Configuration and Integration Checklist
Make the most of Seeker by fine-tuning its settings and integrating the external tools that complement its functionality.
Tasks | Information |
---|---|
1. Configure the delivery of vulnerability detections to a bug tracking system such as Jira. | Configure Bug Tracking Integration |
2. Enable the secure connection with the Seeker server by configuring signed HTTPS certificates. | Configure Server URL |
3. Configure an email account to send notifications upon vulnerability detections. | Configure SMTP Account |
4. Configure automatic actions to take upon vulnerability detections, such as applying custom tags or creating tickets in a bug tracking system. | Configure Notification Rules |
5. Enable the security analysis of third-party components included in your applications. | Install and Configure Black Duck Binary Analysis |
6. Integrate eLearning© to enable access to the online training courses that guide developers how to handle and remediate detected vulnerabilities. | Configure eLearning |