Runtime Application Protection monitoring rules

Dynatrace Runtime Application Protection rules allow you to

Define specific attack control rules

  1. Go to Settings > Application security > Application Protection > Monitoring rules.

  2. Select Add new rule.

  3. optional Name your rule (if not, a name will be assigned to it automatically once you create the rule, based on your criteria).

  4. For Attack control, specify how to control an attack that matches the rule criteria:

    • Off; incoming attacks NOT detected or blocked.
    • Monitor; incoming attacks detected only.
    • Block; incoming attacks detected and blocked.
  5. For Attack type, select the attack type to which current configuration applies.

  6. optional Select Add new condition to add one or more conditions to your rule.

    • If you don't add any condition, the rule applies to all processes.
    • If you add multiple conditions, all of them have to apply for the rule to take effect. To check if a rule applies, select Preview matching process group instances. This lists process group instances that currently match the criteria.

    Example conditions:

    example conditions attacks

  7. Select Save changes.

  8. Restart processes.

You can edit, disable, enable, or remove rules at any time.

Define exception rules

Based on the source IP of an attack or on an attack pattern, you can create an exception monitoring rule for the attack.

  1. Go to Settings and select Application security > Application Protection > Allowlist.

  2. Select Add new exception rule.

  3. Enter the Source IP (IPv4 or IPv6 address) of the attack for which you want to create an exception. IP ranges can be defined via CIDR notation.

  4. optional Enter an Attack pattern. An attack pattern can be any string an attacker uses in the malicious payload of the attack.

    Example patterns:

    • OR 1=1 -- 0
    • admin'--
    • ; DROP members--
    • ; cat /etc/passwd
  5. Specify how to control an attack matching the criteria:

    • Off; incoming attacks NOT detected or blocked. – Don't monitor (ignore) the IP address.
    • Monitor; incoming attacks detected only. – Monitor the IP address, but don't block it.
  6. Select Save changes.

You can edit, disable, enable, or remove rules at any time.

FAQ