We use cookies to make your experience better. To comply with the new e-Privacy directive, we need to ask for your consent to set the cookies. Learn more.
Since the scan is from 2021, the vulnerabilities are classified based on the rulepacks present in 2021.
Scan date (approx. Mar 2021), Auditor, Scan Type (SCA).
Ensure you have audit templates (e.g., DISA STIG, OWASP Top 10) to categorize findings. 2. Methods for Report Generation Option A: Audit Workbench (Desktop GUI) Extract the FORTIFY.v03.03.2021.rar file. Open Audit Workbench . Select File > Open Project and select the .fpr file. Select Tools > Generate Report . FORTIFY.v03.03.2021.rar
Mention if any directories were excluded during the scan. 4. Key Considerations
Based on the request for a report on "FORTIFY.v03.03.2021.rar", this suggests you are working with an older Fortify Static Code Analyzer (SCA) scan package ( .fpr file often contained within a .rar ) from approximately 2021. Report Generation Summary: FORTIFY.v03.03.2021.rar Since the scan is from 2021, the vulnerabilities
Focus on critical findings (e.g., SQL Injection, Cross-Site Scripting).
Choose a report template (e.g., "Developer Workbook" or "Summary Report"). Choose output format (PDF, DOCX) and click . Ensure you have audit templates (e
If you have the SCA tools installed, use the CLI for faster processing of older scans: ReportGenerator -format pdf -f "C:\path\to\your\scan.fpr" -template "Developer Workbook" -output "C:\path\to\Report.pdf" 3. Recommended Report Structure (Executive Summary)