A User Guide to Reports in Sonatype CLM

Table of Contents





Authors

Sonatype, Inc. Manfred Moser Jeff Wayman Bruce Mayhew Justin Young Kelly Robinson

List of Figures

2.1. Summary Tab of the Application Composition Report
2.2. Reporting Area
2.3. Application Area
2.4. The Four Tabs
2.5. Security Issues Summary
2.6. License Analysis Summary
2.7. Policy Tab
2.8. Security Issues Tab
2.9. License Analysis Tab
2.10. Application Composition Report Buttons For Printing and Reevaluation
2.11. Component Information Panel CIP Example
2.12. CIP, Policy Section
2.13. CIP, Similar Section
2.14. CIP, Occurrences Section
2.15. CIP, Licenses Section
2.16. CIP, Edit Vulnerabilities Section
2.17. CIP, Labels Section
2.18. CIP, Claim Component
2.19. CIP, Audit
3.1. Security Issues Tab
3.2. Component Information Panel (CIP)
3.3. Editing Vulnerabilities via CIP
3.4. Editing Multiple Vulnerabilities
3.5. Example of Component with Security Issue, but No Policy Violation
4.1. License Analysis Tab
4.2. The Default License Threat Groups
4.3. Component Information Panel (CIP)
4.4. Editing a Single License, Using Select Option
5.1. Unknown Component
5.2. Filter and Matching Options
5.3. Proprietary Component
5.4. Proprietary Packages Configuration via the Sonatype CLM Server
5.5. Claim a Component
5.6. Claimed Component Indicator
6.1. Labels at the CLM Server Level
6.2. Assigning a Label
7.1. Waiver Visualization on Policy Tab
7.2. Waiver Button
7.3. Options to Apply Waiver to the Application or the Entire Organization
7.4. View and Remove Waivers
8.1. Application Composition Report Buttons For Printing and Reevaluation
9.1. Summary Section of a Application Composition Report in PDF Format
9.2. Policy Violations Section of a Application Composition Report in PDF Format
9.3. Security Issues Section of a Application Composition Report in PDF Format
9.4. License Analysis Section of a Application Composition Report in PDF Format
9.5. Components Section of a Application Composition Report in PDF Format
10.1. Trending Report Overview
10.2. Running the Trending Report
10.3. Policy and Application Summary
10.4. Threat Levels
10.5. Highest Risk Applications
10.6. Violation Summary by Policy Type
10.7. Violation Summary by Policy
10.8. Top Violators
10.9. Partial Matches