Sonatype

×

Lesson Tag: Lesson

Lesson 2 Title Copy

By the end of this lesson, you will be able to: Objective Statement One Objective Statement Two Objective Statement Three <Heading Title> Content for heading ^^^ <Heading Title> Content for heading ^^^ Add and remove as needed Review this video to…

Lesson 1 Title Copy

Lesson 1 Overview By the end this lesson, you will be able to: Objective Statement One Objective Statement Two Objective Statement Three <Heading Title> Content for heading ^^^ <Heading Title> Content for heading ^^^ Add and remove as needed Review this video to …

Lesson 4 Title IQ102

By the end of this lesson, you will be able to: Objective Statement One Objective Statement Two Objective Statement Three Add / Remove as needed <Heading Title> Content for heading ^^^ <Heading Title> Content for heading ^^^ add and remove as needed Review this video to…

Lesson 3 Title IQ102

By the end of this lesson, you will be able to: Objective Statement One Objective Statement Two Objective Statement Three <Heading Title> Content for heading ^^^ <Heading Title> Content for heading ^^^ Add and remove as needed Review this video to …

Inspecting Component Details

Objectives By the end of this lesson, you will be able to: Review policy violations. Analyze license types and risks of components in your applications. Analyze security risks of components of components in your applications. Policy Violation Details From the Component Info tab, there is a View Details button. Selecting this button takes you to …

Inspecting Component Details Read More »

Understanding the Evaluation Results

Getting Started Once you have your plugin installed and configured, you will select the application you wish to report on, and apply any policy in the IQ Server to your application. From there, the Build Report is displayed. When you click on a component, the Component Info tab is displayed. More information and step-by-step directions …

Understanding the Evaluation Results Read More »

Hash Algorithms

The hash algorithm is used to uniquely identify specific markers of the analyzed code, resulting in 1 of 3 matches. Those are: Exact matches Similar matches Unknown matches Each of these are defined below. Exact Match The exact match occurs when an exact match of the component is found. This occurs when the hash that …

Hash Algorithms Read More »

Lesson 1 Summary

Lesson 1 Summary Congratulations! You have completed Lesson 1. You are now able to: Articulate the importance of remediation. Identify the difference between Policy and Security violations. Detect when a violation has occurred. Determine the steps to remediate risk.

Summary – Lesson 3

You have completed Lesson 3.  You are now able to: Define policies in Nexus IQ. Create a policy hierarchy. Articulate how policy inheritance operates in Nexus IQ.