0% found this document useful (0 votes)
154 views50 pages

Fortify Sys Reqs 20.1.0

This document provides system requirements for Micro Focus Fortify software version 20.1.0, including requirements for Fortify Static Code Analyzer, Fortify Software Security Center server, Fortify ScanCentral, Fortify WebInspect agent, Fortify WebInspect, and Fortify WebInspect Enterprise. Requirements include hardware specifications, supported platforms, languages, and integrations. The document was last revised on October 7, 2020 and covers a software release from May 2020.

Uploaded by

patrickken
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
154 views50 pages

Fortify Sys Reqs 20.1.0

This document provides system requirements for Micro Focus Fortify software version 20.1.0, including requirements for Fortify Static Code Analyzer, Fortify Software Security Center server, Fortify ScanCentral, Fortify WebInspect agent, Fortify WebInspect, and Fortify WebInspect Enterprise. Requirements include hardware specifications, supported platforms, languages, and integrations. The document was last revised on October 7, 2020 and covers a software release from May 2020.

Uploaded by

patrickken
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

Micro Focus

Fortify Software
Software Version: 20.1.0

System Requirements

Document Release Date: Revision 4: October 7, 2020


Software Release Date: May 2020
System Requirements

Legal Notices
Micro Focus
The Lawn
22-30 Old Bath Road
Newbury, Berkshire RG14 1QN
UK
https://www.microfocus.com

Warranty
The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in
the express warranty statements accompanying such products and services. Nothing herein should be construed as
constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained
herein. The information contained herein is subject to change without notice.

Restricted Rights Legend


Confidential computer software. Except as specifically indicated otherwise, a valid license from Micro Focus is required for
possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard
commercial license.

Copyright Notice
© Copyright 2001 - 2020 Micro Focus or one of its affiliates

Trademark Notices
All trademarks, service marks, product names, and logos included in this document are the property of their respective
owners.

Documentation Updates
The title page of this document contains the following identifying information:
l Software Version number
l Document Release Date, which changes each time the document is updated
l Software Release Date, which indicates the release date of this version of the software
This document was produced on October 07, 2020. To check for recent updates or to verify that you are using the most
recent edition of a document, go to:
https://www.microfocus.com/support-and-services/documentation

Micro Focus Fortify Software (20.1.0) Page 2 of 50


System Requirements

Contents
Preface 6
Contacting Micro Focus Fortify Customer Support 6
For More Information 6
About the Documentation Set 6
Change Log 7
Introduction 8
Software Delivery 8
Software Licenses 8
Fortify Static Code Analyzer Requirements 8
Hardware Requirements 9
Software Requirements 9
Platforms and Architectures 9
Supported Languages 10
Supported Build Tools 12
Supported Compilers 13
Secure Code Plugins 14
Single Sign-On (SSO) 15
Service Integrations for Fortify Static Code Analyzer Tools 15
Fortify Software Security Content 16
Fortify Software Security Center Server Requirements 16
Hardware Requirements 16
Database Hardware Requirements 16
Database Performance Metrics for Minimum and Recommended Hardware
Requirements 17
Platforms and Architectures 17
Application Servers 18
Fortify Software Security Center Database 18
Deploying Fortify Software Security Center to a Kubernetes Cluster (Optional Deployment
Strategy) 19
Kubernetes: Versions 1.14–1.17 19
Locally-Installed Tools Required 19
Additional Requirements 20
Browsers 20
Authentication Systems 21

Micro Focus Fortify Software (20.1.0) Page 3 of 50


System Requirements

Single Sign-On (SSO) 21


BIRT Reporting 21
Service Integrations for Fortify Software Security Center 22
Fortify ScanCentral Requirements 22
Application Servers 22
ScanCentral Controller Hardware Requirements 22
ScanCentral Controller Platforms and Architectures 23
ScanCentral Client and Sensor Hardware Requirements 23
Supported Languages and Build Tools for ScanCentral Sensor Project Translation 24
Supported Languages 24
Supported Build Tools 25
Fortify WebInspect Agent Requirements 25
Platforms and Architectures 25
Java Runtime Environments 25
Java Application Servers 26
.NET Frameworks 26
IIS for Windows Server 26
Fortify WebInspect Requirements 26
Running as Administrator 26
Hardware Requirements 27
Software Requirements 27
Support for Postman 28
Notes on SQL Server Editions 28
WebInspect on Docker 29
Ports and Protocols 29
Required Connections 29
Optional Connections 30
Connections for Tools 32
Fortify WebInspect Agent 32
WebInspect Software Development Kit (SDK) 32
Software Integrations for Fortify WebInspect 33
Fortify WebInspect Enterprise Requirements 33
Installation and Upgrade Requirements 33
Integrations for Fortify WebInspect Enterprise 34
Fortify WebInspect Enterprise Database 34
Hardware Requirements 34
Software Requirements 35
Administrative Console Requirements 35

Micro Focus Fortify Software (20.1.0) Page 4 of 50


System Requirements

Hardware Requirements 36
Software Requirements 36
Ports and Protocols 36
Required Connections 37
Optional Connections 38
Connections for Tools 39
Fortify WebInspect Enterprise Sensor 40
Fortify WebInspect Enterprise Notes and Limitations 40
Fortify License and Infrastructure Manager Requirements 40
Hardware Requirements 40
Software Requirements 41
Version Compatibility Matrix 42
Fortify Software Component Compatibility 42
FPR File Compatibility 42
Virtual Machine Support 43
Technologies and Features no Longer Supported in this Release 43
Technologies and Features to Lose Support in the Next Release 44
Acquiring Fortify Software 45
About Verifying Software Downloads 48
Preparing Your System for Digital Signature Verification 48
Verifying Software Downloads 49
Assistive Technologies (Section 508) 49

Send Documentation Feedback 50

Micro Focus Fortify Software (20.1.0) Page 5 of 50


System Requirements

Preface
Contacting Micro Focus Fortify Customer Support
You can contact Micro Focus Fortify Customer Support, manage your Support cases, acquire licenses,
and manage your account on the following website:
https://softwaresupport.softwaregrp.com

For More Information


For more information about Fortify software products:
https://software.microfocus.com/solutions/application-security

About the Documentation Set


The Fortify Software documentation set contains installation, user, and deployment guides for all
Fortify Software products and components. In addition, you will find technical notes and release notes
that describe new features, known issues, and last-minute updates. You can access the latest versions of
these documents from the following Micro Focus Product Documentation website:
https://www.microfocus.com/support-and-services/documentation

Micro Focus Fortify Software (20.1.0) Page 6 of 50


System Requirements

Change Log
The following table lists revisions made to this document.

Document Revision Changes

Revision 4: Added:
October 7, 2020
l "Software Requirements" on page 27 - Inadvertently omitted from
document.

Revision 3: Updated:
August 19, 2020
l "Supported Build Tools" on page 12 - New supported version for
xcodebuild available with Micro Focus Fortify Static Code Analyzer
version 20.1.1

Revision 2: Updated:
June 19, 2020
l "Supported Build Tools" on page 12 and "Supported Compilers" on
page 13 - New supported versions for xcodebuild, and swiftc that are
available with Micro Focus Fortify Static Code Analyzer version 20.1.1

Revision 1: Updated:
June 1, 2020
l "Supported Build Tools" on page 12 and "Supported Compilers" on
page 13 - New supported versions for xcodebuild, swiftc, and Clang that
are available with Micro Focus Fortify Static Code Analyzer version
20.1.1
l "Software Requirements" on page 35 - Updated the supported IIS
versions and recommended browsers for WebInspect Enterprise server

Micro Focus Fortify Software (20.1.0) Page 7 of 50


Introduction
This document provides the details about the environments and products that Micro Focus supports
for this version of Micro Focus Fortify Software, which includes:
l Micro Focus Fortify Static Code Analyzer and Fortify Static Code Analyzer Tools (Micro Focus
Fortify Audit Workbench and Secure Code Plugins)
l Micro Focus Fortify Software Security Center Server
l Micro Focus Fortify ScanCentral
l Micro Focus Fortify WebInspect Agent
l Micro Focus Fortify WebInspect
l Micro Focus Fortify WebInspect Enterprise
l Micro Focus Fortify License and Infrastructure Manager

Software Delivery
Micro Focus Fortify Software is delivered only electronically. It is not available on disc. See "Acquiring
Fortify Software" on page 45 for more information.

Software Licenses
Micro Focus Fortify Software products require a license.
For Micro Focus Fortify Software Security Center, Micro Focus Fortify Static Code Analyzer, Micro
Focus Fortify Audit Workbench, Micro Focus Fortify Secure Code Plugins, Micro Focus Fortify
ScanCentral, and Micro Focus Fortify WebInspect Agent, you must download the Fortify licenses for
your purchases from either the Fortify Customer Portal (https://support.fortify.com) or Micro Focus
Fortify Customer Support (https://softwaresupport.softwaregrp.com). To access either location, use
the credentials that Micro Focus Fortify Customer Support has provided.
To download the Fortify license from the Fortify Customer Portal:
1. Log onto the Fortify Customer Portal.
2. Click Download Licenses, and then click the link for the license you want to use.
For Micro Focus Fortify WebInspect and Micro Focus Fortify WebInspect Enterprise, you will receive an
email with instructions for how to activate your product.

Fortify Static Code Analyzer Requirements


This section describes the system requirements for Micro Focus Fortify Static Code Analyzer, and the
Fortify Static Code Analyzer Tools (including the Secure Code Plugins).

Micro Focus Fortify Software (20.1.0) Page 8 of 50


System Requirements

Hardware Requirements
Fortify recommends that you install Micro Focus Fortify Static Code Analyzer on a high-end processor
with at least 16 GB of RAM. If you plan to scan dynamic languages such as JavaScript, TypeScript,
Python, PHP, or Ruby, Fortify recommends that you have 32 GB of RAM. If your software is complex,
you might require more RAM. See the content about improving performance in the Micro Focus Fortify
Static Code Analyzer User Guide for more information.
Increasing the number of processor cores and increasing memory both result in faster processing.

Software Requirements
Micro Focus Fortify Static Code Analyzer requires Java 8. The Fortify SCA and Applications installer
installs OpenJDK/JRE 1.8.0_181.
Translating .NET and Visual Studio C/C++ projects requires the Windows operating system and the
.NET Framework version 4.7.2 or later.

Platforms and Architectures


Micro Focus Fortify Static Code Analyzer supports the platforms and architectures listed in the
following table.

Operating System Platforms

Windows Windows 8.1, 10


Windows Server 2012 R2
Windows Server 2016
Windows Server 2019

Linux Red Hat Enterprise Linux 6 update 5 and later


Red Hat Enterprise Linux 7.x
SUSE Linux Enterprise Server 12

macOS 10.14, 10.15

Micro Focus Fortify Software (20.1.0) Page 9 of 50


System Requirements

Fortify Static Code Analyzer Tools (including Secure Code Plugins) support the platforms and
architectures listed in the following table.

Operating System Platforms

Windows 8.1, 10

Linux Red Hat Enterprise Linux 6 update 5 and later


Red Hat Enterprise Linux 7.x
SUSE Linux Enterprise Server 12

macOS 10.14, 10.15

Supported Languages
Micro Focus Fortify Static Code Analyzer supports the programming languages listed in the following
table.

Language Versions

.NET Framework 2.0–4.8

.NET Core 2.0–3.1

ABAP/BSP 6

Note: Fortify ABAP Extractor is supported on a system running SAP


release 7.02, SP level 0006.

ActionScript 3.0

Angular 2,4,5,6,7

Apex 36

ASP.NET 2.0–4.8

C# 5, 6, 7, 8

C/C++ See "Supported Compilers" on page 13

Classic ASP 2.0, 3.0


(with VBScript)

Micro Focus Fortify Software (20.1.0) Page 10 of 50


System Requirements

Language Versions

COBOL IBM Enterprise COBOL for z/OS 3.4.1 with CICS, IMS, DB2, and IBM MQ

ColdFusion 8, 9, 10

Go 1.12, 1.13

Note: Scanning Go code is supported on Windows and Linux.

HTML 5 and earlier

Java 5, 6, 7, 8, 9, 10, 11, 12, 13


(including Android)

JavaScript ECMAScript 2015, 2016, 2017, 2018

JSP 1.2, 2.1

Kotlin 1.3.50 (Technical Preview)

MXML (Flex) 4

Objective-C/C++ See "Supported Compilers" on page 13

PHP 5.3, 5.4, 5.5, 5.6, 7.0, 7.1

PL/SQL 8.1.6

Python 2.6, 2.7, 3.x (3.7 and earlier)

Ruby 1.9.3

Scala 2.11, 2.12, 2.13

Swift 5
See "Supported Compilers" on page 13 for supported swiftc versions.

T-SQL SQL Server 2005, 2008, 2012

TypeScript 2.8, 3.0, 3.1, 3.2

VB.NET 11, 14, 15.x, 16.0

VBScript 2.0, 5.0

Visual Basic 6.0

Micro Focus Fortify Software (20.1.0) Page 11 of 50


System Requirements

Language Versions

XML 1.0

Supported Build Tools


Micro Focus Fortify Static Code Analyzer supports the build tools listed in the following table.

Build Tool Versions Notes

Ant 1.10.7 and earlier

Bamboo (see the Atlassian The Fortify App for Bamboo is available from the
Marketplace for Atlassian Marketplace.
supported versions)

Gradle 2.13, 4.x (4.10.3 and The Fortify Static Code Analyzer Gradle build integration
earlier) supports the following language/platform combinations:
l Java/Windows, Linux, and macOS
l Kotlin/Windows and Linux
l C/Linux
l C++/Linux

Jenkins (see the Jenkins Plugin The Fortify Jenkins plugin is available from the Jenkins
Index for supported Plugins Index at https://plugins.jenkins.io/fortify.
versions)

Maven 3.0.5, 3.5.x, 3.6.x

MSBuild 4.x, 12.0, 14.0, 15.x, 16.4

Xcodebuild 11, 11.1, 11.2.1, 11.3, Note: Xcodebuild version 11.4.1, 11.5, and 11.6
11.3.1, 11.4.1, 11.5, 11.6 support is available with Fortify Static Code Analyzer
version 20.1.1.

Micro Focus Fortify Software (20.1.0) Page 12 of 50


System Requirements

Supported Compilers
Micro Focus Fortify Static Code Analyzer supports the compilers listed in the following table.

Compiler Versions Platform

gcc GNU gcc 4.9, 5.x Windows,


Linux, macOS

g++ GNU g++ 4.9, 5.x Windows,


Linux, macOS

OpenJDK 9, 10, 11, 12, 13 Windows,


javac Linux, macOS

Oracle javac 7, 8, 9 Windows,


Linux, macOS

cl 2015, 2017, 2019 Windows

Intel C++ icc 8.0 Linux


Compiler

Clang 11.0.0, 11.0.3 macOS

Note: Clang version 11.0.3 support is available with Fortify


Static Code Analyzer version 20.1.1.

Swiftc 5.1, 5.1.2, 5.1.3, 5.2.2, 5.2.4 macOS

Note: Swiftc version 5.2.2 and 5.2.4 support is available with


Fortify Static Code Analyzer version 20.1.1.

Micro Focus Fortify Software (20.1.0) Page 13 of 50


System Requirements

Secure Code Plugins


The following table lists the supported integrated development environments (IDE) for the Micro Focus
Fortify Secure Code Plugins.

Plugin /
Extension IDE and Version Notes

Fortify Eclipse Eclipse 2018-12 (4.10), 2019-x


Plugins
(Complete and
Remediation)

Fortify Analysis Android Studio 3.3, 3.4, 3.5


Plugin
IntelliJ IDEA 2019.x

Fortify Android Studio 3.3, 3.4, 3.5


Remediation
IntelliJ IDEA 2019.x
Plugin
PyCharm 2019.x
WebStorm 2019.x

Security (see the Visual Studio Marketplace for Security Assistant Extension for Visual
Assistant supported versions) Studio is available from the Visual Studio
Extension for Marketplace.
Visual Studio

Security Eclipse 2018.x, 2019.x


Assistant Plugin
for Eclipse

Fortify Visual Visual Studio 2015 Community,


Studio Professional, and Enterprise
Extension
Visual Studio 2017 Community,
Professional, and Enterprise
Visual Studio 2019 Community,
Professional, and Enterprise

Note: The Fortify Visual Studio


Extension is not compatible with
Visual Studio Express.

Micro Focus Fortify Software (20.1.0) Page 14 of 50


System Requirements

Single Sign-On (SSO)


The Eclipse Complete plugin and the Visual Studio extension support the following SSO methods to
connect with Fortify Software Security Center:
l SPNEGO/Kerberos SSO
l X.509 SSO

Service Integrations for Fortify Static Code Analyzer Tools


The following table lists the supported service integrations for Micro Focus Fortify Audit Workbench
and the Fortify Secure Code Plugins.

Service Versions Supported Tools

Bugzilla 5.0.x Audit Workbench, Eclipse Plugin, Visual


Studio Extension

Micro Focus Application Lifecycle 12.50 Audit Workbench, Eclipse Plugin


Management (ALM)/
Quality Center Enterprise (QC)

Team Foundation Server (TFS) 2015 Audit Workbench, Eclipse Plugin

2017 Audit Workbench, Eclipse Plugin,


Visual Studio Extension

Azure DevOps Server 2019 Audit Workbench, Eclipse Plugin, Visual


Studio Extension

Azure DevOps (formerly VSTS) n/a Audit Workbench, Eclipse Plugin

Note: Only basic user password


authentication is supported.

Jira 7.11 and Audit Workbench, Eclipse Plugin


later, 8.x

Fortify Software Security Center Bug 20.1.0 Audit Workbench, Eclipse Plugin,
Tracker Visual Studio Extension

Micro Focus Fortify Software (20.1.0) Page 15 of 50


System Requirements

Fortify Software Security Content


Micro Focus Fortify Secure Coding Rulepacks are backward compatible with all supported Fortify
Software versions. This ensures that Rulepacks updates do not break any working Fortify Software
installation.

Fortify Software Security Center Server


Requirements
This section describes the system requirements for the Micro Focus Fortify Software Security
Center server.

Hardware Requirements
Micro Focus Fortify Software Security Center requires the hardware specifications listed in the following
table.

Component Minimum Recommended

Application server Java heap size 4 GB 24 GB

Database server Processor Quad-core Eight-core

RAM 8 GB 64 GB

Database Hardware Requirements


Fortify recommends an eight-core processor with 64 GB of RAM for the Fortify Software Security
Center database. Using less than this recommendation can impact Fortify Software Security Center
performance.
Use the following formula to estimate the size (in GB) of the Fortify Software Security Center database
disk space:
((<Total_Issues>*30 KB) + <Total_Artifacts>) ÷ 1,000,000
where:
l <Total_Issues> is the total number of issues in the system
l <Total_Artifacts> is the total size in KB of all uploaded artifacts and scan results
Note: This equation produces only a rough estimate for database disk space allocation. Do not use
this formula to estimate disk space requirements for long-term projects. Disk requirements for
Fortify Software Security Center databases increases in proportion to the number of projects,

Micro Focus Fortify Software (20.1.0) Page 16 of 50


System Requirements

scans, and issues in the system.

Database Performance Metrics for Minimum and Recommended Hardware


Requirements
The following table shows performance metrics (number of issues discovered per hour) for Fortify
Software Security Center configured with the minimum and the recommended hardware requirements.

Issues per Hour Issues per Hour


Database Minimum Configuration Recommended Configuration

MySQL 362,514 2,589,385

Oracle 231,392 3,020,950

SQL Server 725,028 3,625,140

Platforms and Architectures


Micro Focus Fortify Software Security Center supports the platforms and architectures listed in the
following table.

Operating System Versions

Windows Server 2012 R2


Server 2016
Server 2019

Linux Red Hat Enterprise Linux 6 update 5 and later


Red Hat Enterprise Linux 7.x
SUSE Linux Enterprise Server 12

Note: Although Fortify Software Security Center has not been tested on all Linux variants, most
distributions are not known to have issues.

Micro Focus Fortify Software (20.1.0) Page 17 of 50


System Requirements

Application Servers
Micro Focus Fortify Software Security Center supports Apache Tomcat version 9.x for the following
JDK versions:
l Red Hat OpenJDK 8
l SUSE OpenJDK 8

l Oracle JDK 8

l Zulu OpenJDK 8 from Azul (installation of fontconfig, DejaVu Sans font and DejaVu Serif font is

required on the server)


Fortify only supports the deployment of a single Fortify Software Security Center instance.
Furthermore, that instance must not be behind a load balancer.

Fortify Software Security Center Database


Micro Focus Fortify Software Security Center requires that all database schema collations are
case-sensitive.
Fortify Software Security Center supports the databases listed in the following table.

Collation /
Database Versions Character Set Driver

MySQL 5.7 utf8_bin, latin1_ 5.1.47 or later


(Community general_cs
Driver class:
Edition)
com.mysql.jdbc.driver
8.0 JAR file:
(Community
mysql-connector-java-
Edition) <version>-bin.jar

Oracle 12c AL32UTF8 for all Oracle Database 12c Release 2 (12.2.x) JDBC Driver
Release 2 languages
Driver class:
19c WE8MSWIN1252 oracle.jdbc.OracleDriver
for US English JAR file:
ojdbc8.jar (for Java 8)

Micro Focus Fortify Software (20.1.0) Page 18 of 50


System Requirements

Collation /
Database Versions Character Set Driver

SQL Server 2016 Make sure to use The driver is included in the Fortify Software
the case-sensitive Security Center WAR file.
2017
(CS) option when
Microsoft JDBC Driver 8.2 for SQL Server
2019 choosing your
collation method. Driver class:
For example: com.microsoft.sqlserver.
jdbc.SQLServerDriver
SQL_
Latin1_
General_
CP1_CS_AS

Note: Fortify does not support the direct conversion from one database server type to another,
such as converting from MySQL to Oracle. To do this, you must use the Server API to move data
from your current Fortify Software Security Center instance to a new Fortify Software Security
Center instance that uses the database server type you want to use going forward. Micro Focus
Professional Services can assist you with this process.

Deploying Fortify Software Security Center to a Kubernetes


Cluster (Optional Deployment Strategy)
If you plan to deploy Micro Focus Fortify Software Security Center on a Kubernetes cluster, you must
make sure that the following requirements are met.

Kubernetes: Versions 1.14–1.17


l Persistent volume support
l (Recommended) A load balancer service
l At least 7 GB of RAM and 1 CPU on a single node (with default configuration)
l Maximum usage: 28 GB of RAM and 8 CPUs on a single node (with default configuration)
l 4 GiB of storage for persistent volume (with default configuration)

Locally-Installed Tools Required


l A kubectl command-line tool - Fortify recommends using the same version as the Kubernetes cluster
version (1.14–1.17)
l Helm command-line tool, version 3.0 or 3.1
l Air-gapped installation only - (Recommended) A Docker client and server installation (any version)

Micro Focus Fortify Software (20.1.0) Page 19 of 50


System Requirements

Additional Requirements
l Kubeconfig file for the Kubernetes cluster
l Docker Hub account with access to Fortify Software Security Center images
Note: If you need access to Fortify Docker Organization on Docker Hub, contact
[email protected] with your first name, your last name, and your Docker account
name. Micro Focus Fortify will then give you access to the Fortify Docker organization that
contains the Fortify Software Security Center images.

l DNS name for the Fortify Software Security Center web application (address used to access the
service)
l Java keystore for setting up HTTPS (For details, see the Micro Focus Fortify Software Security
Center User Guide) The keystore must contain a CA certificate and a server certificate for the Fortify
Software Security Center DNS name with an associated private key.
l Keystore password

l Private key password


l An installed Oracle, SQL Server, or MySQL for database server
l Database server host name

l Name of the Fortify Software Security Center database


l Username and password for an account that has permission to manage the Fortify Software
Security Center schema and data
l (Oracle or MySQL database only) An HTTP server that is accessible from the Kubernetes cluster
for distributing the JDBC driver. For supported driver versions, see "Fortify Software Security
Center Database" on page 18.
l Fortify Software Security Center license

Browsers
Fortify recommends that you use one of the browsers listed in the following table and a screen
resolution of 1400 x 800.

Browser Version

Google Chrome 65.0 or later

Microsoft Edge 38 or later

Mozilla Firefox 59.0 or later

Safari 11

Micro Focus Fortify Software (20.1.0) Page 20 of 50


System Requirements

Authentication Systems
Micro Focus Fortify Software Security Center supports the following directory services:
l LDAP: LDAP 3 compatible
Important! Although Fortify supports the use of multiple LDAP servers, it does not support the
use of multiple LDAP servers behind a load balancer.

l Windows Active Directory Service

Single Sign-On (SSO)


Fortify Software Security Center supports:
l Central Authorization Server (CAS) SSO
l HTTP Headers SSO (Oracle SSO, CA SSO)
l SAML 2.0 SSO
l SPNEGO/Kerberos SSO
l X.509 SSO

BIRT Reporting
Micro Focus Fortify Software Security Center custom reports support Business Intelligence and
Reporting Technology (BIRT) Designer version 4.4.2.

Micro Focus Fortify Software (20.1.0) Page 21 of 50


System Requirements

Service Integrations for Fortify Software Security Center


Micro Focus Fortify Software Security Center supports the service integrations listed in the following
table.

Service Applications Versions

Bug tracking Bugzilla 5.0.x

Micro Focus Application Lifecycle Management (ALM)/ 12.50


Quality Center Enterprise (QC)

Jira 7.1x through


8.x

Team Foundation Server (TFS) 2015, 2017

Azure DevOps Server 2019

Azure DevOps (formerly VSTS) n/a

Note: Only basic user password authentication is


supported.

Authentication Active Directory 2008, 2012

Dynamic assessments Micro Focus Fortify WebInspect Enterprise 20.1.0

Fortify ScanCentral Requirements


Micro Focus Fortify ScanCentral has three major components: a ScanCentral Controller, ScanCentral
clients, and ScanCentral sensors.

Application Servers
Micro Focus Fortify ScanCentral supports Apache Tomcat version 9.0.x for Java 8.

ScanCentral Controller Hardware Requirements


Fortify recommends that you install the ScanCentral Controller on a high-end 64-bit processor running
at 2 GHz with at least 8 GB of RAM.

Micro Focus Fortify Software (20.1.0) Page 22 of 50


System Requirements

ScanCentral Controller Disk Space Requirements


To estimate the amount of disk space required on the machine that runs the ScanCentral Controller, use
one of the following equations equation:

Intended
Use Equation

Remote scan <Number_Jobs_Per_Day> x (<Avg_MBS_Size> + <Avg_FPR_Size> + <Avg_SCA_


only Log_Size>) x <Number_Days_Data_is_Persisted>

Remote <Number_Jobs_Per_Day> x (<Avg_Archived_Project_With_Dependencies_Size> +


translation <Avg_FPR_Size> + <Avg_SCA_Log_ Size>) x <Number_Days_Data_is_Persisted>
and scan

By default, data is persisted for seven days.

ScanCentral Controller Platforms and Architectures


The ScanCentral Controller supports the platforms and architectures listed in the following table.

Operating System Versions

Windows Server 2012 R2


Server 2016
Server 2019

Linux Red Hat Enterprise Linux 6 update 5 and later


Red Hat Enterprise Linux 7.x
SUSE Linux Enterprise Server 12

ScanCentral Client and Sensor Hardware Requirements


ScanCentral clients and sensors run on any machine that supports Micro Focus Fortify Static Code
Analyzer. Because ScanCentral clients and sensors are installed on build machines running Micro Focus
Fortify Static Code Analyzer, the hardware requirements are met.
See "Fortify Static Code Analyzer Requirements" on page 8 for hardware, software, and platform and
architecture requirements.

Micro Focus Fortify Software (20.1.0) Page 23 of 50


System Requirements

ScanCentral Sensor Disk Space Requirements


To estimate the amount of disk space required on the machine that runs a ScanCentral sensor, use one
of the following equations:

Intended
Use Equation

Remote <Number_of_Scans> x (<Average_MBS_Size> + <Average_FPR_Size> + <Average_


scan only SCA_Log_Size>) x <Number_Days_Data_is_Persisted>

Remote <Number_Jobs_Per_Day> x (<Avg_Archived_Project_With_Dependencies_Size> +


translation <Avg_Project_With_Dependencies_Size> + <Avg_FPR_Size> + <Avg_SCA_Log_ Size>)
and scan x <Number_Days_Data_is_Persisted>

By default, data is persisted for seven days.

Supported Languages and Build Tools for ScanCentral Sensor


Project Translation
Micro Focus Fortify ScanCentral supports offloading project translation to ScanCentral sensors for the
following languages and build tools.

Supported Languages
Fortify ScanCentral supports offloading project translation to ScanCentral sensors for the following
languages. See "Supported Languages" on page 10 for specific supported versions.
l .NET applications in C# and VB.NET (.NET Core, .NET Standard, ASP.NET)
Note: Translation of .NET applications require .NET Framework version 4.7.2 or later.

l ABAP
l Apex
l Classic ASP
l ColdFusion
l Java
l JavaScript
l PHP
l PL/SQL
l Python
l Ruby
l T-SQL

Micro Focus Fortify Software (20.1.0) Page 24 of 50


System Requirements

l TypeScript
l Visual Basic

Supported Build Tools


Fortify ScanCentral supports the build tools listed in the following table.

Build Tool Version

Gradle 6.x

Maven 3.x

MSBuild 16.4

Fortify WebInspect Agent Requirements


Micro Focus Fortify WebInspect Agent technology is delivered for production application logging and
protection .

Platforms and Architectures


Fortify WebInspect Agent supports 32-bit and 64-bit applications written in Java 5, 6, 7, 8, and 10.

Java Runtime Environments


Fortify WebInspect Agent supports the Java runtime environments listed in the following table.

JRE Major Versions

IBM J9 5 (SR10 and later)


6 (SR6 and later)

Oracle HotSpot 5, 6, 7, 8

Oracle JRockit 5, 6 (R27.6 and later)

Note: The Java agent is supported on Windows, Linux, and Unix.

Micro Focus Fortify Software (20.1.0) Page 25 of 50


System Requirements

Java Application Servers


Fortify WebInspect Agent supports the Java application servers listed in the following table.

Application Server Versions

Apache Tomcat 6.0, 7.0, 8.0, 9.0

IBM WebSphere 7.0, 8.0, 8.5, 8.5.5

Oracle WebLogic 10.0, 10.3, 11g, 11gR1, 12c

Red Hat JBoss Enterprise Application Platform 5.1.2, 5.2.0, 6.0.1, 6.1.1, 6.2.0, 6.3.0, 6.4.0

Jetty 9.3

WildFly 10.1

.NET Frameworks
Fortify WebInspect Agent supports .NET Framework versions 2.0, 3.0, 3.5, 4.0, 4.5, 4.5.1, and 4.7.

IIS for Windows Server


Fortify WebInspect Agent supports Internet Information Services (IIS) versions 6.0, 7.0, 7.5, 8, 8.5, and
10.0.

Fortify WebInspect Requirements


Before you install Micro Focus Fortify WebInspect, make sure that your system meets the requirements
described in this section.

Running as Administrator
Micro Focus Fortify WebInspect requires administrative privileges for proper operation of all features.
Refer to the Windows operating system documentation for instructions on changing the privilege level
to run Fortify WebInspect as an administrator.

Micro Focus Fortify Software (20.1.0) Page 26 of 50


System Requirements

Hardware Requirements
Fortify recommends that you install Micro Focus Fortify WebInspect on a system that conforms to the
supported components listed in the following table. Fortify does not support beta or pre-release
versions of operating systems, service packs, and required third-party components.

Component Requirement Notes

Processor 2.5 GHz quad-core Complex applications might benefit from additional cores.
or faster

RAM 16 GB Complex applications might benefit from additional memory.

Hard disk 40 GB Using SQL Express and storing scans locally requires
additional disk space per scan.

Display 1280 x 1024

Software Requirements
Micro Focus Fortify WebInspect runs on and works with the software packages listed in the following
table.

Package Versions Notes

Windows Windows 10 Recommended

Windows 8.1

Windows Server 2016

Windows Server 2019

.NET Platform .NET Framework 4.8

SQL Server SQL Server 2014 SP3 Recommended


No scan database limit

SQL Server 2012 SP4 No scan database limit

SQL Server 2016 SP2 No scan database limit

SQL Server 2017 No scan database limit

Micro Focus Fortify Software (20.1.0) Page 27 of 50


System Requirements

Package Versions Notes

SQL Server 2019 No scan database limit

SQL Server Express SQL Server 2017 Express Recommended


10 GB scan database limit

SQL Server 2012 Express SP4 10 GB scan database limit

SQL Server 2014 Express SP3 10 GB scan database limit

SQL Server 2016 Express SP2 10 GB scan database limit

SQL Server 2019 Express 10 GB scan database limit

Browser Internet Explorer 11 Recommended

Internet Explorer 10

Portable Document Format Adobe Acrobat Reader 11 Recommended

Adobe Acrobat Reader 8.1.2 Minimum

Support for Postman


Postman collection version 2.1 is required for conducting scans in Fortify WebInspect. You do not need
to install Postman on the machine where the Fortify WebInspect REST API is installed.
However, you must install the following third-party software on the machine where the Fortify
WebInspect REST API is installed:
l Node.js 10.16.3 LTS and the included Node Package Manager (NPM)
l Newman command-line collection runner 4.5.1

Notes on SQL Server Editions


When using the Express edition of SQL Server:
l Scan data must not exceed the database size limit. If you require a larger database or you need to
share your scan data, use the full version of SQL Server.
l During the installation you might want to enable “Hide advanced installation options.” Accept all

default settings. Micro Focus Fortify WebInspect requires that the default instance is named
SQLEXPRESS.
When using the full edition of SQL Server:
l You can install the full version of SQL Server on the local host or nearby (co-located). You can
configure this option in Fortify WebInspect Application Settings (Edit > Application Settings >
Database).

Micro Focus Fortify Software (20.1.0) Page 28 of 50


System Requirements

l The account specified for the database connection must also be a database owner (DBO) for the
named database. However, the account does not require sysadmin (SA) privileges for the database
server. If the database administrator (DBA) did not generate the database for the specified user,
then the account must also have the permission to create a database and to manipulate the security
permissions. The DBA can rescind these permissions after Fortify WebInspect sets up the database,
but the account must remain a DBO for that database.

WebInspect on Docker
Fortify WebInspect on Docker has the requirements listed in the following table.

Package Version Notes

Docker Enterprise 18.09 or later

Windows Windows Server 2016 Recommended

Windows 10

Ports and Protocols


This section describes the ports and protocols Micro Focus Fortify WebInspect uses to make required
and optional connections.

Required Connections
The following table lists the ports and protocols Micro Focus Fortify WebInspect uses to make required
connections.

Direction Endpoint URL or Details Port Protocol Notes

Fortify Target host Scan target host Any HTTP Fortify WebInspect must connect to the
WebInspect web application or web service to be
to target scanned.
host

Fortify SQL Server Express SQLEXPRESS service 1433 SQL TCP Used to maintain the scan data and to
WebInspect or SQL Server on localhost or SQL generate reports within the Fortify
to SQL Standard/Enterprise TCP service locally WebInspect application.
database installed or remote
host

Micro Focus Fortify Software (20.1.0) Page 29 of 50


System Requirements

Direction Endpoint URL or Details Port Protocol Notes

Fortify Verisign CRL http://crl.verisign.com/ 80 HTTP Offline installations of Fortify


WebInspect pca3.crl WebInspect or Fortify WebInspect
to Enterprise require you to manually
or
Certificate download and apply the CRL from
Revocation http://csc3-2004- Verisign. Fortify WebInspect products
List (CRL) crl.verisign.com/ prompt for these lists from Windows
CSC3-2004.crl and their absence can cause problems
with the application. A one-time
download is sufficient, however Fortify
recommends that you download the
CRL as part of regular maintenance.

Optional Connections
The following table lists the ports and protocols Micro Focus Fortify WebInspect uses to make optional
connections.

Direction Endpoint URL or Details Port Protocol Notes

Fortify Remote https://licenseservice. 443 HTTPS For one-time activation of a Fortify


WebInspect Fortify fortify.microfocus.com over SSL WebInspect Named User license.
to Fortify Licensing You may optionally use the
License Service following:
activation
l An offline activation process
server
instead of using this direct
connection
l Upstream proxy with
authentication instead of a
direct connection

Fortify Remote https://smartupdate. 443 HTTPS Used to automatically update the


WebInspect SmartUpdate fortify.microfocus.com over SSL Fortify WebInspect product.
to service SmartUpdate is automatic when
SmartUpdate opening the product UI, but can be
server disabled and run manually. Can
optionally use upstream proxy
with authentication instead of a
direct connection.

Fortify Remote https://supportchannel. 443 HTTPS Used to retrieve product


WebInspect Fortify fortify.microfocus.com over SSL marketing messages and to
to Fortify Support upload Fortify WebInspect data or
Support Channel product suggestions to Micro Focus
Channel service Fortify Customer Support. Message
server check is automatic when opening
the product UI, but can be
disabled and run manually. Can
optionally use upstream proxy

Micro Focus Fortify Software (20.1.0) Page 30 of 50


System Requirements

Direction Endpoint URL or Details Port Protocol Notes

with authentication instead of a


direct connection.

Fortify Remote https://telemetry.fortify.com 443 HTTPS The Telemetry service provides an


WebInspect Fortify over SSL automated process for collecting
to Fortify WebInspect Note: Accessing this and sending Fortify WebInspect
WebInspect Telemetry URL in a browser does usage information to Micro Focus.
Telemetry and not display any Our software developers use this
server performance content. information to help improve the
reporting product.
service

Fortify Fortify Lease Concurrent User 443 Web Required for Fortify WebInspect
WebInspect WebInspect license services client to lease and use a
to Fortify LIM over SSL Concurrent User license
License and maintained in a LIM license pool.
(Local
Infrastructure You can detach the client license
Licensing
Manager from LIM after activation to avoid
Service)
(LIM) a constant connection.

Fortify Local http://localhost:8083/ 8083 or HTTP Use to activate a Fortify


WebInspect machine API, webinspect/api user- WebInspect API Windows Service.
API listener or network IP specified This opens a listening port on
address your machine, which you can use
locally or remotely to generate
scans and retrieve the results
programmatically. This API can be
SSL enabled, and supports Basic or
Windows authentication.

Fortify Fortify User-specified Fortify 443 or HTTP or The Enterprise Server menu
WebInspect WebInspect WebInspect server user- HTTPS connects Fortify WebInspect as a
to Fortify Enterprise specified over SSL client to the enterprise security
WebInspect server solution to transfer findings and
Enterprise user role and permissions
management.

Fortify Fortify User-specified Fortify 443 or HTTP or Separate from the Fortify
WebInspect WebInspect WebInspect server user- HTTPS WebInspect UI, you can configure
sensor Enterprise specified over SSL the local installation as a remote
service to server scan engine for use by the
Fortify enterprise security solution
WebInspect community. This is done through a
Enterprise Windows Service. This constitutes
a different product from Fortify
WebInspect desktop and is
recommended to be run on its
own, non-user-focused machine.

Browser to localhost Manual Step-Mode Scan Dynamic, HTTP or Fortify WebInspect serves as a web
Fortify 8081, or HTTPS proxy to the browser, enabling

Micro Focus Fortify Software (20.1.0) Page 31 of 50


System Requirements

Direction Endpoint URL or Details Port Protocol Notes

WebInspect user- over SSL manual testing of the target web


specified server through Fortify WebInspect.

Fortify QC server User-specified ALM server Server- HTTP or Permits submission of findings as
WebInspect specified HTTPS defects to the ALM bug tracker.
to Quality over SSL
Center
Enterprise
(ALM)

Connections for Tools


The following table lists the ports and protocols that the Micro Focus Fortify WebInspect tools use to
make connections.

Tool Direction Endpoint Port Protocol Notes

Web Proxy To target host localhost 8080 or HTTP or Intercepts and displays web traffic
user- HTTPS
specified over SSL

Web Form To target host localhost Dynamic, HTTP or Intercepts web traffic and captures
Editor 8100, or HTTPS submitted forms
user- over SSL
specified

Login or To target host localhost Dynamic, HTTP or Records browser sessions for replay
Workflow 8081, or HTTPS during scan
Macro user- over SSL
Recorders specified

Web Fortify WebInspect Target User- HTTP Scanner for identifying rogue web
Discovery machine to host specified and applications hosted among the targeted
targeted IP range network range HTTPS scanned IP and port ranges
range over SSL
Use to provide targets to Fortify
WebInspect (manually)

Fortify WebInspect Agent


For system requirements, see "Fortify WebInspect Agent Requirements" on page 25.

WebInspect Software Development Kit (SDK)


The WebInspect SDK requires the following software:
l Visual Studio 2013 or 2015
l .NET Framework 4.6.1

Micro Focus Fortify Software (20.1.0) Page 32 of 50


System Requirements

Important! Visual Studio Express versions do not support third-party extensions. Therefore, these
versions do not meet the software requirements to use the WebInspect SDK.

Software Integrations for Fortify WebInspect


The following table lists products that you can integrate with Micro Focus Fortify WebInspect.

Product Versions

Micro Focus Fortify WebInspect Enterprise 20.1.0

Micro Focus Application Lifecycle Management (ALM) 11.5, 12.01, 12.21,


12.53
Note: You must also install the ALM Connectivity tool to connect Fortify
WebInspect to ALM.

Micro Focus Fortify Software Security Center 20.1.0

Micro Focus Unified Functional Testing 11.5

Fortify WebInspect Enterprise Requirements


Before you install Micro Focus Fortify WebInspect Enterprise, make sure that your systems meet the
requirements described in this section.

Note: Product versions that are not specifically listed in this document are not supported.

Installation and Upgrade Requirements


You can upgrade directly from Micro Focus Fortify WebInspect Enterprise 19.2.0 to Fortify WebInspect
Enterprise 20.1.0. You cannot upgrade directly from any other versions of Fortify WebInspect
Enterprise. For detailed information about upgrades, see the Micro Focus Fortify WebInspect
Enterprise Installation and Implementation Guide.
Integration with Micro Focus Fortify Software Security Center is optional. If you are integrating Fortify
WebInspect Enterprise with Fortify Software Security Center, then you must install and run Fortify
Software Security Center 20.1.0 before you install a new instance of Fortify WebInspect Enterprise or
upgrade from Fortify WebInspect Enterprise 19.2.0. You can install Fortify Software Security Center
and Fortify WebInspect Enterprise on the same or different machines. Using separate machines might
improve performance.

Micro Focus Fortify Software (20.1.0) Page 33 of 50


System Requirements

Integrations for Fortify WebInspect Enterprise


You can integrate Micro Focus Fortify WebInspect Enterprise with the following components:
l Micro Focus Fortify WebInspect sensors 20.1.0
l Micro Focus Fortify WebInspect Agent 20.1.0

Fortify WebInspect Enterprise Database


Fortify recommends that you configure the database server on a separate machine from either Micro
Focus Fortify Software Security Center or Micro Focus Fortify WebInspect Enterprise.
The Fortify WebInspect Enterprise Server SQL database requires case-insensitive collation.

Important! This is opposite the requirement for Fortify Software Security Center databases as
described in "Fortify Software Security Center Database" on page 18.

Hardware Requirements
The following table lists the hardware requirements for the Micro Focus Fortify WebInspect Enterprise
server.

Component Requirement Notes

Processor 3.0 GHz quad-core or faster Recommended

2.5 GHz dual-core Minimum

RAM 16 GB Recommended

8 GB Minimum

Hard disk 100+ GB Recommended

20+ GB if using a local database

5 GB if using a remote database

Display 1920 x 1080 Recommended

1280 x 1024 Minimum

Micro Focus Fortify Software (20.1.0) Page 34 of 50


System Requirements

Software Requirements
Micro Focus Fortify WebInspect Enterprise server runs on and works with the software packages listed
in the following table.

Package Versions Notes

Windows Windows Server 2016 Recommended

Windows Server 2019

.NET Platform .NET Framework 4.8

Web Server IIS 10 Recommended

IIS 7.5, 8.0, 8.5

SQL Server SQL Server 2014 SP3 Recommended


No scan database limit

SQL Server 2012 SP4 No scan database limit

SQL Server 2016 SP2 No scan database limit

SQL Server 2017 No scan database limit

SQL Server 2019 No scan database limit

Browser Mozilla Firefox 75 or later Recommended

Google Chrome 81 or later

Microsoft Edge 81 or later

Internet Explorer 11

Administrative Console Requirements


This section describes the hardware and software requirements for the Micro Focus Fortify WebInspect
Enterprise Administrative Console.
You do not need to install the Fortify WebInspect Enterprise Administrative Console on the same
machine as the Web Console of the Fortify WebInspect Enterprise server. The two consoles have
different system requirements. In addition, you can install multiple Administrative Consoles on different
machines connected to the same Fortify WebInspect Enterprise server.

Micro Focus Fortify Software (20.1.0) Page 35 of 50


System Requirements

Hardware Requirements
The following table lists the hardware requirements for Fortify WebInspect Enterprise Administrative
Console.

Component Requirement Notes

Processor 2.5 GHz dual-core Minimum

RAM 4 GB Minimum

Hard disk 2 GB

Display 1980 x 1080 Recommended

1280 x 1024 Minimum

Software Requirements
The Fortify WebInspect Enterprise Administrative Console runs on and works with the software
packages listed in the following table.

Package Versions Notes

Windows Windows 10 Recommended

Windows 8.1

Windows Server 2016

Windows Server 2019

.NET .NET Framework 4.8

Ports and Protocols


This section describes the ports and protocols Micro Focus Fortify WebInspect Enterprise uses to make
required and optional connections.

Micro Focus Fortify Software (20.1.0) Page 36 of 50


System Requirements

Required Connections
The following table lists the ports and protocols Micro Focus Fortify WebInspect Enterprise uses to
make required connections.

URL or
Direction Endpoint Details Port Protocol Notes

Fortify WebInspect SQL Server SQL TCP 1433 or SQL TCP Used to maintain the scan data
Enterprise Manager Standard/Enterprise service on user- and full Enterprise environment.
server to SQL locally specified Custom configurations of
database installed or SQL Server are permitted,
remote host including port changes and
encrypted communication.

Fortify WebInspect Fortify Software User- 8180 or HTTP or As a modular add-on, Fortify
Enterprise Manager Security Center specified user- HTTPS WebInspect Enterprise requires a
machine to Fortify server Fortify specified over SSL connection to its core Fortify
Software Security Software Software Security Center server.
Center server Security
Center Note: This connection is
server required only if you integrate
Fortify WebInspect Enterprise
with Fortify Software Security
Center.

Sensor machines to Fortify WebInspect User- 443 or HTTPS Communication is two-way HTTP
Fortify WebInspect Enterprise server specified user- over SSL traffic, initiated in-bound by the
Enterprise Manager Fortify specified Fortify WebInspect sensor
server WebInspect machine.
Enterprise
server

Browser users to Fortify WebInspect User- 443 or HTTPS You can configure Fortify
Fortify WebInspect Enterprise server specified user- over SSL WebInspect Enterprise not to use
Enterprise server UI Fortify specified SSL, but tests indicate that it might
WebInspect affect the product usability.
Enterprise
server

Browser user to Fortify Software User- 8180 or HTTP or You can configure the Fortify
Fortify Software Security Center specified user- HTTPS Software Security Center server on
Security Center UI server Fortify specified over SSL any available port during
Software installation.
Security
Center
server

Micro Focus Fortify Software (20.1.0) Page 37 of 50


System Requirements

Optional Connections
The following table lists the ports and protocols Micro Focus Fortify WebInspect Enterprise uses to
make optional connections.

Direction Endpoint URL or Details Port Protocol Notes

Fortify Fortify User-specified Fortify 443 or HTTPS Communication is two-way HTTP traffic,
WebInspect WebInspect WebInspect user- over SSL initiated in-bound by the Fortify
desktop Enterprise Enterprise server specified WebInspect desktop machine.
machines to server
Fortify
WebInspect
Enterprise
Manager
server

Fortify Fortify https://licenseservice. 443 HTTPS For one-time activation of the Fortify
WebInspect Licensing fortify.microfocus.com over SSL WebInspect Enterprise server license as
Enterprise Service well as periodic checks during an update.
Manager You may optionally use the following:
machine to
l An offline activation process instead of
Fortify
using this direct connection
License
activation l Upstream proxy with authentication
server instead of a direct Internet connection

Important! If you use the offline


activation process, then you must
also use the offline SmartUpdate
process. For more information, see
the Micro Focus Fortify WebInspect
Enterprise User Guide or the
WebInspect Enterprise
Administrative Console help.

Micro Focus Fortify Software (20.1.0) Page 38 of 50


System Requirements

Direction Endpoint URL or Details Port Protocol Notes

Fortify SmartUpdate https://smartupdate. 443 HTTPS Used to acquire product updates as well
WebInspect fortify.microfocus.com over SSL as all connected clients (Fortify
Enterprise WebInspect sensors and Fortify
Manager WebInspect desktop). The administrator
machine to manually runs SmartUpdate, however
SmartUpdate Fortify recommends that you set up an
server automated schedule. New client releases
are held in reserve until the Fortify
WebInspect Enterprise administrator
marks them as Approved, at which time
they are automatically distributed from
the Fortify WebInspect Enterprise
Manager server. Can support the use of
an upstream proxy with authentication
instead of a direct Internet connection.

Important! Access to the


SmartUpdate server also requires
access to the licensing server. If you
have restrictions on outgoing traffic,
you must whitelist both the
SmartUpdate server and the
licensing server.

Fortify User’s mail Email alerts 25 or SMTP Used for SMTP alerts for administration
WebInspect server user- team. To enable mobile TXT alerts, you
Enterprise specified can use an SMTP-to-SMS gateway
Manager address.
machine to
mail server

Fortify User’s SNMP SNMP alerts 162 or SNMP Used for SNMP alerts for administration
WebInspect Community user- team.
Enterprise specified
Manager
machine to
SNMP
Community

Connections for Tools


The following table lists the ports and protocols that the Micro Focus Fortify WebInspect Enterprise
tools use to make connections.

Tool Direction Endpoint Port Protocol Notes

Web Proxy To target localhost 8080 or HTTP or Intercepts and displays web traffic
web user-specified HTTPS
application over SSL

Micro Focus Fortify Software (20.1.0) Page 39 of 50


System Requirements

Tool Direction Endpoint Port Protocol Notes

Web Form To target localhost Dynamic, HTTP or Intercepts web traffic and captures submitted
Editor web 8100, or HTTPS forms
application user-specified over SSL

Login or To target localhost Dynamic, HTTP or Records browser sessions for replay during
Workflow Macro web 8081, or HTTPS scan
Recorders application user-specified over SSL

Web Discovery To localhost User-specified HTTP Scanner for identifying rogue web
targeted IP range and applications hosted among the targeted
range HTTPS scanned IP and port ranges
over SSL
Use to provide targets to Fortify WebInspect
(manually)

Fortify WebInspect Enterprise Sensor


A Micro Focus Fortify WebInspect Enterprise sensor is a Micro Focus Fortify WebInspect sensor that
runs scans on behalf of Fortify WebInspect Enterprise. See "Fortify WebInspect Requirements" on
page 26 for more information.
To run a scan from Fortify WebInspect Enterprise, you must have at least one instance of Fortify
WebInspect connected and configured as a sensor.

Fortify WebInspect Enterprise Notes and Limitations


l You can connect any instance of Micro Focus Fortify Software Security Center to only one instance
of Micro Focus Fortify WebInspect Enterprise, and you can connect any instance of Fortify
WebInspect Enterprise to only one instance of Fortify Software Security Center.
l For a Fortify WebInspect Enterprise environment to support Internet Protocol version 6 (IPv6), you
must deploy the IPv6 protocol on each Fortify WebInspect Enterprise Administrative Console, each
Fortify WebInspect Enterprise sensor, and the Fortify WebInspect Enterprise server.

Fortify License and Infrastructure Manager


Requirements
This section describes the hardware and software requirements for Micro Focus Fortify License and
Infrastructure Manager (LIM).

Hardware Requirements
Fortify recommends that you install the LIM on a system that conforms to the supported components
listed in following table. Beta or pre-release versions of operating systems, service packs, and required
third-party components are not supported.

Micro Focus Fortify Software (20.1.0) Page 40 of 50


System Requirements

Component Requirement Notes

Processor 2.5 GHz single-core or faster Recommended

1.5 GHz single-core Minimum

RAM 2+ GB Recommended

1 GB Minimum

Hard disk 50+ GB Recommended

20 GB Minimum

Display 1280 x 1024 Recommended

1024 x 768 Minimum

Software Requirements
LIM runs on and works with the software packages listed in the following table.

Package Versions Notes

Windows Server Windows Server 2012, 2012 R2

Windows Server 2016

Windows Server 2019

Web Server IIS 8.5 Recommended

IIS 7.5, 8.0, 10

.NET Platform .NET Framework 4.5, 4.6.1

ASP.NET4.5, 4.6

Browser Internet Explorer 11 Recommended

Mozilla Firefox 51.0 Recommended

Mozilla Firefox 44.0, 47.0, 69.0

Micro Focus Fortify Software (20.1.0) Page 41 of 50


System Requirements

Version Compatibility Matrix


This section provides compatibility information for Micro Focus Fortify Software components.

Fortify Software Component Compatibility


Micro Focus Fortify Software version 20.1.0 works with the component versions listed in the following
table.

Component Version

Micro Focus Fortify Software Security Center 20.1.0

Micro Focus Fortify Static Code Analyzer Tools 20.1.0


(Micro Focus Fortify Audit Workbench, Fortify Secure Code Plugins, and Fortify Custom
Rules Editor)

Micro Focus Fortify WebInspect Agent 20.1.0

Micro Focus Fortify WebInspect 20.1.0

Micro Focus Fortify WebInspect Enterprise 20.1.0

FPR File Compatibility


Earlier versions of Micro Focus Fortify Software products cannot open and read FPR files generated by
later versions of Fortify Software products. For example, Micro Focus Fortify Audit Workbench 18.20
cannot read 20.1.0 FPR files. However, later versions of Fortify Software products can open and read
FPR files generated by earlier versions of Fortify Software products. For example, Fortify Audit
Workbench version 20.1.0 can open and read version 18.20 FPR files.
FPR version numbers are determined as follows:
l The FPR version is the same as the version of the analyzer that initially generated it. For example, an
FPR generated by Fortify Software version 20.1.0 also has the version number 20.1.0.
l The FPR version is the same as the version of the Micro Focus Fortify Software Security Center or

Micro Focus Fortify Static Code Analyzer Tool used to modify or audit the FPR.
l If you merge two FPRs, the resulting FPR has the version of the more recently generated FPR. For

example, if you merge a version 18.20 FPR with a version 20.1.0 FPR, the resulting FPR has the
version number 20.1.0.
You can only open 20.1.0 FPR files with Fortify Software Security Center or Fortify Static Code
Analyzer Tools version 20.1.0 or later.

Micro Focus Fortify Software (20.1.0) Page 42 of 50


System Requirements

Caution Regarding Uploading FPRs to Fortify Software Security Center


Fortify Software Security Center keeps a project file that contains the latest scan results and audit
information for each application. Fortify Audit Workbench and the Secure Code Plugins also use this
project file for collaborative auditing.
Each time you upload an FPR to Fortify Software Security Center, it is merged with the existing project
file. If the FPR has a later version number than the existing project file, the existing project file version
changes to match the FPR. For Fortify Audit Workbench and the Secure Code Plugins to work with the
updated FPR, they must be at least the same version as the FPR. For example, Fortify Audit Workbench
18.20 cannot open and read a 20.1.0 FPR.

Virtual Machine Support


You can run Micro Focus Fortify Software products on an approved operating system in virtual machine
environments. You must provide dedicated CPU and memory resources that meet the minimum
hardware requirements. If you find issues that cannot be reproduced on the native environments with
the recommended processing, memory, and disk resources, you must work with the provider of the
virtual environment to resolve them.

Note: Running Fortify Software products in a VM environment with shared CPU and memory
resources is not supported.

Technologies and Features no Longer Supported in


this Release
The following technologies and features are no longer supported in Fortify Software:
l Fortify Static Code Analyzer: Translating .NET binaries and translating with custom MSBuild tasks
l Build Tools:
l Xcodebuild 10.0, 10.1, 10.2, 10.2.1, 10.3

l Compilers:
l Clang 10.0, 10.0.1

l Swiftc 4.2, 4.2.1, 5.0, 5.0.1


l All compilers on Solaris
l Databases (Fortify Software Security Center):
l Oracle 18c (18.3)

l Integrated Development Environments (IDEs):


l Android Studio 3.1

l IntelliJ IDEA 2018.x

Micro Focus Fortify Software (20.1.0) Page 43 of 50


System Requirements

l PyCharm 2018.x
l WebStorm 2018.x
l Operating Systems:
l macOS 10.13

l Solaris
l Supported Languages:
l .NET Core 1.x

l Swift 4.2
The following Micro Focus Fortify Software Security Center features are no longer supported:
l Authentication Tokens
The JenkinsToken type has been removed from this release. Use the CIToken type instead.

Technologies and Features to Lose Support in the


Next Release
The following technologies and features are scheduled for deprecation in the next Micro Focus Fortify
Software release:
l Application Server (Micro Focus Fortify Software Security Center):
l JDK 8 for Apache Tomcat

l Bug Trackers:
l Team Foundation Server (TFS) 2015 and 2017

l Databases (Fortify Software Security Center):


l MySQL 5.7 (Community Edition)

l SQL Server 2016


l Fortify Software Security Center (deployment to a Kubernetes cluster only):
l Kubernetes versions 1.14 through 1.15

l Fortify Static Code Analyzer support for all Swift, Xcode, and Objective-C/C++ versions will follow
the deprecation path Apple Inc. adopts.
The following Micro Focus Fortify Static Code Analyzer features are scheduled for deprecation in the
next release:
l Incremental Analysis

Micro Focus Fortify Software (20.1.0) Page 44 of 50


System Requirements

The following Fortify Software Security Center and Fortify Static Code Analyzer Tools features are
scheduled for deprecation in the next release:
l Authentication Tokens:
Use the new ScanCentralCtrlToken type instead of CloudCtrlToken. The CloudCtrlToken type will be
removed in the next release.
l Reports:
l DISA STIG 3.x

l SSA Portfolio
l SSA Application
l External Metadata Mappings:
l DISA STIG 3.x

Acquiring Fortify Software


Micro Focus Fortify Software is available as an electronic download. For instructions on how to
download the software from Micro Focus Fortify Customer Support
(https://softwaresupport.softwaregrp.com), click Contact Us / Self Help from the Software Licenses
and Downloads page to review the videos and the Quick Start Guide.
The following table lists the available packages and describes their contents.

File Name Description

Fortify_SCA_and_ Fortify SCA and Applications installer for Windows


Apps_
This installer includes the following components:
20.1.0_Windows.zip
l Fortify Static Code Analyzer

l Fortify Audit Workbench


l Fortify Custom Rules Editor
l Fortify Plugin for Eclipse
l Fortify Analysis Plugin for IntelliJ and Android Studio
l Fortify Extension for Visual Studio
l Fortify Scan Wizard
l Sample applications
Note:
l Fortify Software Security Content (Rulepacks and external metadata)
can be downloaded during the installation.

Micro Focus Fortify Software (20.1.0) Page 45 of 50


System Requirements

File Name Description

l The package includes the Fortify Remediation Plugin for Eclipse, the
Fortify Security Assistant Plugin for Eclipse, and the Fortify
Remediation Plugin for JetBrains IDEs.

Fortify_SCA_and_ Signature file for the Fortify SCA and Applications package for Windows
Apps_
20.1.0_
Windows.zip.sig

Fortify_SCA_and_ Fortify SCA and Applications installer for Linux


Apps_
The installer includes the following components:
20.1.0_Linux.tar.gz
l Fortify Static Code Analyzer
l Fortify Audit Workbench
l Fortify Custom Rules Editor
l Fortify Plugin for Eclipse
l Fortify Analysis Plugin for IntelliJ and Android Studio
l Fortify Scan Wizard
l Sample applications
Note:
l Fortify Software Security Content (Rulepacks and external metadata)
can be downloaded during the installation.
l The package includes the Fortify Remediation Plugin for Eclipse, the
Fortify Security Assistant Plugin for Eclipse, and the Fortify
Remediation Plugin for JetBrains IDEs.

Fortify_SCA_and_ Signature file for Fortify Static Code Analyzer for Linux
Apps_
20.1.0_
Linux.tar.gz.sig

Fortify_SCA_and_ Fortify SCA and Applications installer for macOS


Apps_
This installer includes the following components:
20.1.0_Mac.tar.gz
l Fortify Static Code Analyzer
l Fortify Audit Workbench

Micro Focus Fortify Software (20.1.0) Page 46 of 50


System Requirements

File Name Description

l Fortify Custom Rules Editor


l Fortify Plugin for Eclipse
l Fortify Analysis Plugin for IntelliJ and Android Studio
l Fortify Scan Wizard
l Sample applications
Note:
l Fortify Software Security Content (Rulepacks and external metadata)
can be downloaded during the installation.
l The package includes the Fortify Remediation Plugin for Eclipse, the
Fortify Security Assistant Plugin for Eclipse, and the Fortify
Remediation Plugin for JetBrains IDEs.

Fotify_SCA_and_ Signature file for the Fortify SCA and Applications package for macOS
Apps_20.1.0_
Mac.tar.gz.sig

Fortify_SSC_ Fortify Software Security Center


Server_20.1.0.zip

Fortify_SSC_ Signature file for Fortify Software Security Center


Server_
20.1.0.zip.sig

Fortify_ Fortify ScanCentral Controller


ScanCentral_
Controller_
20.1.0.zip

Fortify_ Signature file for Fortify ScanCentral Controller


ScanCentral_
Controller_
20.1.0.zip.sig

WebInspect_64_ Fortify WebInspect 64-bit package


20.1.0.zip
This package includes product documentation (PDF)

WebInspectToolkit_ Fortify WebInspect Toolkit package for use with Fortify WebInspect
20.1.0.zip Enterprise

Micro Focus Fortify Software (20.1.0) Page 47 of 50


System Requirements

File Name Description

WebInspect_Agent_ Fortify WebInspect Agent package


20.1.0.zip

WI_Enterprise_ Fortify WebInspect Enterprise package


20.1.0.zip
The package includes the following components:
l Fortify WebInspect Enterprise server
l Fortify WebInspect Enterprise Administrative Console
l Product documentation (PDF)

About Verifying Software Downloads


This topic describes how to verify the digital signature of the signed file that you downloaded from the
Micro Focus Fortify Customer Support site. Verification ensures that the downloaded package has not
been altered since it was signed and posted to the site. Before proceeding with verification, download
the Fortify Software product files and their associated signature (*.sig) files. You are not required to
verify the package to use the software, but your organization might require it for security reasons.

Preparing Your System for Digital Signature Verification


Note: These instructions describe a third-party product and might not match the specific,
supported version you are using. See your product documentation for the instructions for your
version.

To prepare your system for electronic media verification:


1. Navigate to the GnuPG site (http://www.gnupg.org).
2. Download and install GnuPG Privacy Guard version 1.4.x or 2.0.x.
3. Generate a private key, as follows:
a. Run the following command (on a Windows system, run the command without the $ prompt):
$ gpg --gen-key
b. When prompted for key type, select DSA and Elgamal.
c. When prompted for a key size, select 2048.
d. When prompted for the length of time the key should be valid, select key does not expire.
e. Answer the user identification questions and provide a passphrase to protect your private key.
4. Download the Micro Focus GPG public keys (compressed tar file) from the following location:
https://entitlement.mfgs.microfocus.com/ecommerce/efulfillment/digitalSignIn.do
5. Extract the public keys.
6. Import each downloaded key with GnuPG, as follows:
l Run gpg --import <Path_to_Key>/<File_Name_of_Key>

Micro Focus Fortify Software (20.1.0) Page 48 of 50


System Requirements

Verifying Software Downloads


To verify that the signature file matches the downloaded software package:
1. Navigate to the directory where you stored the downloaded package and signature file.
2. Run the following command:
gpg --verify <Signature_File_Name> <Downloaded_File_Name>
3. Examine the output to make sure that you receive verification that the software you downloaded is
signed by Micro Focus Group Limited and is unaltered. Your output will include something similar
to the following:

gpg: Signature made Fri, Oct 06, 2017 10:37:56 PM PDT using RSA key ID
AA71A9CF
gpg: checking the trustdb
gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model
gpg: depth: 0 valid: 3 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 3u
gpg: next trustdb check due at 2025-12-07
gpg: Good signature from "Micro Focus Group Limited RSA-2048-12"

Note: A warning message might be displayed because the public key is not known to the system.
You can ignore this warning or set up your environment to trust these public keys.

Assistive Technologies (Section 508)


In accordance with section 508 of the Rehabilitation Act, Micro Focus Fortify Audit Workbench has
been engineered to work with the JAWS screen reading software package from Freedom Scientific.
JAWS provides text-to-speech support for use by the visually impaired. With JAWS, labels, text boxes,
and other textual components can be read aloud, providing greater access to these technologies.
Micro Focus Fortify Software Security Center works well with the ChromeVox screen reader.

Micro Focus Fortify Software (20.1.0) Page 49 of 50


Send Documentation Feedback
If you have comments about this document, you can contact the documentation team by email. If an
email client is configured on this computer, click the link above and an email window opens with the
following information in the subject line:
Feedback on System Requirements (Fortify Software 20.1.0)
Just add your feedback to the email and click send.
If no email client is available, copy the information above to a new message in a web mail client, and send
your feedback to [email protected].
We appreciate your feedback!

Micro Focus Fortify Software (20.1.0) Page 50 of 50

You might also like