A User Guide to Reports in Sonatype CLM
List of Figures
- 2.1. Summary Tab of the Application Composition Report
- 2.2. Reporting Area
- 2.3. Application Area
- 2.4. The Four Tabs
- 2.5. Security Issues Summary
- 2.6. License Analysis Summary
- 2.7. Policy Tab
- 2.8. Security Issues Tab
- 2.9. License Analysis Tab
- 2.10. Application Composition Report Buttons For Printing and Reevaluation
- 2.11. Component Information Panel CIP Example
- 2.12. CIP, Policy Section
- 2.13. CIP, Similar Section
- 2.14. CIP, Occurrences Section
- 2.15. CIP, Licenses Section
- 2.16. CIP, Edit Vulnerabilities Section
- 2.17. CIP, Labels Section
- 2.18. CIP, Claim Component
- 2.19. CIP, Audit
- 3.1. Security Issues Tab
- 3.2. Component Information Panel (CIP)
- 3.3. Editing Vulnerabilities via CIP
- 3.4. Editing Multiple Vulnerabilities
- 3.5. Example of Component with Security Issue, but No Policy Violation
- 4.1. License Analysis Tab
- 4.2. The Default License Threat Groups
- 4.3. Component Information Panel (CIP)
- 4.4. Editing a Single License, Using Select Option
- 5.1. Unknown Component
- 5.2. Filter and Matching Options
- 5.3. Proprietary Component
- 5.4. Proprietary Packages Configuration via the Sonatype CLM Server
- 5.5. Claim a Component
- 5.6. Claimed Component Indicator
- 6.1. Labels at the CLM Server Level
- 6.2. Assigning a Label
- 7.1. Waiver Visualization on Policy Tab
- 7.2. Waiver Button
- 7.3. Options to Apply Waiver to the Application or the Entire Organization
- 7.4. View and Remove Waivers
- 8.1. Application Composition Report Buttons For Printing and Reevaluation
- 9.1. Summary Section of a Application Composition Report in PDF Format
- 9.2. Policy Violations Section of a Application Composition Report in PDF Format
- 9.3. Security Issues Section of a Application Composition Report in PDF Format
- 9.4. License Analysis Section of a Application Composition Report in PDF Format
- 9.5. Components Section of a Application Composition Report in PDF Format
- 10.1. Trending Report Overview
- 10.2. Running the Trending Report
- 10.3. Policy and Application Summary
- 10.4. Threat Levels
- 10.5. Highest Risk Applications
- 10.6. Violation Summary by Policy Type
- 10.7. Violation Summary by Policy
- 10.8. Top Violators
- 10.9. Partial Matches