Application Settings: Proxy

To access this feature, click Edit > Application Settings and then select Proxy Settings.

Fortify WebInspect Web services are used for update and support communications. Configure how these services are accessed in the Proxy Settings.

Not Using a Proxy Server

If you are not using a proxy server to access these services, select Direct Connection (proxy disabled).

Using a Proxy Server

If you are required to use a proxy server to access these services, select an option as described in the following table.

Option Description

Auto detect proxy settings

Use the Web Proxy Autodiscovery (WPAD) protocol to locate a proxy autoconfig file and configure the browser's Web proxy settings.

Use System Proxy settings

Import your proxy server information from the local machine.

Note: Electing to use system proxy settings does not guarantee that you will access the Internet through a proxy server. If the Internet Explorer setting "Use a proxy server for your LAN" is not selected, then a proxy will not be used.

Use Firefox proxy settings

Import your proxy server information from Firefox.

Note: Electing to use Firefox proxy settings does not guarantee that you will access the Internet through a proxy server. If the Firefox browser connection settings are configured for "No proxy," then a proxy will not be used.

Configure a proxy using a PAC file

Load proxy settings from a Proxy Automatic Configuration (PAC) file in the location you specify in the URL box.

Explicitly configure proxy

Configure a proxy by entering the requested information. See Configuring a Proxy in this topic.

Configuring a Proxy

To configure a proxy:

  1. In the Server box, type the URL or IP address of your proxy server, followed (in the Port box) by the port number (for example, 8080).

  2. From the Type list, select a protocol for handling TCP traffic through a proxy server: SOCKS4, SOCKS5, or standard.

    Important! Smart Update is not available if you use a SOCKS4 or SOCKS5 proxy server configuration. Smart Update is available only when using a standard proxy server.

  3. If authentication is required, select a type from the Authentication list. Options are:

    • Automatic

      Note: Automatic detection slows the scanning process. If you know and specify one of the other authentication methods, scanning performance is noticeably improved.

    • Digest

    • HTTP Basic

    • NT LAN Manager (NTLM)

    • Kerberos

    • Negotiate

  4. If your proxy server requires authentication, enter the qualifying user name and password.

See Also

Application Settings: Database

Application Settings: Directories

Application Settings: General

Application Settings: License

Application Settings: Logging

Application Settings: Micro Focus ALM

Application Settings: Override SQL Database Settings

Application Settings: Reports

Application Settings: Run as a Sensor

Application Settings: Server Profiler

Application Settings: Smart Update

Application Settings: Step Mode

Application Settings: Support Channel

Application Settings: Telemetry

Application Settings: Two-Factor Authentication