Micro Focus Fortify Static Code Analyzer: Installation Guide
Micro Focus Fortify Static Code Analyzer: Installation Guide
Installation Guide
Legal Notices
Micro Focus
The Lawn
22-30 Old Bath Road
Newbury, Berkshire RG14 1QN
UK
https://www.microfocus.com
Warranty
The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in
the express warranty statements accompanying such products and services. Nothing herein should be construed as
constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained
herein. The information contained herein is subject to change without notice.
Copyright Notice
© Copyright 2003 - 2018 Micro Focus or one of its affiliates
Trademark Notices
Adobe™ is a trademark of Adobe Systems Incorporated.
Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation.
UNIX® is a registered trademark of The Open Group.
Documentation Updates
The title page of this document contains the following identifying information:
l Software Version number
l Document Release Date, which changes each time the document is updated
l Software Release Date, which indicates the release date of this version of the software
To check for recent updates or to verify that you are using the most recent edition of a document, go to:
https://www.microfocus.com/support-and-services/documentation
Contents
Preface 5
Contacting Micro Focus Fortify Customer Support 5
For More Information 5
About the Documentation Set 5
Change Log 6
Chapter 1: Introduction 7
Intended Audience 7
Fortify Security Content 7
Fortify Static Code Analyzer Component Applications 7
Related Documents 8
All Products 9
Micro Focus Fortify Static Code Analyzer 9
Chapter 2: Installation 12
About Downloading the Software 12
About Installing Fortify Static Code Analyzer and Applications 12
Installing Fortify Static Code Analyzer and Applications 12
Installing Fortify Static Code Analyzer and Applications Silently (Unattended) 14
Installing Fortify Static Code Analyzer and Applications in Text-Based Mode on
Non-Windows Platforms 16
About Upgrading Fortify Static Code Analyzer and Applications 16
Notes About Upgrading the Fortify Extension for Visual Studio 16
About Uninstalling Fortify Static Code Analyzer and Applications 17
Uninstalling Fortify Static Code Analyzer and Applications 17
Uninstalling Fortify Static Code Analyzer and Applications Silently 18
Uninstalling Fortify Static Code Analyzer and Applications in Text-Based Mode on
Non-Windows Platforms 18
Preface
Contacting Micro Focus Fortify Customer Support
If you have questions or comments about using this product, contact Micro Focus Fortify
Customer Support using one of the following options.
To Manage Your Support Cases, Acquire Licenses, and Manage Your Account
https://softwaresupport.softwaregrp.com
To Call Support
1.844.260.7219
Change Log
The following table lists changes made to this document. Revisions to this document are
published only if the changes made affect product functionality.
Software Release /
Document Version Changes
18.10 Updated:
l "About Installing Fortify Static Code Analyzer and Applications" on
page 12 and "About Uninstalling Fortify Static Code Analyzer and
Applications" on page 17 - Installer file names were changed for
rebranding
l "Removing Proxy Server Settings" on page 21 - Method to remove
proxy settings is the same for Fortify Rulepack update server and
Fortify Software Security Center
17.20 Added:
l "About Upgrading Fortify Static Code Analyzer and Applications"
on page 16
Updated:
l "Installing Fortify Static Code Analyzer and Applications" on
page 12 and "Installing Fortify Static Code Analyzer and
Applications Silently (Unattended)" on page 14 - Installation of the
sample source code projects is now optional
17.10 Updated:
l "About Uninstalling Fortify Static Code Analyzer and Applications"
on page 17 - Described the new prompt to remove all application
settings
l "Configuring for Security Content Updates" on page 20 and
"Configuring the Connection to Fortify Software Security Center"
on page 21 - Added instructions for how to remove proxy server
settings
Intended Audience
This installation guide is intended for individuals who are responsible for installing or uninstalling
Fortify Static Code Analyzer and Fortify Static Code Analyzer tools. This guide also describes basic
post-installation tasks.
See the Micro Focus Fortify Software System Requirements document to be sure that your system
meets the minimum requirements for each software component installation.
A Fortify Static Code Analyzer installation might also include one or more of the following component
applications:
l Micro Focus Fortify Audit Workbench—Provides a graphical user interface for Fortify Static Code
Analyzer that helps you organize, investigate, and prioritize analysis results so that developers can
fix security flaws quickly.
l Micro Focus Fortify Plugin for Eclipse—Adds the ability to scan and analyze the entire codebase of a
project and apply software security rules that identify the vulnerabilities in your Java code from the
Eclipse IDE. The results are displayed, along with descriptions of each of the security issues and
suggestions for their elimination.
l Micro Focus Fortify Remediation Plugin for Eclipse—Works with Micro Focus Fortify Software
Security Center for developers who want to remediate issues detected in source code from the
Eclipse IDE.
l Micro Focus Fortify Extension for Visual Studio—Adds the ability to scan and locate security
vulnerabilities in your solutions and packages and displays the scan results in Visual Studio. The
results include a list of issues uncovered, descriptions of the type of vulnerability each issue
represents, and suggestions on how to fix them. This package also includes remediation functionality
that works with Fortify Software Security Center.
l Micro Focus Fortify Analysis Plugin for IntelliJ and Android Studio—Adds the ability to run Fortify
Static Code Analyzer scans on the entire codebase of a project and apply software security rules that
identify the vulnerabilities in your code from the IntelliJ and Android Studio IDEs.
l Micro Focus Fortify Remediation Plugin for IntelliJ, WebStorm, and Android Studio—Works in the
IntelliJ, WebStorm, and Android Studio IDEs and with Fortify Software Security Center to add
remediation functionality to your security analysis.
l Micro Focus Fortify Security Assistant—Integrates with the Eclipse development environment to
detect security issues as you write code.
l Micro Focus Fortify Jenkins Plugin—Provides the ability to upload analysis results to Fortify
Software Security Center and view details about the results from Jenkins.
l Micro Focus Fortify Custom Rules Editor—Tool for creating and editing custom rules.
l Micro Focus Fortify Scan Wizard—Tool to quickly prepare a script that you can use to scan your code
with Fortify Static Code Analyzer and optionally, upload the results directly to Fortify Software
Security Center.
Related Documents
This topic describes documents that provide information about Micro Focus Fortify software products.
Note: You can find the Micro Focus Fortify Product Documentation at
https://www.microfocus.com/support-and-services/documentation.
All Products
The following documents provide general information for all products. Unless otherwise noted, these
documents are available on the Micro Focus Product Documentation website.
Micro Focus Fortify Software System This document provides the details about the
Requirements environments and products supported for this version of
Fortify Software.
Fortify_Sys_Reqs_<version>.pdf
Fortify_Sys_Reqs_Help_<version>
Micro Focus Fortify Software Release This document provides an overview of the changes made
Notes to Fortify Software for this release and important
information not included elsewhere in the product
FortifySW_RN_<version>.txt documentation.
What’s New in Micro Focus Fortify This document describes the new features in Fortify
Software <version> Software products.
Fortify_Whats_New_<version>.pdf
Fortify_Whats_New_Help_<version>
Micro Focus Fortify Open Source and This document provides open source and third-party
Third-Party License Agreements software license agreements for software components used
in Fortify Software.
Fortify_OpenSrc_<version>.pdf
Micro Focus Fortify Audit Workbench This document describes how to use Fortify Audit
User Guide Workbench to scan software projects and audit analysis
results. This guide also includes how to integrate with bug
AWB_Guide_<version>.pdf trackers, produce reports, and perform collaborative
AWB_Help_<version> auditing.
Micro Focus Fortify Plugins for Eclipse This document provides information about how to install
Installation and Usage Guide and use the Fortify Complete and the Fortify Remediation
Plugins for Eclipse.
Eclipse_Plugins_Guide_<version>.pdf
Eclipse_Plugins_Help_<version>
Micro Focus Fortify Plugins for IntelliJ, This document describes how to install and use both the
WebStorm, and Android Studio Fortify Analysis Plugin for IntelliJ IDEA and Android Studio
Installation and Usage Guide and the Fortify Remediation Plugin for IntelliJ IDEA,
Android Studio, and WebStorm.
IntelliJ_AndStud_Plugins_Guide_
<version>.pdf
IntelliJ_AndStud_Plugins_Help_
<version>
Micro Focus Fortify Jenkins Plugin This document provides how to install, configure, and use
Installation and Usage Guide the plugin.
Jenkins_Plugin_Guide_<version>.pdf
Jenkins_Plugin_Help_<version>
Note: On non-windows systems, you must install Fortify Static Code Analyzer and applications as a
user that has a home directory with write permissions. Do not install Fortify Static Code Analyzer
and applications as a non-root user that has no home directory.
After you complete the installation, see "Post-Installation Tasks" on page 19 for additional steps you
can perform to complete your system setup. You can also configure settings for runtime analysis,
output, and performance of Fortify Static Code Analyzer and its components by updating the installed
configuration files. For information about the configuration options for Fortify Static Code Analyzer,
see the Micro Focus Fortify Static Code Analyzer User Guide. For information about configuration
options for Fortify Static Code Analyzer component applications, see the Micro Focus Fortify Static
Code Analyzer Tools Properties Reference Guide.
l Linux: Fortify_SCA_and_Apps_<version>_linux_x64.run
l Solaris: Fortify_SCA_<version>_solaris_x86.run or
Fortify_SCA_<version>_solaris10_sparc.run
l HP-UX: Fortify_SCA_<version>_hpux_ia64.run
l AIX: Fortify_SCA_<version>_aix_x64.run
where <version> is the software release version.
2. Accept the license agreement, and then click Next.
3. Choose where to install Fortify Static Code Analyzer and applications, and then click Next.
Note: If you are using Micro Focus Fortify CloudScan, you must specify a location that does
not include spaces in the path.
5. If you are installing the Fortify extension for Visual Studio 2015 or 2017, you are prompted to
specify whether to install the extensions for the current install user or for all users.
The default is to install the extensions for the current install user.
6. Specify the path to the fortify.license file, and then click Next.
7. Specify the settings required to update your security content.
To update the security content for your installation:
Note: For installations on non-Windows platforms and for deployment environments that do
not have access to the Internet during installation, you can update the security content using
the fortifyupdate utility. See "Updating Fortify Security Content" on page 22.
a. Specify the URL address of the update server. To use the Fortify Rulepack update server for
security content updates, specify the URL as: https://update.fortify.com.
b. (Optional) Specify the proxy host and port number of the update server.
c. Click Next.
8. Specify if you want to migrate from a previous installation of Fortify Static Code Analyzer on your
system.
Migrating from a previous Fortify Static Code Analyzer installation preserves Fortify Static Code
Analyzer artifact files.
Note: You can also migrate Fortify Static Code Analyzer artifacts using the scapostinstall
command-line utility. For information on how to use the post-install tool to migrate from a
previous Fortify Static Code Analyzer installation, see "Migrating Properties Files" on page 19.
10. Click Next to proceed to install Fortify Static Code Analyzer and applications.
11. After Fortify Static Code Analyzer is installed, select Update security content after installation
if you want to update the security content, and then click Finish.
The Security Content Update Result window displays the security content update results.
fortify_license_path=<license_file_location>
UpdateServer=<update_server_url>
UpdateProxyServer=<proxy_server>
UpdateProxyPort=<port_number>
d. If you do not want to install the sample source code projects, add the following line:
InstallSamples=0
fortify_license_path=C:\Users\admin\Desktop\fortify.license
UpdateServer=https://internalserver.abc.com
UpdateProxyServer=webproxy.abc.company.com
UpdateProxyPort=8080
MigrateSCA=1
enable-components=AWB_group,VS2017
VS_all_users=1
installdir=C:\Fortify
2. Save the options file in the same directory as the installer using the same name as the installation
file with the .options file extension.
For example, if the installer file name is: Fortify_SCA_and_Apps_<version>_windows_
x64.exe, then save your options file with the name Fortify_SCA_and_Apps_<version>_
windows_x64.exe.options.
3. Run the silent install command for your operating system:
Windows Fortify_SCA_and_Apps_<version>_windows_x64.exe --mode
unattended
macOS You must uncompress the zip file before running the command.
Fortify_SCA_and_Apps_<version>_osx_x64.app/Contents/
MacOS/installbuilder.sh --mode unattended --optionfile
<full_path_to_option_file>
macOS You must uncompress the provided zip file before running the
command.
Fortify_SCA_and_Apps_<version>_osx_x64.app/Contents/
MacOS/installbuilder.sh --mode text
Note: If you do not have administrative privileges and you are upgrading the Fortify Extension for
Visual Studio for Visual Studio 2015 or 2017 that was previously installed using an administrative
privileged user account, you must first uninstall the Fortify Extension for Visual Studio from Visual
Studio 2015 or 2017 using an administrative privilege account.
Fortify Static Code Analyzer that you are uninstalling. The Fortify Static Code Analyzer
(sca<version>) folder is not removed.
l Click No to retain the application settings on your system.
Uninstalling on Other Platforms
To uninstall Fortify Static Code Analyzer software on macOS, Unix, and Linux platforms:
1. Back up your configuration, including any important files you have created.
2. Run the uninstall command located in the <sca_install_dir> for your operating system:
Unix or Linux Uninstall_FortifySCAandApps_<version>.exe
macOS Uninstall_FortifySCAandApps_<version>.app
3. You are prompted to indicate whether to remove all application settings. Do one of the following:
l Click Yes to remove the application setting folders for the tools associated with the version of
Fortify Static Code Analyzer that you are uninstalling. The Fortify Static Code Analyzer
(sca<version>) folder is not removed.
l Click No to retain the application settings on your system.
Note: The uninstaller removes the application setting folders associated with the version of Fortify
Static Code Analyzer that you are uninstalling.
Specifying a Locale
English is the default locale for a Fortify Static Code Analyzer installation.
To change the locale for your Fortify Static Code Analyzer installation:
1. Navigate to the bin directory from the command line.
2. At the command prompt, type scapostinstall.
3. Type 2 to select Settings.
4. Type 1 to select General.
5. Type 1 to select Locale.
6. Type one of the following locale codes:
l English: en
l Spanish: es
l Japanese: ja
l Korean: ko
l Brazilian Portuguese: pt_BR
l Simplified Chinese: zh_CN
l Traditional Chinese: zh_TW
(option 6)
l The Fortify Software Security Center user name (option 7)
5. Type the number that corresponds to the proxy setting you want to remove, and then type -
(hyphen) to remove the setting.
6. Repeat step 5 for each proxy setting you want to remove.
aspnet_regiis -i
Find this command in the .NET Framework installation directory. For example, it is often located in:
C:\Windows\Microsoft.NET\Framework64\v4.0.30319