Report and log commands (Linux™ and macOS)
Use report commands to generate scan logs and reports.
appscan.sh get_logsappscan.sh get_report
appscan.sh get_logs
Syntax:
appscan.sh get_logs -d <file_path> -i <scan_id>
Description:
This command generates a scan log. The default files in the
resulting logs.zip file are:
analyzer.logappscan-config.xmlSASTAgent.logscan.manifestscan.manifest.json
Required options:
-i: Specify-i <scan_id>, where<scan_id>is the scan ID for which you are creating a report.
Optional flags/settings:
-d: Specify-d <file_path>, where<file_path>is the fully qualified path of the logs file destination. If this flag is not specified, AppScan 360° downloads the log file to the current working directory.
Tip: Options can be used in any order.
appscan.sh
get_report
Syntax:
appscan.sh get_report -d <file_path> -f <format> -i <target_id> -locale <locale> -rt <reg_type> -s <scope> -t <type> -title <title> -applyPolicies
Description:
This command queues a report job for a specific application or scan, then downloads that report once the job is complete.
Required options:
-f: Specify-f <format>, where<format>is the file format of the requested report. Valid options areHTML,CSV, andXML.Note:PDFreports are not available for AppScan 360°.-i: Specify-i <target_id>, where<target_id>is the scan or application ID for which you are creating a report.-s: Specify-s <scope>, where<scope>is the scope of the report to create. Valid options areapplicationorscan.-t: Specify-t <type>, where<type>is the type of report to create. Valid options areissues,security,regulation, orlicenses.
Optional flags/settings:
-d: Specify-d <file_path>, where<file_path>is the fully qualified path of the report file destination. If this flag is not specified, the report file is downloaded to the current working directory.-ds: Disable the "Summary" section within the generated report. By default, the "Summary" section is included unless this flag is used.-dtoc: Disable the "Table of Contents" section within the generated report. By default, the "Table of Contents" (including fix groups) is included unless this flag is used.-locale: Specify-locale <locale>, where<locale>is the geographic locale of the report. If this flag is not specified, thenl_enlocale is applied by default.-rt: Specify-rt <reg_type>, where<reg_type>is the full name of the specific regulation report type to be generated. A valid regulation report name is required to use this flag. The flag values are case-sensitive.Regulation report -rtFlag valueEU General Data Protection Regulation (GDPR) EuGdpr_2016PCI Compliance PCIUS DISA's Application Security and Development STIG. V5R1 DisaStigUS Electronic Funds and Transfer Act (EFTA) EftaCANADA Freedom of Information and Protection of Privacy Act (FIPPA) FippaUS Health Insurance Portability and Accountability Act (HIPAA) HipaaPayment Application Data Security Standard PadssUS Sarbanes-Oxley Act (SOX) SoxUS Federal Information Security Mgmt. Act (FISMA) FismaNIST Special Publication 800-53 NistOWASP Top 10 2017 OwaspTop10_2017CWE/SANS Top 25 Most Dangerous Errors Sans25OWASP Top 10 Mobile 2016 OwaspTop10Mobile_2016International Standard - ISO 27002 ISO27002International Standard - ISO 27001 ISO27001WASC Threat Classification v2.0 Wasc-title: Specify-title <title>, where<title>is the title of the report. If this flag is not specified, "AppScan Security Report" is applied by default.-applyPolicies: Using this flag applies all the application policies to the scan.
Tip: For all commands, options
can be used in any order.