To fully automate the monitoring of your operating systems, processes, and network interfaces, Dynatrace requires privileged access to your operating system during both installation and operation.
OneAgent is tested extensively to ensure that it has minimal performance impact on your system and conforms to the highest security standards.
OneAgent requires admin privileges on Windows, for both installation and operation.
OneAgent installer requires admin privileges to:
OneAgent requires admin privileges to:
OneAgent performs the following changes to your system:
OneAgent installer modifies the following aspects of your system:
Starting with version 1.195, no user account is created to run OneAgent extensions. Instead, the NT AUTHORITY\SYSTEM
privileged system account is used. For more information, see OneAgent extension user.
The Dynatrace OneAgent
service is created.
The Dynatrace OneAgent program is registered with Windows Installer.
oneagentmon
driver is installed and OneAgentMon
device is created. It's required to enable automatic injection into processes.
Registry sub-trees are created:
HKEY_LOCAL_MACHINE\SOFTWARE\Dynatrace\OneAgent
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\oneagentmon
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dynatrace OneAgent
HKEY_LOCAL_MACHINE\SOFTWARE\Caphyon\Advanced Installer
Troubleshooting: Network Agent initialization failure on Windows
The Npcap
driver is installed with the /admin_only
flag set, which restricts Npcap's packet reading and writing to users with Administrator privileges only. Unprivileged users can't access Npcap's functionality on a monitored host. Note that WinPcap doesn't offer this restriction. For more information, see Customize OneAgent installation on Windows.
Make sure these Npcap and WinPcap operations are permitted in your system's security settings:
SYSTEM\CurrentControlSet\Services\npcap
SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\NpcapInst
SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WinPcapInst
and SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WinPcapInst
wpcap.dll
and packet.dll
located in C:\WINDOWS\system32\Npcap
/ C:\WINDOWS\system32\WinPcap
SYSTEM\CurrentControlSet\Control\Network\{Network-Service-GUID}
*OneAgents installer adds the following files to your system:
%PROGRAMFILES%\dynatrace\oneagent
. Note that you can change the location using the INSTALL_PATH parameter.C:\AI_RecycleBin
. The folder is deleted after the installation is complete.%PROGRAMDATA%\dynatrace\oneagent\runtime
.%PROGRAMDATA%\dynatrace\oneagent\config
.%PROGRAMDATA%\dynatrace\oneagent\datastorage
. Note that you can change the location of large runtime data using the DATA_STORAGE parameter.OneAgent downloads Security, System, and Application system logs from the last 14 days so that Dynatrace can diagnose issues that may be caused by conditions in your environment. Most often such issues are related to deep monitoring or automatic updates.
To revoke access to system logs, use the oneagentctl
command with the --set-system-logs-access-enabled
parameter set to false
.
For more information, see OneAgent configuration via command-line interface
The OneAgent directory structure contains globally writable directories (directories where the Everyone
user group can write, modify, or execute). Changing these permissions by users is not supported.
Such permissions on the selected set of directories are necessary for successful OneAgent injection into the processes on the monitored hosts. When OneAgent injects into a process, the code module responsible for injection runs in the context of the original injected process. Consequently, the users under which these processes are run need to be permitted to write into the OneAgent directory structure, which is the reason for the global write permissions that allow that.
Similarly, certain log files require global write permissions to allow applications running under various users to write to them.
We're aware that global read and write permissions on OneAgent directories get flagged by security scan heuristics, but we can assure you that they're fully secure.
Creator Owner
permission to limits access to files.The OneAgent installer is signed against one or more DigiCert root certificates. For regularly maintained systems, Windows verifies that the OneAgent installer has been published by a verified publisher.
If your Windows-based system has been offline since March 2021 or longer, Windows won't be able to verify the installer and the OneAgent installer publisher will appear as Unknown publisher when you attempt an installation or update. In such a case, you need to download the latest certificate from DigiCert root certificates and add it to your system. Among all the DigiCert certificates, the DigiCert Global Root G3
is mandatory for successful verification of the OneAgent installer.
Starting with OneAgent version 1.225, the installer is signed using the SHA-2 algorithm. Consequently, Windows 2008 R2 hosts are required to have SHA-2 code signing support installed. If you use Windows Update, the updates were offered to you automatically (KB4474419 and KB4490628). If, however, your Windows 2008 R2 system doesn't support verifying SHA-2 signed installers, OneAgent auto-update and installation won't work if Applocker
is configured to block unknown publishers and/or security warnings may be displayed. For more information, see the Microsoft 2019 SHA-2 Code Signing Support requirement for Windows and WSUS announcement.