Fortify Sys Reqs 22.1.0
Fortify Sys Reqs 22.1.0
Fortify Software
Software Version: 22.1.0
System Requirements
Legal Notices
Micro Focus
The Lawn
22-30 Old Bath Road
Newbury, Berkshire RG14 1QN
UK
https://www.microfocus.com
Warranty
The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the
express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an
additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The
information contained herein is subject to change without notice.
Copyright Notice
© Copyright 2001 - 2022 Micro Focus or one of its affiliates
Trademark Notices
All trademarks, service marks, product names, and logos included in this document are the property of their respective owners.
Documentation Updates
The title page of this document contains the following identifying information:
l Software Version number
l Document Release Date, which changes each time the document is updated
l Software Release Date, which indicates the release date of this version of the software
This document was produced on October 14, 2022. To check for recent updates or to verify that you are using the most recent
edition of a document, go to:
https://www.microfocus.com/support/documentation
Contents
Preface 7
Contacting Micro Focus Fortify Customer Support 7
For More Information 7
About the Documentation Set 7
Fortify Product Feature Videos 7
Change Log 8
Introduction 9
Software Delivery 9
Software Licenses 9
Fortify License and Infrastructure Manager Requirements 9
Hardware Requirements 10
Software Requirements 10
LIM on Docker Requirements 11
Fortify ScanCentral DAST Requirements 11
Architectural Best Practices 12
Fortify ScanCentral DAST Configuration Tool CLI 12
Software Requirements 12
Hardware Requirements 12
Fortify ScanCentral DAST Database Requirements 13
Database Recommendations 13
Fortify ScanCentral DAST Core Components VM 13
Software Requirements 14
Hardware Requirements 14
Fortify ScanCentral DAST Sensor 14
Fortify WebInspect on Docker Option 14
Classic Fortify WebInspect Installation Option 14
Fortify ScanCentral DAST Ports and Protocols 15
DAST API Required Connections 15
DAST Global Service Required Connections 15
DAST Sensor Required Connections 16
DAST Utility Service Required Connections 16
Fortify ScanCentral DAST Browsers 17
Standalone Web Macro Recorder Requirements 17
Running as Administrator 17
Build Tools 36
Compilers 36
Secure Code Plugins 37
Single Sign-On (SSO) 38
Service Integrations for Fortify Static Code Analyzer Tools 38
Fortify Software Security Content 39
BIRT Reports 39
Fortify WebInspect Requirements 39
WebInspect Hardware Requirements 39
WebInspect Software Requirements 40
Support for Postman 41
Notes on SQL Server Editions 42
WebInspect on Docker 42
Hardware Requirements 43
Fortify WebInspect Ports and Protocols 43
Required Connections 43
Optional Connections 44
Connections for Tools 46
Fortify WebInspect Agent 47
WebInspect Software Development Kit (SDK) 47
Software Integrations for Fortify WebInspect 47
Fortify WebInspect Agent Requirements 47
Platforms and Architectures 48
Java Runtime Environments 48
Java Application Servers 48
.NET Frameworks 48
IIS for Windows Server 49
Fortify WebInspect Enterprise Requirements 49
Important Information About This Release 49
Integrations for Fortify WebInspect Enterprise 49
Fortify WebInspect Enterprise Database 49
WebInspect Enterprise Hardware Requirements 50
WebInspect Enterprise Software Requirements 50
Administrative Console Requirements 51
Hardware Requirements 51
Software Requirements 52
Fortify WebInspect Enterprise Ports and Protocols 52
Required Connections 52
Optional Connections 53
Connections for Tools 56
Fortify WebInspect Enterprise Sensor 56
Fortify WebInspect Enterprise Notes and Limitations 56
Fortify Project Results (FPR) File Compatibility 57
Virtual Machine Support 57
Technologies no Longer Supported in this Release 58
Technologies to Lose Support in the Next Release 58
Acquiring Fortify Software 59
About Verifying Software Downloads 63
Preparing Your System for Digital Signature Verification 63
Verifying Software Downloads 64
Assistive Technologies (Section 508) 64
Preface
Contacting Micro Focus Fortify Customer Support
Visit the Support website to:
l Manage licenses and entitlements
l Create and manage technical assistance requests
l Browse documentation and knowledge articles
l Download software
l Explore the Community
https://www.microfocus.com/support
Change Log
The following table lists revisions made to this document.
Removed:
l Browser requirements listed for Fortify WebInspect
Introduction
This document provides the details about the environments and products that Micro Focus supports
for this version of Micro Focus Fortify Software, which includes:
l Micro Focus Fortify License and Infrastructure Manager
l Micro Focus Fortify ScanCentral DAST
l Micro Focus Fortify ScanCentral SAST
l Micro Focus Fortify Software Security Center Server
l Micro Focus Fortify Static Code Analyzer and Fortify Static Code Analyzer Tools (Micro Focus
Fortify Audit Workbench and Secure Code Plugins)
l Micro Focus Fortify WebInspect
l Micro Focus Fortify WebInspect Agent
l Micro Focus Fortify WebInspect Enterprise
Software Delivery
Micro Focus Fortify Software is delivered electronically. See "Acquiring Fortify Software" on page 59
for more information.
Software Licenses
Micro Focus Fortify Software products require a license.
For Micro Focus Fortify ScanCentral DAST, Micro Focus Fortify Static Code Analyzer, Micro Focus
Fortify WebInspect, and Micro Focus Fortify WebInspect Enterprise, you will receive an email with
instructions for how to activate your product.
For all other Fortify Software products described in this document (including Fortify Static Code
Analyzer and Secure Code Plugins), you must download the Fortify license file for your purchase from
the Micro Focus Software Licenses and Downloads (SLD) portal (https://sld.microfocus.com). Use the
credentials that Micro Focus Fortify Customer Support has provided for access.
Hardware Requirements
Fortify recommends that you install the LIM on a system that conforms to the supported components
listed in following table.
RAM 2+ GB Recommended
1 GB Minimum
20 GB Minimum
Software Requirements
LIM runs on and works with the software packages listed in the following table. Beta or pre-release
versions of operating systems, service packs, and required third-party components are not supported.
IIS 7.5, 8.0, 10
.NET Platform .NET Framework 4.5, 4.6.1, When configuring Roles and Features in
4.7 Windows Server Manager, you might see .NET
Framework 4.6 rather than 4.6.1 even though
you have installed 4.6.1. You can confirm the
installed version in the Command Prompt using
the .\MSBuild.exe -version command in
the following directory:
%windir%\Microsoft.NET\Framework\
<version>
Software Version
For more information about the Fortify ScanCentral DAST components, see the Micro Focus Fortify
ScanCentral DAST Configuration and Usage Guide.
Software Requirements
The Fortify ScanCentral DAST Configuration Tool CLI runs on and works with the software packages
listed in the following table.
Package Versions
Windows Windows 10
Hardware Requirements
Fortify recommends that you use the Fortify ScanCentral DAST Configuration Tool CLI on a system
that conforms to the supported components listed in the following table.
RAM 2+ GB Recommended
1 GB Minimum
Azure SQL Using Azure SQL Server outside the Azure infrastructure may
Server cause poor performance for Fortify ScanCentral DAST. Fortify
recommends using Azure SQL Server with Fortify ScanCentral
DAST inside the Azure infrastructure only.
Amazon RDS
for SQL
Server
PostgreSQL PostgreSQL
Azure
PostgreSQL
Amazon RDS
for
PostgreSQL
Database Recommendations
Fortify recommends that you configure the database server on a separate machine from either Micro
Focus Fortify Software Security Center or any other Fortify ScanCentral DAST components.
The Fortify ScanCentral DAST SQL database requires case-insensitive collation.
Important! This is opposite the requirement for Fortify Software Security Center databases as
described in "Fortify Software Security Center Database" on page 23.
Software Requirements
The DAST API, DAST Global Service, and DAST Utility Service containers run on and work with the
software packages listed in the following table.
Software Versions
Hardware Requirements
Fortify recommends that you use the DAST API, DAST Global Service, and DAST Utility Service
containers on a system that conforms to the supported components listed in the following table.
Component Requirement
RAM 32 GB
Processor 8 Core
Important! When running a Fortify ScanCentral DAST sensor outside of a container, such as a
sensor service on the same machine as a classic Fortify WebInspect installation, you must install
the .NET SDK Core Runtime 5.0.202.
Fortify Software 80 HTTP If SSL is not configured, the port on the host running
Security Center the container is forwarded to port 80 on the container.
DAST Global Host port mapping is customizable to the container
Service port.
DAST Sensor
Service
Fortify Software 443 HTTPS If SSL is configured, the port on the host running the
Security Center container is forwarded to port 443 on the container.
DAST Global Host port mapping is customizable to container port.
Service
DAST Sensor
Service
SQL Server, 1433 TCP This is the default SQL Server port.
Azure SQL
Server, or
Amazon RDS for
SQL Server
The following table lists the ports and protocols that the DAST Global Service container uses for
required connections.
SQL Server, 1433 TCP This is the default SQL Server port.
Azure SQL
Server, or
Amazon RDS
for SQL Server
DAST API 5000 HTTP If SSL is not configured, the port on the host running
the container is forwarded to port 5000 on the
container.
Host port mapping is customizable to the container
port.
DAST API 5001 HTTPS If SSL is configured, the port on the host running the
container is forwarded to port 5001 on the container.
Host port mapping is customizable to container port.
SQL Server, 1433 TCP This is the default SQL Server port.
Azure SQL
Server, or
Amazon RDS for
SQL Server
Browser Version
Google Chrome 90 or later
Safari 14 or later
Package Version
Windows Windows 10
Running as Administrator
The standalone Web Macro Recorder tool requires administrative privileges for proper operation of all
features. Refer to the Windows operating system documentation for instructions on changing the
privilege level to run the Web Macro Recorder tool as an administrator.
Product Versions
Operating
System Versions
Intended
Use Equation
Languages
Fortify ScanCentral SAST supports offloading translation to ScanCentral sensors for the following
languages. See "Languages" on page 29 for specific supported versions.
l .NET applications in C# and Visual Basic (VB.NET) (.NET Core, .NET Standard, ASP.NET)
Note:
l Packaging of .NET applications is supported only on Windows systems.
l Translation of .NET applications requires .NET Framework version 4.7.2 or later.
l ABAP
l Apex
l Classic ASP
l ColdFusion
l Go
l Java
l JavaScript
l Kotlin
l PHP
l PL/SQL
l Python
l Ruby
l T-SQL
l TypeScript
l Visual Basic 6.0
Build Tools
Fortify ScanCentral SAST supports the build tools listed in the following table.
Build Tool Versions
Gradle 5.0–7.3
Maven 3.x
Hardware Requirements
Micro Focus Fortify Software Security Center requires the hardware specifications listed in the
following table.
RAM 8 GB 64 GB
Use the following formula to estimate the size (in GB) of the Fortify Software Security Center
database disk space:
((<num_issues>*30 KB) + <size_of_artifacts>) ÷ 1,000,000
where:
l <num_issues> is the total number of issues in the system
l <size_of_artifacts> is the total size in KB of all uploaded artifacts and analysis results
Note: This formula produces only a rough estimate for database disk space allocation. Do not use
it to estimate disk space requirements for long-term projects. Disk requirements for Fortify
Software Security Center databases increases in proportion to the number of projects, scans, and
issues in the system.
Operating
System Versions
Note: Although Fortify Software Security Center has not been tested on all Linux variants, most
distributions are not known to have issues.
Application Servers
Micro Focus Fortify Software Security Center supports Apache Tomcat version 9.x for the following
JDK versions:
l Oracle JDK 11
l Red Hat OpenJDK 11
l SUSE OpenJDK 11
l Zulu OpenJDK 11 from Azul
Fortify only supports the deployment of a single Fortify Software Security Center instance.
Furthermore, that instance must not be behind a load balancer.
Caution! Fortify Software Security Center does not support any cloud database services such as
RDS in Amazon Web Services or Azure-managed databases.
Important! Disk I/O encompasses the input/output operations on a physical disk. If you are
reading data from a file on a disk, the processor must wait for the file to be read (the same applies
to writing data to a file). Fortify Software Security Center is a high I/O-intensive application, which
affects performance. Make sure that your disk subsystem provides low read/write latency. Fortify
recommends that you monitor disk I/O as the database grows.
Fortify Software Security Center supports the databases listed in the following table.
Collation /
Database Versions Character Sets Driver
Collation /
Database Versions Character Sets Driver
Oracle 12c Release 2 AL32UTF8 for all The Oracle Database 21c JDBC driver is
languages included in the Fortify Software Security
19c (18.3)
Center WAR file.
WE8MSWIN1252
for US English Driver class:
oracle.jdbc.OracleDriver
JAR file:
ojdbc11.jar (for Java 11) version 21.3.0.0
SQL 2017 SQL_Latin1_ The Microsoft JDBC Driver 9.2 for SQL
Server General_CP1_CS_ Server is included in the Fortify Software
2019
AS Security Center WAR file.
Driver class:
com.microsoft.sqlserver:mssql-
jdbc: 9.4.0.jre11
Note: Fortify does not support the direct conversion from one database server type to another,
such as converting from MySQL to Oracle. To do this, you must use the Server API to move data
from your current Fortify Software Security Center instance to a new Fortify Software Security
Center instance that uses the database server type you want to use going forward. Micro Focus
Professional Services can assist you with this process.
Kubernetes Requirements
l Kubernetes versions 1.20–1.22
l Helm versions 3.6–3.8
l Persistent volume support
l A load balancer service (Recommended)
l At least 7 GB of RAM and 1 CPU on a single node (with default configuration)
Additional Requirements
l Kubeconfig file for the Kubernetes cluster
l Docker Hub account with access to Fortify Software Security Center images
Note: If you need access to Fortify Docker Organization on Docker Hub, contact
[email protected] with your first name, your last name, and your Docker account
name. Micro Focus Fortify will then give you access to the Fortify Docker organization that
contains the Fortify Software Security Center images.
l DNS name for the Fortify Software Security Center web application (address used to access the
service)
l Java keystore for setting up HTTPS (For details, see the Micro Focus Fortify Software Security
Center User Guide) The keystore must contain a CA certificate and a server certificate for the
Fortify Software Security Center DNS name with an associated private key.
l Keystore password
Browsers
Fortify recommends that you use one of the browsers listed in the following table and a screen
resolution of 1400 x 800.
Browser Version
Google Chrome 90 or later
Safari 14 or later
Authentication Systems
Micro Focus Fortify Software Security Center supports the following directory services:
l LDAP: LDAP 3 compatible
Important! Although Fortify supports the use of multiple LDAP servers, it does not support
the use of multiple LDAP servers behind a load balancer unless they are exact copies.
l Windows Active Directory Service
BIRT Reporting
Micro Focus Fortify Software Security Center custom reports support BIRT Report Designer
version 4.7.
Bugzilla 5.0.x
Jira 8.0–8.13
Hardware Requirements
Fortify recommends that you install Micro Focus Fortify Static Code Analyzer on a high-end processor
with the hardware requirements described in the following table.
Increasing the number of processor cores and RAM both result in faster processing. If your software is
complex, you might require more RAM or processors. See the information about improving
performance in the Micro Focus Fortify Static Code Analyzer User Guide for recommendations.
Software Requirements
Micro Focus Fortify Static Code Analyzer requires Java 11. The Fortify Static Code Analyzer and
Applications installation includes an embedded OpenJDK/JRE version 11.0.14.1.
The following table describes software requirements for specific features.
Translate .NET and Visual Studio C/C++ projects Windows operating system
Translate projects that use the Blazor web framework Installation of a supported version of
Visual Studio (2019 or later)
macOS 11, 12
AIX 7.1
Fortify Static Code Analyzer Tools (including Secure Code Plugins) support the platforms and
architectures listed in the following table.
Windows 10
macOS 11, 12
Languages
Micro Focus Fortify Static Code Analyzer supports the programming languages listed in the following
table.
Language /
Framework Versions
.NET Framework 2.0–4.8
Language /
Framework Versions
.NET Core 2.0–3.1
ABAP/BSP 6
ActionScript 3.0
Apex 36
C# 5, 6, 7, 8, 9, 10
COBOL IBM Enterprise COBOL for z/OS 6.1 (and earlier) with CICS, IMS, DB2, and
IBM MQ
Micro Focus Visual COBOL 6.0
ColdFusion 8, 9, 10
HCL 2.0
Language /
Framework Versions
JSON ECMA-404
MXML (Flex) 4
PL/SQL 8.1.6
Ruby 1.9.3
Note: Analyzing Scala code requires the Scala Fortify compiler plugin,
which is available in the Maven Central Repository.
Language /
Framework Versions
XML 1.0
YAML 1.2
Adobe Flex Blaze DS Apache Struts IBM WebSphere Netscape LDAP API Spring Data Commons
Ajanta Apache Tapestry Jackson OpenCSV Spring Data JPA
Amazon Web Services Apache Tomcat Jakarta Activation Oracle Application Spring Data MongoDB
(AWS) SDK Development
Apache Torque Jakarta EE (Java EE) Spring Data Redis
Framework (ADF)
Apache Axiom
Apache Util Java Annotations Spring HATEOAS
Oracle BC4J
Apache Axis
Apache Velocity Java Excel API Spring JMS
Oracle JDBC
Apache Beehive NetUI
Apache Wicket JavaMail Spring JMX
Oracle OA Framework
Apache Catalina
Apache Xalan JAX-RS Spring Messaging
Oracle tcDataSet
Apache Cocoon
Apache Xerces JAXB Spring Security
Oracle XML Developer
Apache Commons
ATG Dynamo Jaxen Kit (XDK) Spring Webflow
Apache ECS
Azure SDK JBoss OWASP Enterprise Spring WebSockets
Apache Hadoop Security API (ESAPI)
Castor JDesktop Spring WS
Apache OWASP HTML
Display Tag JDOM Stripes
HttpComponents Sanitizer
Dom4j Jetty Sun JavaServer Faces
Apache Jasper OWASP Java Encoder
(JSF)
GDS AntiXSS JGroups
Apache Log4j Plexus Archiver
Tungsten
Google Android json-simple
Apache Lucene Realm
Weblogic
Google Cloud JTidy Servlet
Apache MyFaces Restlet
WebSocket
Google Web Toolkit JXTA
Apache OGNL SAP Web Dynpro
XStream
gRPC JYaml
Apache ORO Saxon
YamlBeans
Gson Liferay Portal
Apache POI SnakeYAML
ZeroTurnaround ZIP
Hibernate MongoDB
Apache SLF4J Spring and Spring
Zip4J
iBatis Mozilla Rhino MVC
Apache Slide
IBM MQ MyBatis Spring Boot
Apache Spring
Security (Acegi)
Scala
.NET
C++
SQL
Oracle ModPLSQL
PHP
JavaScript/TypeScript/HTML5
Python
Ruby
Objective-C
Swift
COBOL
Go
GORM
logrus
gRPC
Configuration
.NET Configuration Docker Configuration Java Apache Struts Java Spring and Oracle Application
(Dockerfiles) Spring MVC Development
Adobe Flex Java Apache Tomcat
Framework (ADF)
(ActionScript) GitHub Actions Configuration Java Spring Boot
Configuration PHP Configuration
Google Android Java Blaze DS Java Spring Mail
Ajax Frameworks Configuration PHP WordPress
Java Hibernate Java Spring Security
Amazon Web Service Google Cloud Configuration Silverlight
Java Spring
(AWS) Configuration
iOS Property List Java iBatis WebSockets
Ansible Configuration Terraform
J2EE Configuration Java Weblogic
AWS CloudFormation Java IBM WebSphere WS-SecurityPolicy
Java Apache Axis Kubernetes
Azure Java MyBatis XML Schema
Java Apache Log4j Mule
Configuration
Azure Resource Configuration
OpenAPI Specification
Manager (ARM) Java OWASP
Java Apache Spring
AntiSamy
Build Management Security (Acegi)
Secrets
Build Tools
Micro Focus Fortify Static Code Analyzer supports the build tools listed in the following table.
MSBuild 14.0, 15.x, 16.x, 17.0, 17.1, The MSBuild integration is supported on Windows.
17.2
Compilers
Micro Focus Fortify Static Code Analyzer supports the compilers listed in the following table.
gcc GNU gcc 4.9, 5.x Windows, Linux, macOS, AIX, Solaris
g++ GNU g++ 4.9, 5.x Windows, Linux, macOS, AIX, Solaris
OpenJDK javac 9, 10, 11, 12, 13, 14, 17 Windows, Linux, macOS
1Fortify Static Code Analyzer supports applications built in the following Xcode versions: 12.5, 12.5.1,
13, 13.1, 13.2, 13.2.1, 13.3, 13.3.1, 13.4, 13.4.1.
IDEs and
Plugin / Extension Versions Notes
IDEs and
Plugin / Extension Versions Notes
Fortify Visual Studio Visual Studio Visual Studio Community, Professional, and
Extension 2017 Enterprise editions for Windows are supported.
Visual Studio For supported MSBuild versions, see "Build
2019 Tools" on page 36.
Visual Studio
2022
Note: Fortify Audit Workbench and the Secure Code Plugins can use token-based authentication
with Fortify Software Security Center, which removes the requirement to configure SSO directly.
BIRT Reports
To generate BIRT reports on a Linux system from the Secure Code Plugins or the
BIRTReportGenerator utility, you must install the fontconfig library, DejaVu Sans fonts, and DejaVu
serif fonts on the server.
To run the BIRTReportGenerator utility in a Linux Docker container, you must have the X11 libraries
installed in the image. The X11 libraries provide the graphical user interface API that BIRT requires
for data visualization.
Processor 2.5 GHz quad- Complex applications might benefit from additional cores.
core or faster
Hard disk 40 GB Using SQL Express and storing scans locally requires
additional disk space per scan.
Windows 11
Azure SQL Server Using Azure SQL Server outside the Azure
infrastructure may cause poor performance for
When you install Newman, a path variable for Newman is automatically added to the user
variables. The path variable is similar to the following:
<directory_path>\AppData\Roaming\npm
You must manually add the same Newman path variable to the system environment variables.
Ensure that the variable is in both the user variables and system environment variables before
proceeding.
System variables are read only when the machine boots, so after manually adding the path
variable, you must restart your machine. See your Windows documentation for specific
instructions on how to add a system environment variable.
l Node.js and the included Node Package Manager (NPM)
Note: Install the Node.js version that is required for the version of Newman that you install. For
more information, see https://www.npmjs.com/package/newman.
WebInspect on Docker
Fortify WebInspect on Docker has the software requirements listed in the following table.
Windows Windows Server This Windows version supports the process isolation
2019 runtime mode.
Hardware Requirements
Fortify recommends that you install Micro Focus Fortify WebInspect on Docker on a host that
conforms to the supported components listed in the following table and configure the container to
use these resources. Fortify does not support beta or pre-release versions of operating systems,
service packs, and required third-party components.
Processor 2.5 GHz quad- Complex applications might benefit from additional cores.
core or faster
Hard disk 40 GB Using SQL Express and storing scans locally requires
additional disk space per scan.
Required Connections
The following table lists the ports and protocols Micro Focus Fortify WebInspect uses to make
required connections.
Fortify Target host Scan target host Any HTTP Fortify WebInspect must
WebInspect connect to the web application
to target host or web service to be scanned.
Fortify SQL Server Express, SQLEXPRESS service on 1433 SQL TCP Used to maintain the scan data
WebInspect SQL Server localhost or SQL TCP and to generate reports within
to SQL Standard/Enterprise, service locally installed the Fortify WebInspect
database or Azure SQL Server or remote host application.
Optional Connections
The following table lists the ports and protocols Micro Focus Fortify WebInspect uses to make
optional connections.
Fortify Fortify Lease Concurrent User license 443 Web Required for Fortify
WebInspect to WebInspect services WebInspect client to lease
Fortify License LIM over SSL and use a Concurrent User
and license maintained in a LIM
(Local
Infrastructure license pool. You can detach
Licensing
Manager (LIM) the client license from LIM
Service)
after activation to avoid a
constant connection.
Fortify Fortify User-specified Fortify 443 or HTTP or The Enterprise Server menu
WebInspect to WebInspect WebInspect server user- HTTPS connects Fortify
Fortify Enterprise specified over SSL WebInspect as a client to
WebInspect server the enterprise security
Enterprise solution to transfer findings
and user role and
permissions management.
Fortify Fortify User-specified Fortify 443 or HTTP or Separate from the Fortify
WebInspect WebInspect WebInspect server user- HTTPS WebInspect UI, you can
sensor service Enterprise specified over SSL configure the local
to Fortify server installation as a remote
WebInspect scan engine for use by the
Enterprise enterprise security solution
community. This is done
through a Windows Service.
This constitutes a different
product from Fortify
WebInspect desktop and is
recommended to be run on
its own, non-user-focused
machine.
Browser to localhost Manual Step-Mode Scan Dynamic, HTTP or Fortify WebInspect serves
Fortify 8081, or HTTPS as a web proxy to the
WebInspect user- over SSL browser, enabling manual
specified testing of the target web
server through Fortify
WebInspect.
Web Proxy To target host localhost 8080 or HTTP or Intercepts and displays web traffic
user- HTTPS
specified over SSL
Web Form To target host localhost Dynamic, HTTP or Intercepts web traffic and captures
Editor 8100, or HTTPS submitted forms
user- over SSL
specified
Login or To target host localhost Dynamic, HTTP or Records browser sessions for replay
Workflow 8081, or HTTPS during scan
Macro user- over SSL
Recorders specified
Web Fortify WebInspect Target host User- HTTP and Scanner for identifying rogue web
Discovery machine to network specified HTTPS applications hosted among the targeted
targeted IP range range range over SSL scanned IP and port ranges
Use to provide targets to Fortify
WebInspect (manually)
Important! Visual Studio Express versions do not support third-party extensions. Therefore,
these versions do not meet the software requirements to use the WebInspect SDK.
Product Versions
Oracle HotSpot 5, 6, 7, 8
Jetty 9.3
.NET Frameworks
Fortify WebInspect Agent supports .NET Framework versions 2.0, 3.0, 3.5, 4.0, and 4.5–4.8.
Note: Product versions that are not specifically listed in this document are not supported.
Important! This is opposite the requirement for Fortify Software Security Center databases as
described in "Fortify Software Security Center Database" on page 23.
Component Requirement
RAM 16 GB
Google Chrome 81 or
later
Microsoft Edge 81 or
later
Internet Explorer 11
Hardware Requirements
The following table lists the hardware requirements for Fortify WebInspect Enterprise Administrative
Console.
RAM 4 GB Minimum
Hard disk 2 GB
Software Requirements
The Fortify WebInspect Enterprise Administrative Console runs on and works with the software
packages listed in the following table.
Windows 8.1
Required Connections
The following table lists the ports and protocols Micro Focus Fortify WebInspect Enterprise uses to
make required connections.
URL or
Direction Endpoint Details Port Protocol Notes
Fortify WebInspect SQL Server SQL TCP 1433 or SQL TCP Used to maintain the scan data
Enterprise Manager Standard/Enterprise service on user- and full Enterprise environment.
server to SQL locally specified Custom configurations of
database installed or SQL Server are permitted,
remote host including port changes and
encrypted communication.
Fortify WebInspect Fortify Software User- 8180 or HTTP or As a modular add-on, Fortify
Enterprise Manager Security Center server specified user- HTTPS WebInspect Enterprise requires
machine to Fortify Fortify specified over SSL a connection to its core Fortify
Software Security Software Software Security Center
Center server Security server.
Center server
Note: This connection is
required only if you
integrate Fortify
WebInspect Enterprise
URL or
Direction Endpoint Details Port Protocol Notes
Browser users to Fortify WebInspect User- 443 or HTTPS You can configure Fortify
Fortify WebInspect Enterprise server specified user- over SSL WebInspect Enterprise not to
Enterprise server UI Fortify specified use SSL, but tests indicate that
WebInspect it might affect the product
Enterprise usability.
server
Browser user to Fortify Software User- 8180 or HTTP or You can configure the Fortify
Fortify Software Security Center server specified user- HTTPS Software Security Center server
Security Center UI Fortify specified over SSL on any available port during
Software installation.
Security
Center server
Optional Connections
The following table lists the ports and protocols Micro Focus Fortify WebInspect Enterprise uses to
make optional connections.
Fortify User’s mail Email alerts 25 or SMTP Used for SMTP alerts for
WebInspect server user- administration team. To enable
Enterprise specified mobile TXT alerts, you can use an
Manager SMTP-to-SMS gateway address.
machine to
mail server
Fortify User’s SNMP SNMP alerts 162 or SNMP Used for SNMP alerts for
WebInspect Community user- administration team.
Enterprise specified
Manager
machine to
SNMP
Community
Web Proxy To target localhost 8080 or HTTP or Intercepts and displays web traffic
web user-specified HTTPS
application over SSL
Web Form To target localhost Dynamic, 8100, HTTP or Intercepts web traffic and captures
Editor web or HTTPS submitted forms
application user-specified over SSL
Login or To target localhost Dynamic, 8081, HTTP or Records browser sessions for replay during
Workflow Macro web or HTTPS scan
Recorders application user-specified over SSL
Web Discovery To targeted localhost User-specified HTTP and Scanner for identifying rogue web
IP range range HTTPS applications hosted among the targeted
over SSL scanned IP and port ranges
Use to provide targets to Fortify
WebInspect (manually)
You can only open 22.1.0 FPR files with Fortify Software Security Center or Fortify Static Code
Analyzer Tools versions 22.1.0 or later.
Caution Regarding Uploading FPRs to Fortify Software Security Center
Fortify Software Security Center keeps a project file that contains the latest scan results and audit
information for each application. Fortify Audit Workbench and the Secure Code Plugins also use this
project file for collaborative auditing.
Each time you upload an FPR to Fortify Software Security Center, it is merged with the existing
project file. If the FPR has a later version number than the existing project file, the existing project file
version changes to match the FPR. For Fortify Audit Workbench and the Secure Code Plugins to work
with the updated FPR, they must be at least the same version as the FPR. For example, Fortify Audit
Workbench 21.1.0 cannot open and read a 22.1.0 FPR.
Note: If you run Fortify Software products in a VM environment, Fortify strongly recommends
that you have CPU and memory resources fully committed to the VM to avoid possible
performance degradation.
l macOS 10.15
l Build Tools (Fortify Static Code Analyzer)
l Gradle versions prior to version 5.0
l Helm 3.2-3.5
l Service Integrations
l Jira 7.x
Note: A deprecated technology is no longer recommended for use. Typically, the deprecated item
will be removed from the product in a future release. When a technology is deprecated, Fortify
recommends that you remove it from your workflow at your earliest convenience.
l Fortify Static Code Analyzer support for all Swift, Xcode, and Objective-C/C++ versions follows the
deprecation path Apple Inc. adopts.
l Xcodebuild 12.5, 12.5.1
l Clang 12.0.5
l Swiftc 5.4, 5.4.2
l Helm 3.6-3.7
l Secure Code Plugins:
l Visual Studio 2017
l Service Integrations
l Jira 8.0–8.12
Fortify_SCA_and_Apps_ Fortify Static Code Analyzer and Applications package for Windows
<version>_Windows.zip
This package includes:
l Fortify Static Code Analyzer and Applications installer, which
includes the following components:
l Fortify Static Code Analyzer
l Fortify Audit Workbench
l Fortify Custom Rules Editor
l Fortify Plugin for Eclipse (Eclipse Complete Plugin)
l Fortify Analysis Plugin for IntelliJ and Android Studio
l Fortify Extension for Visual Studio
l Fortify Scan Wizard
l Sample projects
l Fortify License and Infrastructure Manager installer
l Fortify Security Assistant Plugin for Eclipse
l Fortify Custom Rules Guide bundle
Fortify_SCA_and_Apps_ Signature file for the Fortify Static Code Analyzer and Applications
<version>_Windows.zip.sig package for Windows
Fortify_SCA_and_Apps_ Fortify Static Code Analyzer and Applications package for Linux
<version>_Linux.tar.gz
This package includes:
l Fortify Static Code Analyzer and Applications installer, which
includes the following components:
l Fortify Static Code Analyzer
l Fortify Audit Workbench
l Fortify Custom Rules Editor
l Fortify Plugin for Eclipse (Eclipse Complete Plugin)
l Fortify Analysis Plugin for IntelliJ and Android Studio
l Fortify Scan Wizard
l Sample applications
l Fortify Security Assistant Plugin for Eclipse
l Fortify Custom Rules Guide bundle
l About Fortify Software Documentation
Fortify_SCA_and_Apps_ Signature file for Fortify Static Code Analyzer for Linux
<version>_Linux.tar.gz.sig
Fortify_SCA_and_Apps_ Fortify Static Code Analyzer and Applications package for macOS
<version>_Mac.tar.gz
This package includes:
l Fortify Static Code Analyzer and Applications installer, which
includes the following components:
Fortify_SCA_and_Apps_ Signature file for the Fortify Static Code Analyzer and Applications
<version>_Mac.tar.gz.sig package for macOS
AIX.tar.gz.sig
<version>.zip.sig
SecurityToolkit_ Fortify WebInspect Toolkit package for use with Fortify WebInspect
<version>.zip Enterprise
1. Navigate to the directory where you stored the downloaded package and signature file.
2. Run the following command:
gpg --verify <file>.sig <filename>
For example:
3. Examine the output to make sure that you receive verification that the software you downloaded
is signed by Micro Focus Group Limited and is unaltered. Your output will include something
similar to the following:
gpg: Signature made Wed, May 04, 2022 10:15:10 AM PDT using RSA key ID
AB42A5CF
gpg: Good signature from "Micro Focus Group Limited RS A2048 1"
Note: A warning message might indicate that the public key is not known to the system. You can
ignore this warning or set up your environment to trust these public keys.
JAWS provides text-to-speech support for use by the visually impaired. With JAWS, labels, text boxes,
and other textual components can be read aloud, providing greater access to these technologies.
Micro Focus Fortify Software Security Center works well with the ChromeVox screen reader.
Note: If you are experiencing a technical issue with our product, do not email the documentation
team. Instead, contact Micro Focus Fortify Customer Support at
https://www.microfocus.com/support so they can assist you.
If an email client is configured on this computer, click the link above to contact the documentation
team and an email window opens with the following information in the subject line:
Feedback on System Requirements (Fortify Software 22.1.0)
Just add your feedback to the email and click send.
If no email client is available, copy the information above to a new message in a web mail client, and
send your feedback to [email protected].
We appreciate your feedback!