comments. Due to this change, when  
you upload an artifact created with Fortify Static Code Analyzer 24.2.0 (or later) to  
an SSC application version that already contains artifacts generated by earlier  
versions of Fortify Static Code Analyzer, a one-time approval may be required if  
the following processing rule is enabled: Require approval if line  
count differs by more than 10%. Once a 24.2.0 artifact has been  
approved in an application version, subsequent 24.2.0 uploads to that application  
version will no longer trigger the processing rule unless the LOC count changes  
due to significant code changes or changes in the scan setup.  
OpenText™ Fortify Software (24.4.0)  
Page 11 of 33  
Fortify Static Code Analyzer Tools  
The following features have been added to Fortify Static Code Analyzer tools.  
Fortify Applications and Tools Installer  
Now includes the standalone Fortify ScanCentral SAST client.  
Fortify Audit Workbench  
Now includes a timeout setting for downloading analysis results from Fortify  
Software Security Center.  
Secure Coding Plugins  
l
Support for Red Hat Enterprise Linux (RHEL) 9  
l
Support for macOS 14  
l
Fortify Visual Studio Extension supports suppressing issues and auditing multiple  
issues in batch when remediating analysis results on Fortify Software Security  
Center.  
l
Fortify Plugin for Eclipse, Fortify Analysis Plugin for IntelliJ IDEA and Android  
Studio, and the Fortify Extension for Visual Studio support analysis with a  
standalone ScanCentral SAST client.  
l
Support for Eclipse 2023-12 and 2024-03  
l
Support for IntelliJ IDEA 2023.3 and 2024.1  
l
Support for Android Studio 2023.1 and 2023.2  
l
The Fortify Analysis Plugin for IntelliJ IDEA and Android Studio, Fortify Plugin for  
Eclipse, and Fortify Extension for Visual Studio will be available in the relevant  
marketplaces.  
New Issue Reports  
l
DISA STIG 5.3  
l
OWASP Mobile Top 10 2024  
OpenText™ Fortify Software (24.4.0)  
Page 12 of 33  
Fortify ScanCentral DAST  
The following features have been added to ScanCentral DAST.  
Syncing of Suppressed Issues in Fortify Software Security Center  
You can now configure Kafka settings in ScanCentral DAST to provide support for  
the syncing of audit history changes in Fortify Software Security Center, including  
support for suppressed issues. Additionally, you can show or hide suppressed  
issues in the ScanCentral DAST Scans view and scan visualization.  
Regex Editor Tool  
ScanCentral DAST now includes a Regex Editor tool that enables you to construct  
and test regular expressions.  
Perform Actions on Multiple Scans  
You can select multiple scans and then pause, start, stop, delete, or publish them.  
Use an Access Token for Sensor Auto Scaling  
When configuring Sensor Auto Scaling in a Kubernetes environment, you can now  
configure ScanCentral DAST to read an access token from the default path in  
Kubernetes, to retrieve the token from a specific path in the container, or to use a  
long-lived access token.  
DAST Health Monitoring  
Readiness and liveness probe commands have been added to ScanCentral DAST  
services to enable Kubernetes to detect failures and restart containers.  
OAuth 2.0 Support  
You can now configure Client Credentials Grant and Password Credentials Grant  
OAuth 2.0 authentication flows for scans requiring network authentication.  
Mac Version of Event-based Web Macro Recorder Tool  
The Event-based Web Macro Recorder tool is available for Mac, which enables you  
to create login and workflow macros on macOS.  
OpenText™ Fortify Software (24.4.0)  
Page 13 of 33  
Fortify WebInspect  
The following features have been added to WebInspect.  
Docker Images Available in Iron Bank  
The Fortify WebInspect (DAST) scanner Docker image is available on the Iron Bank  
hardened container image repository, along with the 2FA, FAST, OAST, and WISE  
images.  
Enhanced CycloneDX Export Data  
CycloneDX export data now includes vulnerability details, including CVE ID  
number, description, ratings, affected library versions, and the source provider’s  
URL (PURL).  
OAuth 2.0 Support  
You can now configure Client Credentials Grant and Password Credentials Grant  
OAuth 2.0 authentication flows for scans requiring network authentication.  
Mac Version of Event-based Web Macro Recorder Tool  
The Event-based Web Macro Recorder tool is available for Mac, which enables you  
to create login and workflow macros on macOS.  
What’s New in Fortify Software 23.2.0  
December 2023  
This release of Fortify Software includes the following new functions and features.  
Fortify Software Security Center  
The following features have been added to Fortify Software Security Center.  
Fortify Audit Assistant Gen 2  
Audit Assistant is an optional tool that you can use to help determine whether or not  
the issues returned from your scans represent true vulnerabilities. Generation 2, or  
Gen 2, of Audit assistant is now available. Using advanced AI and machine  
learning, Gen 2 provides improved accuracy, training based on the decisions your  
auditors have made, and greater speed.  
OpenText™ Fortify Software (24.4.0)  
Page 14 of 33  
When upgrading Fortify Software to version 23.2.0, you must also upgrade Audit  
Assistant to use the new Gen 2 version of Audit Assistant.  
BIGINT Data Type Replaces INT in scan_issue(ID) and issue(ID) Fields  
This change affects the scan_issue table in both MSSQL and MySQL databases.  
During database migration, the data type for scan_issue(ID) and issue(ID) will be  
changed to BIGINT if it has not already been done. For information on how this  
impacts your database migration, see "Preparing to Upgrade the Fortify Software  
Security Center Database" in the OpenText™ Fortify Software Security Center User  
Guide.  
OpenText™ Fortify Software (24.4.0)  
Page 15 of 33  
Debricked SBOM Support  
You can now download Debricked Software Bill Of Materials and view information  
on the third-party components in your application.  
Base URL Attribute  
You can now assign a base URL attribute via the  
SCANCENTRAL DAST ATTRIBUTES page.  
New Automation Token  
Fortify Software Security Center now has a new SSC API Token type: the  
AutomationToken. This token type is a duplicate of the UnifiedLoginToken type. It  
provides access to most of the REST API and is intended for use in long-running  
automations and can be configured to last up to a year.  
Preserve Issue Detected on Date Across Versions  
Now, when creating a new application version based on a previous version, the  
Detected on date will be carried over to the new version. Previously, the Detected  
on date was set to the current date when basing a new application version on a  
previous one.  
Change User Assigned to an Issue  
You can now change the user assigned to an issue.  
Custom Banner  
An administrator can create an informational banner that persists until removed or  
changed.  
New Reports  
The premium report bundle now includes two new issue reports:  
l
OWASP API Top 10 (2023)  
l
CWE Top 25 (2023)  
The following report versions are no longer available in this release:  
l
SANS 2009/2010  
l
STIG 4.10, 4.9 and below  
l
OWASP < 2013  
l
CWE Top 25 2019/2020  
l
WASC 24 + 2  
REST Fortify Client  
The REST fortifyclient replaces the SOAP fortifyclient and is now the default.  
Additions to the System Requirements  
OpenText™ Fortify Software (24.4.0)  
Page 16 of 33  
Fortify Software Security Center Database  
l
SQL Server 2022  
Service Integrations  
l
Jira 9.10  
Software Requirements  
l
Red Hat Enterprise Linux 9 (RHEL 9) support  
l
Kubernetes 1.27 and 1.28 support  
l
Helm 3.12 support  
BIRT Reporting  
l
BIRT Report Designer 4.13.0  
OpenText™ Fortify Software (24.4.0)  
Page 17 of 33  
Fortify ScanCentral SAST  
The following features have been added to Fortify ScanCentral SAST.  
l
Support for ScanCentral SAST .NET scanning and packaging on Linux systems  
l
Support for remote translation and scan of COBOL projects  
l
ScanCentral SAST will now retry any failed uploads to Fortify Software Security  
Center. Use the new upload command to resend an FPR file to Fortify Software  
Security Center after a previous upload attempt failed.  
l
REST API documentation for the Fortify ScanCentral SAST Controller is available  
with Swagger UI  
l
You can now package the debug logs from clients, sensors, and Fortify Static  
Code Analyzer into a ZIP archive using the start command option -diagnosis.  
l
Offload translation and scan support with Gradle versions 7.4-8.3 and MSBuild  
versions 17.4 - 17.8  
OpenText™ Fortify Software (24.4.0)  
Page 18 of 33  
Fortify Static Code Analyzer  
The following features have been added to Fortify Static Code Analyzer:  
Build tools  
l
Ant 1.10.14  
l
Gradle 8.1 and 8.3  
l
Maven 3.9.4  
l
MSBuild 17.6 - 17.8  
l
xcodebuild 15 and 15.0.1  
Languages  
l
Angular 15.1, 15.2, 16.0  
l
Apex 58  
l
Bicep v0.12.x → current  
l
0.12.1 → 0.14.85 (supporting .NET 6)  
l
0.15.31 → current (supporting .NET 7)  
l
C# 12  
l
C17  
l
Dart 3.0  
l
ECMAScript 2023  
l
Go 1.20  
l
Kotlin 1.8  
l
.NET 8.0  
l
Python 3.12  
l
Django up to 4.2  
l
React 18.0  
l
Solidity 0.4.12-0.8.21  
l
Swift 5.9  
l
TypeScript 5.0  
Compilers  
l
Clang 15.0.0  
l
Swiftc 5.9  
OpenText™ Fortify Software (24.4.0)  
Page 19 of 33  
Fortify Static Code Analyzer Tools  
The following features have been added to Fortify Static Code Analyzer tools.  
The Fortify Static Code Analyzer installer no longer includes the Fortify Static  
Code Analyzer applications and tools. A separate installer is included for  
installing the Fortify Static Code Analyzer applications and tools.  
Fortify Audit Workbench  
l
Syntax source code highlighting for Terraform, Dart, Bicep, and Solidity.  
l
Installation automatically detects the Fortify Static Code Analyzer versions  
installed in a default location.  
l
By default, Fortify Audit Workbench does not display binary source code  
Secure Coding Plugins  
• Fortify Plugin for Eclipse adds support for 2023-06 and 2023.06  
• Fortify Analysis Plugin for IntelliJ IDEA and Android Studio adds support for IntelliJ  
IDEA 2023.2 and Android Studio 2022.2 and 2022.3  
New Report Versions  
OWASP MASVS 2.0  
CWE Top 25 2023  
OWASP API Top 10 2023  
OpenText™ Fortify Software (24.4.0)  
Page 20 of 33  
Fortify ScanCentral DAST  
The following features have been added to ScanCentral DAST  
Fortify Connect  
The new Fortify Connect feature enables you to perform scans of private  
applications from the cloud without exposing the application through your firewall.  
Event-based Logout Conditions  
The Event-based Web Macro Recorder now supports the use of JavaScript during  
execution to detect and notify the Fortify Weblnspect sensor of logout.  
Event Handlers  
The Event-based Web Macro Recorder now supports event handlers that react to  
unpredictable events, such as dialogs opening and popup DOM elements that steal  
focus.  
Web Storage Keys  
The Event-based Web Macro Recorder now supports the use of web storage keys  
that enable the application to determine and maintain state.  
Support for IMAP in Two-factor Authentication Scans  
Two-factor authentication scanning now supports IMAP email servers.  
OpenText™ Fortify Software (24.4.0)  
Page 21 of 33  
Fortify WebInspect  
The following features have been added to Fortify WebInspect.  
Fortify License and Infrastructure Manager  
Linux Version  
A Linux version of the Fortify License and Infrastructure Manager (LIM) is now  
available for download from the Fortify Docker repository.  
Event-based Logout Conditions  
The Event-based Web Macro Recorder now supports the use of JavaScript during  
execution to detect and notify the Fortify Weblnspect sensor of logout.  
Event Handlers  
The Event-based Web Macro Recorder now supports event handlers that react to  
unpredictable events, such as dialogs opening and popup DOM elements that steal  
focus.  
Web Storage Keys  
The Event-based Web Macro Recorder now supports the use of web storage keys  
that enable the application to determine and maintain state.  
Web Socket Events  
WebInspect now includes a Capture Web Socket Events setting in the JavaScript  
dialog under Scan Settings.  
Support for IMAP in Two-factor Authentication Scans  
Two-factor authentication scanning now supports IMAP email servers.  
What’s New in Fortify Software 23.1.0  
May 2023  
This release of Fortify Software includes the following new functions and features.  
Fortify Software Security Center  
The following features have been added to Fortify Software Security Center.  
OpenText™ Fortify Software (24.4.0)  
Page 22 of 33  
FIPS-Inside Technology Preview  
With this release, you can run Fortify Software Security Center functions in RHEL  
8.5 and 9.0 FIPS-only-enabled environments. However, Kerberos SSO  
authentication is not supported. The support is subject to limitations of Red Hat  
OpenJDK 11 on the RHEL OS in FIPS mode. Since this has been released as a  
Technology Preview, please report any omissions, issues, or gaps in functionality  
so that we can address them prior to the next release.  
Priority Override Signifiers in Reports  
Changes to Fortify priority values (using the priority override feature) are now  
reflected in issue reports. For details, see "Viewing Priority Overrides Information in  
Issue Reports" in the Fortify Software Security Center User Guide, 23.1.0.  
Fortify Insight  
If you have purchased Fortify Insight, you can link your Fortify Software Security  
Center to your Fortify Insight dashboard by adding a Fortify Insight link to your SSC  
Dashboard.  
OpenText™ Fortify Software (24.4.0)  
Page 23 of 33  
Extended Search Capability for X.509 SSO Implementation  
Previously, for an X.509 SSO implementation, Fortify Software Security Center  
searched the Subject field of the client certificate to retrieve the username for  
certificate authentication. The search now extends to include the Subject Alternative  
Name field.  
Replacing SOAP fortifyclient with REST fortifyclient  
In an effort to further secure your Fortify Software Security Center deployment,  
Fortify is phasing out SOAP fortifyclientand replacing it with REST  
fortifyclient. In this release, SOAP fortifyclient remains the default, but REST  
fortifyclientis available to you.  
The file names for both utilities are the same, but the files are in different directories.  
The SOAP fortifyclient files are in <ssc_install_  
dir>/Tools/fortifyclient/binand the REST fortifyclient files are in <ssc_  
install_dir>/Tools/fortifyclient-new-rest/bin.  
To improve security and prepare for the eventual deprecation of SOAP-based  
fortifyclient, Fortify strongly recommends disabling SOAP and testing the REST  
version of fortifyclient in your testing environment. Report any lack of parity or  
functionality as soon as possible.  
For more information, see the Fortify Software Release Notes 23.1.0.  
Job Queue Redesign  
A new job execution strategy named "Flexible (technical preview)" is introduced in  
this release. Based on the conservative strategy, the flexible strategy makes more  
efficient use of job queue sensors. Users can switch between the new strategy and  
previous strategies, as needed.  
Improved Event Log Filtering  
Two new options enable you to refine the data displayed on the Event Logs page.  
You can now specify a username and / or an event type to filter the events that you  
view and export. To remove specified filters, click CLEAR.  
Cloud Database Support  
Fortify Software Security Center now supports SQL Server in both Azure and AWS  
cloud database services.  
Windows Server 2022 Support  
Fortify Software Security Center now supports running on the Windows Server 2022  
operating system.  
Kubernetes Support  
OpenText™ Fortify Software (24.4.0)  
Page 24 of 33  
l
l
Support added for Kubernetes versions 1.25 and 1.26  
Support added for Kubernetes Persistent Volumes with optional support for Pod  
Security Context fsGroup option (fsGroup support is required for using a non-  
default container user ID)  
l
l
Support added for kubectl command-line tool version 1.24, 1.25, and 1.26. Fortify  
recommends the use of the same version of kubectl command-line tool as the  
Kubernetes cluster version  
Support added for version 3.10 and 3.11 of the Helm command-line tool  
Fortify ScanCentral SAST  
The following features have been added to Fortify ScanCentral SAST.  
Specifying Fortify Static Code Analyzer Options and Properties as -targs and -  
sargs Arguments  
ScanCentral now supports the options specified in -targsand -sargsthat Fortify  
Static Code Analyzer allows, and ignores or blocks those that are not allowed.  
Clients now accept rules, filters, and project templates - not only through the  
designated ScanCentral options, but also from the scan arguments parameter (-  
sargs). Previously, if specified, these options were ignored. For more information,  
see Appendix A: Fortify ScanCentral SAST Command-Line Options in the Fortify  
ScanCentral SAST Installation, Configuration, and Usage Guide.  
New Status Command Option: --block-until  
Previously, a ScanCentral client had no way to let you know if an FPR that you  
uploaded to Fortify Software Security Center was processed completely. Now, you  
can use the --block-until option to block additional actions from being performed  
until processing is complete, so that the merged results you later download include  
all of the audits, comments, suppressed issues, and history from the previous  
scans.  
The new --block-untiloption for the STATUS command polls Fortify Software  
Security Center for the scan merge status, and then returns the following  
information:  
l
Job status  
l
SSC upload status  
l
SSC application version ID  
l
SSC application name  
l
SSC application version name  
l
SSC artifact ID  
l
SSC artifact status  
OpenText™ Fortify Software (24.4.0)  
Page 25 of 33  
Build Tools  
l
Added support for Maven version 3.9.x  
Auto Detection of Build Tool for Remote Translation  
Previously, to perform a remote translation, you had to supply the -bt(--build-  
tool) option with a value that specified the build tool. Now, Fortify ScanCentral  
SAST detects the build tool automatically based on the project files being scanned.  
For example, if Fortify ScanCentral SAST detects a pom.xml file, it automatically  
sets -btto mvn. If it detects a build.gradlefile, it sets -btto gradle. If Fortify  
ScanCentral SAST detects a *.slnfile, it sets -btto msbuild and sets -bfto the  
xxx.slnfile.  
If ScanCentral detects multiple file types (for example, pom.xmland build.gradle),  
it prioritizes the build tool selection as follows: Maven > Gradle > MSBuild and prints  
a message to indicate which build tool type was selected based on the multiple file  
types found.  
Note: If you specify the build tool manually, auto-detection is overridden.  
Configurable Location for the worker-persist.properties File  
For containerized deployments it is useful to determine where certain files are  
generated so that you can customize persistence. For example, the worker-  
persist.propertiesfile and the job files are stored in the same folder (sensor  
working directory). Now, you can use two new properties to specify where the  
worker-persist.propertiesfile is generated and where the job files are generated.  
This enables you to persist the worker-persist.propertiesfile, which is needed to  
maintain sensor pool assignments, without having to keep all of the old Job files.  
Fortify ScanCentral Controller and Sensor Docker Images and Helm Chart  
ScanCentral Controller and Sensor Docker images are now available on Docker  
Hub. You must be a member of the fortifydocker organization to download the  
images. A Helm Chart is available at https://github.com/fortify/helm3-charts.  
Windows Server 2022 Support  
Fortify ScanCentral SAST now runs on the Windows Server 2022 operating system.  
OpenText™ Fortify Software (24.4.0)  
Page 26 of 33  
Fortify Static Code Analyzer  
The following features have been added to Fortify Static Code Analyzer.  
Features  
l
The Fortify Static Code Analyzer installation program no longer includes the  
Fortify Static Code Analyzer applications and tools. A separate installer is  
provided to install the Fortify Static Code Analyzer applications and tools.  
l
Scan Policy  
You can set a scan policy to identify the most serious vulnerabilities. There are  
three policies to choose from: classic, security, or devops. The classic scan policy  
is the default; it does not prioritize analysis results. The security scan policy is  
used to exclude issues related to code quality from the results. Use this policy to  
focus on remediation. The devops scan policy excludes issues that are also  
excluded by the security policy and reduces the number of low-priority issues.  
Use this policy when speed is a priority and developers want to review results  
directly (without intermediate auditing).  
l
Filter Files  
You can now set an exclusion threshold value to a filter file by adding one of the  
following exclusion types: priority, impact, likelihood, confidence, probability, and  
accuracy.  
l
.NET analysis on Linux. You can now translate .NET code on Linux installations  
of Fortify Static Code Analyzer.  
Platforms  
l
Red Hat Enterprise Linux 9.x  
l
macOS 13 on Intel and Apple Silicon (compatibility mode)  
Compilers  
l
Clang 14.0.3  
l
gcc 11  
l
g++ 11  
l
swiftc 5.8  
Build tools  
l
Ant 1.10.13  
l
Gradle 8.0.2  
l
Maven 3.9.1  
OpenText™ Fortify Software (24.4.0)  
Page 27 of 33  
l
l
MSBuild 17.5 (Windows)  
Xcodebuild 14.2 and 14.3  
OpenText™ Fortify Software (24.4.0)  
Page 28 of 33  
Languages  
l
.NET 7  
l
Apex 56 and 57  
l
ASP.NET Core 7  
l
C# 11  
l
Dart 2.12 - 2.18 / Flutter 2.0 - 3.3  
Rules for Dart/Flutter will be released in Q2 2023.  
l
ECMAScript 2022  
l
Go 1.18 and 1.19  
l
Kotlin 1.7  
l
PHP 8.2  
l
Python 3.10, 3.11  
l
TypeScript 4.6 - 4.9  
OpenText™ Fortify Software (24.4.0)  
Page 29 of 33  
Fortify Static Code Analyzer Tools  
The following features have been added to Fortify Static Code Analyzer tools.  
The Fortify Static Code Analyzer installer no longer includes the Fortify Static  
Code Analyzer applications and tools. A separate installer is included for  
installing the Fortify Static Code Analyzer applications and tools.  
Platforms and Architectures  
l
Windows 11  
l
macOS 13. All tools run in compatibility mode on Apple M1 and M2 processors  
Secure Code Plugins  
Added support for updated versions of the following IDEs:  
l
Eclipse 2023-03  
l
IntelliJ IDEA 2023.1  
l
Android Studio 2022.1  
l
Visual Studio 2022, version 17.5  
Fortify Extension for Visual Studio  
The remediation phase now supports custom tags that require comments and the  
priority override tag.  
New Report Template Versions  
l
PCI DSS 4.0  
l
PCI SSF 1.2  
l
DISA STIG 5.2  
OpenText™ Fortify Software (24.4.0)  
Page 30 of 33  
Fortify ScanCentral DAST  
The following features have been added to ScanCentral DAST  
Client-side Library Analysis  
The hacker-level insights check has been enhanced to include information from the  
National Vulnerability Database (NVD) and Debricked health metrics when  
configured with a Debricked access token.  
Key Stores  
ScanCentral DAST now provides key stores as a way to create variables that you  
can use in scan settings, base settings, and macro parameters. When a scan is run,  
these variables are replaced with the latest values from the key store.  
Artifacts Repositories  
ScanCentral DAST now supports using artifacts repositories where scan artifacts  
reside. When a scan is run that references an artifact in a repository, either a tagged  
version or the latest copy of the artifact is pulled and used to configure and run the  
scan.  
Private Data Settings  
You can now configure private data settings that remove personally identifiable  
information from the scan and log data upon scan completion.  
Scan Visualization Enhancements for API Scans  
The site tree in scan visualization now includes icons for operations and parameters  
in API scans.  
Postman Scan Enhancements  
You can now import global variables files to use in Postman scans. There are also  
changes to validation and the ability to edit the sessions contained in collection files  
after validation.  
OpenText™ Fortify Software (24.4.0)  
Page 31 of 33  
Fortify WebInspect  
The following features have been added to Fortify WebInspect.  
Client-side Library Analysis  
The hacker-level insights check has been enhanced to include information from the  
National Vulnerability Database (NVD) and Debricked health metrics when  
configured with a Debricked access token.  
Two-factor Authentication  
WebInspect has added the ability to automate Two-factor Authentication scans of  
sites using Authenticator Apps. This is in addition to our SMS- and email-based two-  
factor scanning. Once configured, there is no need for user interaction.  
SQLite SecureBase  
WebInspect now uses a SQLite database for SecureBase. The file extension is now  
SecureBase.db.  
Support for Postman Global Variables  
You can now import global variables files to use in Postman scans.  
WebInspect REST API v2  
The WebInspect REST API now includes a version 2, which includes asynchronous  
versions of endpoints that take a long time to complete. These endpoints generate a  
job token that you can use with the v2 Job endpoints to get the status and results  
from the job.  
Enhanced Support of Localized SecureBase Content  
A new Application Setting for SmartUpdate allows you to select a language to  
localize the security and report content in SecureBase.  
Enhancements to False Positives  
False Positives and ignored items have been renamed as Suppressed Findings in  
the UI. You can now export and import suppressed findings as JSON files.  
Enhanced Support for Client Certificates  
WebInspect now supports client certificates with strong private key (password)  
protection in Guided Scans, Basic Scans, and Interactive Scans.  
Improved Scan Coverage and Performance  
Fortify continues to enhance its engines to improve scan coverage and  
performance. WebInspect 23.1.0 provides a faster crawl and audit, and better  
OpenText™ Fortify Software (24.4.0)  
Page 32 of 33  
application support with the Event-based Web Macro Recorder (formerly called  
Web Macro Recorder with Macro Engine 23.1.0).  
WebInspect Software Requirements  
Added support for Windows Server 2022, SQL Server 2022, and SQL Server  
Express 2022.  
OpenText™ Fortify Software (24.4.0)  
Page 33 of 33