High-level summary of Critical, High, Medium, and Low vulnerabilities.
Since the scan is from 2021, the vulnerabilities are classified based on the rulepacks present in 2021.
Focus on critical findings (e.g., SQL Injection, Cross-Site Scripting). FORTIFY.v03.03.2021.rar
If you have the SCA tools installed, use the CLI for faster processing of older scans: ReportGenerator -format pdf -f "C:\path\to\your\scan.fpr" -template "Developer Workbook" -output "C:\path\to\Report.pdf" 3. Recommended Report Structure (Executive Summary)
Mention if any directories were excluded during the scan. 4. Key Considerations High-level summary of Critical, High, Medium, and Low
Based on the request for a report on "FORTIFY.v03.03.2021.rar", this suggests you are working with an older Fortify Static Code Analyzer (SCA) scan package ( .fpr file often contained within a .rar ) from approximately 2021. Report Generation Summary: FORTIFY.v03.03.2021.rar
Ensure you have audit templates (e.g., DISA STIG, OWASP Top 10) to categorize findings. 2. Methods for Report Generation Option A: Audit Workbench (Desktop GUI) Extract the FORTIFY.v03.03.2021.rar file. Open Audit Workbench . Select File > Open Project and select the .fpr file. Select Tools > Generate Report . If you have the SCA tools installed, use
Choose a report template (e.g., "Developer Workbook" or "Summary Report"). Choose output format (PDF, DOCX) and click .