Get started

In the following, you'll learn how to navigate in Vulnerabilities to find the information you need to manage vulnerabilities easily.

Target audience

Vulnerabilities is dedicated to devsecops engineers.

Prerequisites

Permissions

For a list of permissions required, go to Dynatrace Hub , select Vulnerabilities, and display Technical information > User permissions.

Filter vulnerabilities

Select which information is to be displayed in the vulnerabilities table:

  1. Go to the Prioritization page.
  2. Select Add filter in the filter bar.
  3. Select the desired filters.

filter vulnerabilities

If the selected filter doesn't show in the vulnerabilities table, go to the column settings and make sure to add the corresponding column to the table.

To reset the filters to the default mode (open vulnerabilities), select .

Format table

Select which columns are to be displayed in the vulnerabilities table:

  1. Go to the Prioritization page.
  2. On the upper-right of the vulnerabilities table, select the column settings .
  3. Select the desired columns, then select Confirm.

format table

Sort columns

Select the order in which results in a column should be displayed:

  1. Go to the Prioritization page.
  2. Select a column title.
  3. Select Sort ascending or Sort descending.

sort columns

Peek at the relevant info

Take a look at the relevant information while browsing through the vulnerabilities table without navigating to the details page of a vulnerability.

  1. Go to the Prioritization page.
  2. Select on the left side of a vulnerability to expand the row.

peek at the relevant info

Dive into details

Explore the most essential data on the details page of a vulnerability. This provides you the context needed to analyze the impact and address remediation actions.

  1. Go to the Prioritization page.
  2. Select a vulnerability title.

vulnerability details

Next steps

Now that you know your way around Vulnerabilities , you can

Try Vulnerabilities and share your feedback to help us improve.

Additional resources

For a better understanding of key concepts used in Vulnerabilities , associated with use cases and frequently asked questions, see Concepts.