Discover how Dynatrace can help you strengthen your applications' security:
Dynatrace Runtime Vulnerability Analytics (RVA): Identify critical vulnerabilities instantly with automated risk and impact assessments, thanks to in-depth analysis of data access paths and production execution.
Dynatrace Runtime Application Protection (RAP): Defend your applications in real time by detecting and blocking attacks through advanced code-level insights and transaction analysis.
Any supported version of Dynatrace. Review the release notes for currently supported versions.
For Application Security to work properly, make sure deep monitoring is enabled in Settings > Processes and containers > Process group monitoring.
For .NET and Go technologies, for which automatic deep monitoring is disabled, you need to manually enable deep monitoring on each host. For more information, see Process deep monitoring.
Dynatrace detects third-party vulnerabilities in the following technologies.
For Go and .NET technologies, you need to manually enable deep monitoring on each host. For details, see Prerequisites.
Java on z/OS is currently not supported.
Using Webpack or other bundlers might have an impact on automatic vulnerability detection. This is because the software components cannot be detected, as they are hidden behind the bundler configuration and not available at runtime. Only packages that are deployed as external packages can be detected and reported. For details, see Node.js: Limitations.
Dynatrace Application Security is licensed based on the consumption of GiB-hours if you're using the Dynatrace Platform Subscription (DPS) licensing model, or Application Security units (ASUs) if you're using the Dynatrace classic licensing.
To get started with Dynatrace Application Security, follow the instructions below.
To activate Application Security, contact a Dynatrace product expert via live chat.
You need to assign the Security admin group to users who will be allowed to view and manage
To assign Security admin permission
To add an existing user to the group
For more information on user permissions, see Manage user groups and permissions.
optional
By default, once you enable the Security admin group, users can both view and manage vulnerabilities. To restrict the access level to view-only for specific users, so they can view vulnerabilities but not manage them (cannot change their status), you have two options:
To restrict the access of an existing group at the environment or management zone level