Configuration and Integration Checklist

Make the most of Seeker by fine-tuning its settings and integrating the external tools that complement its functionality.

Tasks Information
1. Configure the delivery of vulnerability detections to a bug tracking system such as Jira. Configure Bug Tracking Integration
2. Enable the secure connection with the Seeker server by configuring signed HTTPS certificates. Configure Server URL

Configure HTTPS Certificates

3. Configure an email account to send notifications upon vulnerability detections. Configure SMTP Account
4. Configure automatic actions to take upon vulnerability detections, such as applying custom tags or creating tickets in a bug tracking system. Configure Notification Rules
5. Enable the security analysis of third-party components included in your applications. Install and Configure Black Duck Binary Analysis
6. Integrate eLearning© to enable access to the online training courses that guide developers how to handle and remediate detected vulnerabilities. Configure eLearning