# Rules and languages

The Sonar rules catalog is the entry point where you can discover all the existing rules. While running an analysis, SonarQube for IDE raises an issue every time a piece of code breaks a coding rule. Software quality classification and severity show the impact of the issue on your code. To see a full list of Sonar rules, check the **Rules** page of your SonarQube Server instance or in your SonarQube Cloud organization.

See the [software-qualities](https://docs.sonarsource.com/sonarqube-for-eclipse/using/software-qualities "mention") page for more information about these classifications.

## Overview <a href="#overview" id="overview"></a>

SonarQube for Eclipse provides analysis for several languages. Support for your language may vary depending on the SonarQube for Eclipse version you’re running.

![r](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) **Supported out of the box**: SonarQube for IDE automatically checks your code in these languages and formats.\
![a](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) **Connected mode required**: Running in [connected-mode](https://docs.sonarsource.com/sonarqube-for-eclipse/connect-your-ide/connected-mode "mention") with SonarQube (Server, Cloud) unlocks analysis for these languages and formats.

| Language                |                                                                                                                                                                                                                                         |
| ----------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| Abap rules              | ![a](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) |
| Apex rules              | ![a](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) |
| C rules                 | ![a](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) |
| C++ rules               | ![a](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) |
| COBOL rules             | ![a](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) |
| CSS rules               | ![r](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| HTML rules              | ![r](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| Java rules              | ![r](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| JavaScript rules        | ![r](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| JCL rules               | ![a](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) |
| Kotlin rules            | ![a](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) |
| PHP rules               | ![r](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| PL/I rules              | ![a](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) |
| PL/SQL rules            | ![a](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) |
| Python rules            | ![r](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| RPG rules               | ![a](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) |
| Ruby rules              | ![a](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) |
| Scala rules             | ![a](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) |
| Secrets detection rules | ![r](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| T-SQL rules             | ![a](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-0e61a2b4086c8ca18ff5a1f1149830f9af490ee4%2Fc6494882b26c39af441c3a02912bee5100b24640.svg?alt=media) |
| TypeScript rules        | ![r](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |
| XML rules               | ![r](https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-b053d5807e248e66d72264a9977f12d826d8087f%2F94172d1aa3cd9380d2f9fddf2e6a8cc7380da439.svg?alt=media) |

The full list of available rules can be found in the Eclipse settings menu. See the article below about [#using-sonar-rules](#using-sonar-rules "mention") for details. Open the [#supported-language-version](#supported-language-version "mention") expandable to learn how to see which versions are supported for a given language.

<details>

<summary>Supported language version</summary>

SonarQube for Eclipse provides analysis for several languages. Support for your language may vary depending on the SonarQube for Eclipse version you’re running.

For language-specific properties and supported language versions, refer to the relevant language pages in the SonarQube (Server, Cloud) or SonarQube Community Build docs directly; the same Sonar language analyzers are used by SonarQube for Eclipse.

* [Languages](https://app.gitbook.com/s/LWhbesChsC4Yd1BbhHhS/analyzing-source-code/languages "mention") in SonarQube Server
* [Languages](https://app.gitbook.com/s/B4UT2GNiZKjtxFtcFAL7/analyzing-source-code/languages "mention") in SonarQube Cloud
* [Languages](https://app.gitbook.com/s/bqrfLGeD0Y9vE5l9Le42/analyzing-source-code/languages "mention") in in SonarQube Community Build

</details>

There are commercial-level rules available in SonarQube Cloud (all plans) and SonarQube Server. For these rules to appear in SonarQube for IDE, it must be in connected mode. See [#commercial-level-rules](#commercial-level-rules "mention") for more information.

For more details about languages and new features under consideration for the Eclipse IDE, you can refer to the [SonarQube for IDE roadmap](https://portal.productboard.com/sonarsource/4-sonarqube-for-ide/tabs/8-under-consideration) where we list all of our coming soon and newly released features.

## Sonar Rule Descriptions <a href="#sonar-rule-descriptions" id="sonar-rule-descriptions"></a>

The **SonarQube Rule Descriptions** view is usually your first step in identifying why you have an issue. Right-clicking on any issue in a SonarQube for Eclipse view, or exposing the tooltip and selecting **Open description of rule…** in the code editor will open the **SonarQube Rule Descriptions** view.

The Rule Descriptions include information about why this causes an issue and noncompliant/compliant code snippets are usually offered. More serious issues such as security hotspots and injection vulnerabilities often include information about why it’s an issue and what is the potential impact.

<div align="left"><figure><img src="https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-346bb2aa638257c185adae5648ea5a45363ae5a1%2Fc81f8e9bbc5f1b048a93611535d35dad350a2d6e.png?alt=media" alt="The SonarQube Rule Description view gives you information to help you fix your issue."><figcaption></figcaption></figure></div>

SonarQube for Eclipse supports syntax highlighting; its availability is dependent on the Eclipse version and plugins you have installed; note that [JDT](https://www.eclipse.org/jdt/) is required for Java syntax highlighting. Currently, syntax highlighting for Java and C / C++ languages are available.

Syntax highlighting is not available for languages accessed with external plugins, but an extension point is provided to plugin developers. More information on extension points will be coming soon…

### Understanding issues in your IDE <a href="#understanding-issues-in-your-ide" id="understanding-issues-in-your-ide"></a>

An issue’s coding attribute, software qualities, and severity are presented to you when opening the **SonarQube** **Rule Description** view. Below the rule title, you will find the coding attributes that highlight an issue’s classification. Check the [glossary](https://docs.sonarsource.com/sonarqube-for-eclipse/resources/glossary "mention") page for details about coding attributes, and the [software-qualities](https://docs.sonarsource.com/sonarqube-for-eclipse/using/software-qualities "mention") page to better understand software qualities for more details about how they help classify your issue.

<div align="left"><figure><img src="https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2Fgit-blob-d302808f4affcc349ae9778e05ee42bb843cd728%2Faabcaf41338e07fbae7bc344a12ed3a86c665e32.png?alt=media" alt="Coding attributes and software qualities appear in the SonarQube Rule Description view. Your actual view may be different because when running in connected mode with SonarQube Server, the server&#x27;s mode is respected." width="563"><figcaption></figcaption></figure></div>

**When in connected mode**

If you’re running SonarQube for Eclipse while in connected mode *with SonarQube Server or SonarQube Community Build*, your view will change according to the server settings. Standard Experience mode encompasses the use of rule types such as bugs, code smells, and vulnerabilities. Alternatively, if SonarQube Server is set to Multi-Quality Rule mode, you will more accurately represent the impact an issue has on all software qualities.

Please see the pages about the MQR mode and Standard Experience for detailed information about the available rule modes for your instance:

* [Choosing a mode for your instance](https://app.gitbook.com/s/LWhbesChsC4Yd1BbhHhS/instance-administration/analysis-functions/instance-mode "mention") in SonarQube Server
* [Choosing a mode for your instance](https://app.gitbook.com/s/bqrfLGeD0Y9vE5l9Le42/instance-administration/analysis-functions/instance-mode "mention") in SonarQube Community Build

## Language-specific requirements <a href="#language-specific-requirements" id="language-specific-requirements"></a>

See the [#language-specific-requirements](https://docs.sonarsource.com/sonarqube-for-eclipse/getting-started/requirements#language-specific-requirements "mention") on the [requirements](https://docs.sonarsource.com/sonarqube-for-eclipse/getting-started/requirements "mention") page.

## Other rule types

<details>

<summary>DBD rules</summary>

Dataflow bugs are a set of *complex Python and Java bugs that are only detected when reviewing all feasible execution paths.* This type of issue can cause runtime errors and crashes in Python and Java. If you want to learn more, check out [our blog post](https://www.sonarsource.com/blog/sonarqube-99-lts-python-developers/#new-bugdetection-rules-track-dataflow-with-symbolic-execution) for a good explanation with an example.

Dataflow Bug Detection (DBD) rules for Python and Java are supported in [Commercial editions of SonarQube Server](https://www.sonarsource.com/products/sonarqube/downloads/) and by [SonarQube Cloud](https://www.sonarsource.com/products/sonarqube/cloud/). At this time, SonarQube for Eclipse supports DBD detection for Java and Python when running in connected mode with SonarQube Server Active Versions or SonarQube Cloud.

</details>

<details>

<summary>Injection vulnerabilities</summary>

Security vulnerabilities requiring taint engine analysis ([taint-vulnerabilities](https://docs.sonarsource.com/sonarqube-for-eclipse/using/taint-vulnerabilities "mention")) are only available in connected mode because SonarQube for IDE pulls them from SonarQube (Server, Cloud) following a project analysis.

To browse injection vulnerabilities in SonarQube for Eclipse, set up [connected-mode](https://docs.sonarsource.com/sonarqube-for-eclipse/connect-your-ide/connected-mode "mention") with your SonarQube Server or SonarQube Cloud instance. Once a [#project-binding](https://docs.sonarsource.com/sonarqube-for-eclipse/connect-your-ide/setup#project-binding "mention") is configured, SonarQube for Eclipse will synchronize with the SonarQube (Server, Cloud) to report the detected injection vulnerabilities.

More information about security-related rules is available in the server documentation:

* [Security-related rules](https://docs.sonarsource.com/sonarqube-server/2025.4/user-guide/rules/security-related-rules) in SonarQube Server
* [Security-related rules](https://docs.sonarsource.com/sonarqube-cloud/digging-deeper/security-related-rules) in SonarQube Cloud

</details>

<details>

<summary>Security hotspots</summary>

SonarQube for Eclipse does not detect security hotspots on its own, and does not report the hotspots found by SonarQube Cloud. However, SonarQube’s **Open in IDE** feature will open one hotspot at a time in Eclipse and show them in the **SonarQube Security Hotspots** view window.

Please see the SonarQube for Eclipse documentation on [security-hotspots](https://docs.sonarsource.com/sonarqube-for-eclipse/using/security-hotspots "mention") for more details, and the Investigating issues page to learn about [#opening-issues-in-the-ide](https://docs.sonarsource.com/sonarqube-for-eclipse/investigating-issues#opening-issues-in-the-ide "mention") using the **Open in IDE** feature.

</details>

<details>

<summary>Secrets detection</summary>

Secrets are pieces of user-specific or system-level credentials that should be protected and accessible to legitimate users only. SonarQube for Eclipse detects exposed Secrets in your source code and language-agnostic config files. When running in connected mode, the SonarQube (Server, Cloud) or SonarQube Community Build quality profiles are applied to locally detected Secrets.

</details>

<details>

<summary>Commercial-level rules</summary>

There are commercial-level rules that are only available in SonarQube Cloud (all plans) and SonarQube Server. The list of Sonar rules available found on the **Rules** page of your SonarQube Server Developer, Enterprise, and Data Center editions or in your SonarQube Cloud organization may be different than what you see in the IDE.

In order for these rules to appear in SonarQube for IDE, you must be running in [connected-mode](https://docs.sonarsource.com/sonarqube-for-eclipse/connect-your-ide/connected-mode "mention"). In the standalone mode these rules are not visible.

Commercial-level rules are not available in SonarQube for Community Build.

</details>

## Using Sonar rules

When not running in connected mode (also known as *standalone mode*), all Sonar rules for your language can be configured in the IDE. In addition, some Sonar rules have parameters that you can modify. Here are a few reasons you might want to edit a rule locally:

* Disable a rule that is enabled by default. Maybe the rule doesn't apply to your specific project. See [#rule-selection](#rule-selection "mention") for more information.
* Enable a rule that is disabled by default. By reviewing which rules are disabled, you might notice that some rules could be useful in the context of your project. See [#rule-selection](#rule-selection "mention") for more information.
* To improve a rule. In some cases rules have parameters. For example, regarding cognitive complexity, you can customize the threshold at which the rule will raise issues. See [#edit-rules](#edit-rules "mention") for more information.

### Rule selection <a href="#rule-selection" id="rule-selection"></a>

The full list of available rules is found by navigating to the Eclipse **Settings…** > **SonarQube** > **Rules Configuration** page in the **Preferences** window. There, Sonar Rules can individually be toggled on or off while running SonarQube for IDE in standalone mode; simply select or deselect the appropriate checkbox. See the screenshot below in [#edit-rules](#edit-rules "mention") to understand what it looks like in the settings window.

When your project is bound to SonarQube Server or SonarQube Cloud using [connected-mode](https://docs.sonarsource.com/sonarqube-for-eclipse/connect-your-ide/connected-mode "mention"), the rule set is managed on the server side as defined by the quality profile. See [#applying-rules-while-in-connected-mode](#applying-rules-while-in-connected-mode "mention"), for details.

## Edit rules

To edit a rule in SonarQube for Eclipse, navigate to the Eclipse **Settings…** > **SonarQube** > **Rules Configuration** page and select the rule you want to edit. Select or deselect any rule in the list to enable or disable it. If a rule has options, you’ll see them at the bottom of the rule description.

1. Navigate to the **Rules Configuration** tab.
2. Set your visibility filter, if desired, and select the rule you want to modify.
3. Look for **Parameters** at the bottom of the rule description. In this example, `giraffes` are added to the list of at-rules to ignore in rule css:S4662.

<div align="left"><figure><img src="https://231328848-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FkadXEH8HkykK7lKaDvVq%2Fuploads%2FPieIhHqhkSYVijt9W3ar%2Fsq-eclipse-edit-rules.png?alt=media&#x26;token=2db34b65-725a-4958-b011-fc9f260bdaaa" alt="Sonar rules are accessible in the SonarQube settings." width="563"><figcaption></figcaption></figure></div>

{% hint style="info" %}
When a project is bound to a SonarQube (Server, Cloud) or SonarQube Community Build, the configuration in this UI location is ignored. In this case, the rules configuration from the server applies. For more information, see the server documentation about quality profiles:

* [Managing quality profiles](https://app.gitbook.com/s/B4UT2GNiZKjtxFtcFAL7/standards/managing-quality-profiles "mention") in SonarQube Cloud
* [Managing quality profiles](https://app.gitbook.com/s/LWhbesChsC4Yd1BbhHhS/quality-standards-administration/managing-quality-profiles "mention") in SonarQube Server
  {% endhint %}

## **Unsupported rules**

Some rules are simply too advanced to run locally, in SonarQube for IDE. Because some rules report issues at the project level, apply to the architecture of your code base, or require extensive resources to analyze, they are not included when SonarQube for IDE runs an analysis. Unsupported rule types include architecture, injection vulnerabilities, and some advanced bug detection rules.

However, these advanced issues will be reported in the IDE when you are running in connected mode with SonarQube (Server, Cloud) or SonarQube Community Build. See these links for more information:

* Sonar [Architecture](https://app.gitbook.com/s/B4UT2GNiZKjtxFtcFAL7/architecture "mention") in SonarQube Cloud
* [taint-vulnerabilities](https://docs.sonarsource.com/sonarqube-for-eclipse/using/taint-vulnerabilities "mention") in SonarQube for VS Code
* [#commercial-level-rules](#commercial-level-rules "mention") and [#dbd-rules](#dbd-rules "mention")

## Rules while in Connected Mode <a href="#applying-rules-while-in-connected-mode" id="applying-rules-while-in-connected-mode"></a>

Connected Mode syncs your SonarQube Server or SonarQube Cloud Quality Profile with the local analysis to suppress issues reported in the IDE. Therefore, when running in Connected Mode, SonarQube for Eclipse will ignore rule settings that are defined locally. See the [connected-mode](https://docs.sonarsource.com/sonarqube-for-eclipse/connect-your-ide/connected-mode "mention") page for more information about running connected mode and the [#benefits](https://docs.sonarsource.com/sonarqube-for-eclipse/connect-your-ide/connected-mode#benefits "mention") it brings when working in teams.

### Edit rules in connected mode

If you’re running in [connected-mode](https://docs.sonarsource.com/sonarqube-for-eclipse/connect-your-ide/connected-mode "mention") with SonarQube (Server, Cloud) or SonarQube Community Build, you can share customized active rules with your team because you’ll all be using the same quality profile to share rule sets. Please see the relevant instructions for the server you are connecting to:

* [Understanding quality profiles](https://app.gitbook.com/s/B4UT2GNiZKjtxFtcFAL7/standards/managing-quality-profiles/understanding-quality-profiles "mention") in SonarQube Cloud
* [Understanding quality profiles](https://app.gitbook.com/s/LWhbesChsC4Yd1BbhHhS/quality-standards-administration/managing-quality-profiles/understanding-quality-profiles "mention") in SonarQube Server
* [Understanding quality profiles](https://app.gitbook.com/s/bqrfLGeD0Y9vE5l9Le42/quality-standards-administration/managing-quality-profiles/understanding-quality-profiles "mention") in SonarQube Community Build
