System Requirements for Software Vulnerability Research

The Software Vulnerability Research User Interface will resize and adapt when being used on different devices. You can access the system from anywhere using any device, such as a smartphone or tablet.

To use the Software Vulnerability Research console, your system should meet the following requirements:

System Requirements

Requirement

Description

Monitor resolution

The minimum resolution required is 1280 x 1024.

Browser

The following browsers are supported:

Microsoft Edge
Apple Safari
Google Chrome
Microsoft Edge
Mozilla Firefox
Opera

Internet connection

Internet connection capable of connecting to https://app.flexerasoftware.com/ is required.

Allow Listed sites

The following addresses should be Allow-listed in the Firewall/Proxy configuration:

New CRL distribution URLs:
https://*.app.flexerasoftware.com
http://*.amazontrust.com

Software Vulnerability Research uses Amazon Certificate Authority for TLS security certificates. Amazon can change their certificate revocation list - crl - occasionally.

Amazon root certificates are trusted by default by most common browsers, including Google Chrome, Microsoft Internet Explorer and Microsoft Edge, Mozilla Firefox, and Apple Safari.

For the latest certificate revocation lists and firewall rules, refer to Amazon ACM documentation.

If you require explicit URLs then allow below URLs:
http://crt.r2m02.amazontrust.com/r2m02.cer
http://crl.r2m02.amazontrust.com/r2m02.crl
http://ocsp.r2m02.amazontrust.com

First-party cookie settings

First-party cookie settings should be set to at least Prompt (in Internet Explorer).

Session cookie settings

The option to allow session cookies should be selected.

PDF reader

A PDF reader is required.

Important:The listed required URLs are absolutely mandatory as they relate to Certificate Validation of the non-repudiated SSL certificates, which guarantee that communication between your network and the Cloud is not intercepted, redirected, or modified in any way by a third-party.

Important:The Software Vulnerability Research IPs are subject to change without notice, and you should not lock access to Software Vulnerability Research based on the current IP, but should rely on the SSL and certificate validation instead.