Get started
In the following, you'll learn how to navigate in Vulnerabilities to find the information you need to manage vulnerabilities easily.
Target audience
Vulnerabilities is dedicated to devsecops engineers.
Prerequisites
Permissions
For a list of permissions required, go to Dynatrace Hub , select Vulnerabilities, and display Technical information > User permissions.
Navigate
Filter vulnerabilities
Select which information to display.
Format table
Select which columns to display.
Sort columns
Select the order in which to display results.
Peek at the relevant info
See vulnerability information while browsing results.
Dive into details
See vulnerability details and full context on a dedicated page.
Filter vulnerabilities
Select which information is to be displayed in the vulnerabilities table:
- Go to the Prioritization page.
- Select Add filter in the filter bar.
- Select the desired filters.
If the selected filter doesn't show in the vulnerabilities table, go to the column settings and make sure to add the corresponding column to the table.
To reset the filters to the default mode (open vulnerabilities), select .
Format table
Select which columns are to be displayed in the vulnerabilities table:
- Go to the Prioritization page.
- On the upper-right of the vulnerabilities table, select the column settings .
- Select the desired columns, then select Confirm.
Sort columns
Select the order in which results in a column should be displayed:
- Go to the Prioritization page.
- Select a column title.
- Select Sort ascending or Sort descending.
Peek at the relevant info
Take a look at the relevant information while browsing through the vulnerabilities table without navigating to the details page of a vulnerability.
- Go to the Prioritization page.
- Select on the left side of a vulnerability to expand the row.
Dive into details
Explore the most essential data on the details page of a vulnerability. This provides you the context needed to analyze the impact and address remediation actions.
- Go to the Prioritization page.
- Select a vulnerability title.
Next steps
Now that you know your way around Vulnerabilities , you can
Try Vulnerabilities and share your feedback to help us improve.
Additional resources
For a better understanding of key concepts used in Vulnerabilities , associated with use cases and frequently asked questions, see Concepts.