You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security/develop/security-code-analysis-customize.md
+13-12Lines changed: 13 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Customize Microsoft Security Code Analysis tasks
3
3
titleSuffix: Azure
4
4
description: This article describes customizing the tasks in the Microsoft Security Code Analysis extension
5
-
author: vharindra
5
+
author: sukhans
6
6
manager: sukhans
7
7
ms.author: terrylan
8
8
ms.date: 07/31/2019
@@ -37,7 +37,7 @@ Windows Defender uses the Windows Update client to download and install signatur
37
37
38
38
For more information on Windows Update errors and their mitigation, see [Windows Update error codes by component](https://docs.microsoft.com/windows/deployment/update/windows-update-error-reference) and the TechNet article [Windows Update Agent - Error Codes](https://social.technet.microsoft.com/wiki/contents/articles/15260.windows-update-agent-error-codes.aspx).
39
39
40
-
For information about YAML configuration for this task, please check our [Anti-Malware YAML options](yaml-configuration.md#anti-malware-scanner-task)
40
+
For information about YAML configuration for this task, check our [Anti-Malware YAML options](yaml-configuration.md#anti-malware-scanner-task)
41
41
42
42
## BinSkim task
43
43
@@ -78,7 +78,7 @@ Details of task configuration are shown in the following screenshot and list.
78
78
79
79
For more information on BinSkim command-line arguments, rules by ID, or exit codes, see the [BinSkim User Guide](https://github.com/Microsoft/binskim/blob/master/docs/UserGuide.md).
80
80
81
-
For information about YAML configuration for this task, please check our [BinSkim YAML options](yaml-configuration.md#binskim-task)
81
+
For information about YAML configuration for this task, check our [BinSkim YAML options](yaml-configuration.md#binskim-task)
82
82
83
83
## Credential Scanner task
84
84
@@ -87,7 +87,8 @@ Details of task configuration are shown in the following screenshot and list.
87
87

88
88
89
89
Available options include:
90
-
90
+
-**Display Name**: Name of the Azure DevOps Task. The default value is Run Credential Scanner
91
+
-**Tool Major Version**: Available values include **CredScan V2**, **CredScan V1**. We recommend customers to use the **CredScan V2** version.
91
92
-**Output Format**: Available values include **TSV**, **CSV**, **SARIF**, and **PREfast**.
92
93
-**Tool Version**: We recommend you select **Latest**.
93
94
-**Scan Folder**: The repository folder to be scanned.
@@ -101,7 +102,7 @@ Available options include:
101
102
-**Control Options** > **Run this task**: Specifies when the task will run. Select **Custom conditions** to specify more complex conditions.
102
103
-**Version**: The build task version within Azure DevOps. This option isn't frequently used.
103
104
104
-
For information about YAML configuration for this task, please check our [Credential Scanner YAML options](yaml-configuration.md#credential-scanner-task)
105
+
For information about YAML configuration for this task, check our [Credential Scanner YAML options](yaml-configuration.md#credential-scanner-task)
105
106
106
107
## Microsoft Security Risk Detection task
107
108
@@ -131,7 +132,7 @@ Details for configuring this task are shown in the following list. For any UI el
131
132
-**Test Driver Can Be Renamed**: Select this checkbox if the test driver executable file can be renamed and still work correctly.
132
133
-**The Fuzzing Application Runs as a Single OS Process**: Select this checkbox if the test driver runs under a single OS process. Clear it if the test driver spawns additional processes.
133
134
134
-
For information about YAML configuration for this task, please check our [Microsoft Security Risk Detection YAML options](yaml-configuration.md#microsoft-security-risk-detection-task)
135
+
For information about YAML configuration for this task, check our [Microsoft Security Risk Detection YAML options](yaml-configuration.md#microsoft-security-risk-detection-task)
135
136
136
137
## Roslyn Analyzers task
137
138
@@ -168,7 +169,7 @@ For additional resources for the Roslyn Analyzers task, check out [The Roslyn-ba
168
169
169
170
You can find the analyzer package installed and used by this build task on the NuGet page [Microsoft.CodeAnalysis.FxCopAnalyzers](https://www.nuget.org/packages/Microsoft.CodeAnalysis.FxCopAnalyzers).
170
171
171
-
For information about YAML configuration for this task, please check our [Roslyn Analyzers YAML options](yaml-configuration.md#roslyn-analyzers-task)
172
+
For information about YAML configuration for this task, check our [Roslyn Analyzers YAML options](yaml-configuration.md#roslyn-analyzers-task)
172
173
173
174
## TSLint task
174
175
@@ -177,7 +178,7 @@ For More information about TSLint, go to the [TSLint GitHub repo](https://github
177
178
>[!NOTE]
178
179
>As you might be aware, the [TSLint GitHub repo](https://github.com/palantir/tslint) home page says that TSLint will be deprecated sometime in 2019. Microsoft is investigating [ESLint](https://github.com/eslint/eslint) as an alternative task.
179
180
180
-
For information about YAML configuration for this task, please check our [TSLint YAML options](yaml-configuration.md#tslint-task)
181
+
For information about YAML configuration for this task, check our [TSLint YAML options](yaml-configuration.md#tslint-task)
181
182
182
183
## Publish Security Analysis Logs task
183
184
@@ -189,7 +190,7 @@ Details of task configuration are shown in the following screenshot and list.
189
190
-**Artifact Type**: Depending on your selection, you can publish logs to your Azure DevOps Server or to a shared file that is accessible to the build agent.
190
191
-**Tools**: You can choose to preserve logs for specific tools, or you can select **All Tools** to preserve all logs.
191
192
192
-
For information about YAML configuration for this task, please check our [Publish Security Logs YAML options](yaml-configuration.md#publish-security-analysis-logs-task)
193
+
For information about YAML configuration for this task, check our [Publish Security Logs YAML options](yaml-configuration.md#publish-security-analysis-logs-task)
193
194
194
195
## Security Report task
195
196
@@ -202,7 +203,7 @@ Details of Security Report configuration are shown in the following screenshot a
202
203
-**Advanced Options**: If there are no logs for one of the tools selected, you can choose to log a warning or an error. If you log an error, the task fails.
203
204
-**Base Logs Folder**: You can customize the base logs folder where logs are to be found. But this option is typically not used.
204
205
205
-
For information about YAML configuration for this task, please check our [Security report YAML options](yaml-configuration.md#security-report-task)
206
+
For information about YAML configuration for this task, check our [Security report YAML options](yaml-configuration.md#security-report-task)
206
207
207
208
## Post-Analysis task
208
209
@@ -214,10 +215,10 @@ Details of task configuration are shown in the following screenshot and list.
214
215
-**Report**: You can optionally write the results that are causing the build break. The results are written to the Azure DevOps console window and log file.
215
216
-**Advanced Options**: If there are no logs for one of the tools selected, you can choose to log a warning or an error. If you log an error, the task fails.
216
217
217
-
For information about YAML configuration for this task, please check our [Post Analysis YAML options](yaml-configuration.md#post-analysis-task)
218
+
For information about YAML configuration for this task, check our [Post Analysis YAML options](yaml-configuration.md#post-analysis-task)
218
219
219
220
## Next steps
220
221
221
222
For information about YAML based configuration, refer to our [YAML Configuration guide](yaml-configuration.md).
222
223
223
-
If you have further questions about the Security Code Analysis extension and the tools offered, check out [our FAQ page](security-code-analysis-faq.md).
224
+
If you have further questions about the Security Code Analysis extension and the tools offered, check out [our FAQ page](security-code-analysis-faq.md).
0 commit comments