Jagamisviis:


Onboarding and installing

Note

Effective December 31, 2022, the Microsoft Security Code Analysis (MSCA) extension is retired. MSCA is replaced by the Microsoft Security DevOps Azure DevOps extension. Follow the instructions in Configure to install and configure the extension.

Prerequisites to getting started with Microsoft Security Code Analysis:

  • An eligible Microsoft Unified Support offering, as detailed in the following section.
  • An Azure DevOps organization.
  • Permission to install extensions to the Azure DevOps organization.
  • Source code that can be synced to a cloud-hosted Azure DevOps pipeline.

Onboarding the Microsoft Security Code Analysis extension

Interested in purchasing the Microsoft Security Code Analysis extension?

If you have one of the following support offerings, contact your Technical Account Manager to purchase or swap existing hours to get access to the extension:

  • Unified Support Advanced tier
  • Unified Support Performance tier
  • Premier Support for Developers
  • Premier Support for Partners
  • Premier Support for Enterprise

If you do not have one of the mentioned above support agreements, you can purchase the extension from one of our Partners.

Next Steps:

If you meet the above qualifications, contact a partner from the below list to purchase the Microsoft Security Code Analysis extension. Otherwise, contact Microsoft Security Code Analysis Support.

Partners:

  • Zones – Contact Details: cloudsupport@zones.com
  • Wortell – Contact Details: info@wortell.nl
  • Logicalis – Contact Details: logicalisleads@us.logicalis.com

Become a Partner

The Microsoft Security Code Analysis team is looking to onboard partners with a Premier Support for Partners agreement. Partners will help empower Azure DevOps customers to develop more securely by selling the extension to customers who wish to purchase it, but don’t have an Enterprise Support agreement with Microsoft. Interested partners can register here.

Installing the Microsoft Security Code Analysis extension

  1. After the extension is shared with your Azure DevOps organization, go to your Azure DevOps organization page. An example URL for such a page is https://dev.azure.com/contoso.
  2. Select the shopping bag icon in the upper-right corner next to your name, then select Manage extensions.
  3. Select Shared.
  4. Select the Microsoft Security Code Analysis extension, select install.
  5. From the drop-down list, choose the Azure DevOps organization to install the extension on.
  6. Select Install. After installation is complete, you can start using the extension.

Note

Even if you don't have access for installing the extension, continue with the installation steps. You can request access from your Azure DevOps organization admin during the installation process.

After you install the extension, the secure development build tasks are visible and available to add to your Azure Pipelines.

Adding specific build tasks to your Azure DevOps pipeline

  1. From your Azure DevOps organization, open your team project.
  2. Select Pipelines > Builds.
  3. Select the pipeline into which you want to add the extension build tasks:
    • New pipeline: Select New and follow the steps detailed to create a new pipeline.
    • Edit pipeline: Select an existing pipeline and then select Edit to begin editing the pipeline.
  4. Select + and go to the Add Tasks pane.
  5. From either the list or by using the search box, find the build task you want to add. Select Add.
  6. Specify the parameters needed for the task.
  7. Queue a new build.

    Note

    File and folder paths are relative to the root of your source repository. If you specify the output files and folders as parameters, they are replaced with the common location that we have defined on the build agent.

Tip

  • To run an analysis after your build, place the Microsoft Security Code Analysis build tasks after the Publish Build Artifacts step of your build. That way, your build can finish and post results before running static analysis tools.
  • Always select Continue on Error for secure-development build tasks. Even if one tool fails, the others can run. There are no interdependencies among tools.
  • Microsoft Security Code Analysis build tasks fail only if a tool fails to run successfully. But they succeed even if a tool identifies issues in the code. By using the Post-Analysis build task, you can configure your build to fail when a tool identifies issues in the code.
  • Some Azure DevOps build tasks are not supported when run via a release pipeline. More specifically, Azure DevOps doesn't support tasks that publish artifacts from within a release pipeline.
  • For a list of predefined variables in Azure DevOps Team Build that you can specify as parameters, see Azure DevOps Build Variables.

Next steps

For more information about configuring the build tasks, see our Configuration guide or YAML Configuration guide.

If you have more questions about the extension and the tools offered, check out our FAQ page.