In the following, you'll learn how to navigate in Vulnerabilities to find the information you need to manage vulnerabilities easily.
Vulnerabilities is dedicated to devsecops engineers.
An admin needs to assign the following IAM policies to the group of users that will access the vulnerability-service
:
Read Entities
Read Security Events
Admin User
, Pro User
, Standard User
(for details, see Default policies.)See below for instructions.
In Account Management, select Identity & access management > Group Management.
Select Group to create the group.
Enter a name (for example, vulnerability-service
) and a description (for example, vulnerability-service group
), then select Create.
Once the group is created, you can view details and assign policies.
Select Permission.
In the drop-down menu of Permission name, select and save the three required policies, one at a time.
Once added, the three policies should be displayed in your list of permissions.
Select which information to display.
Select which columns to display.
Select the order in which to display results.
See vulnerability information while browsing results.
See vulnerability details and full context on a dedicated page.
See below how you can filter vulnerabilities.
With the timeframe, you can define the period from which your data is being queried. If you don't specify the timeframe, the default Last 30 minutes
is applied, meaning that the data being fetched is from the last 30 minutes.
When setting the timeframe, the end value must always be Now
.
You can apply a timeframe filter on the results table (from the Prioritization page) or per vulnerability (from the details page of a vulnerability).
Segments provide quick access to predefined logical filters. The segment selector allows you to filter results based on these predefined logical filters. You can apply segments to any Vulnerabilities page.
See below for instructions.
If you already have segments defined, you can skip this step.
Open the Segments app and create segments for your environment. For more information, see Include data in Dynatrace segments.
Make sure to use filter segments that are compatible with entity state events. For examples of such filters, see Examples of how to create segments.
Selecting one or multiple segments results in
For example,
9.4
Davis Security Score on the Prioritization page.8.0
Davis Security Score, because the DSS has been scoped to include less entities and the maximum DSS score of affected entities is 8.0
.For more information on segments and how they work, see
You can create segments based on applications, services, hosts, and other relevant components monitored by Dynatrace. Here are some examples.
In the filter field you can use complex filter expressions to select which information is to be displayed in the vulnerabilities table:
Go to the Prioritization page.
In the filter field, make your selection. You have the following options:
Add multiple filters on the same filter key
Use AND
and OR
operators
Use the wildcard (*
) to search for patterns
Filter numbers with >
and <
To reset the filters to the default mode (open vulnerabilities), select on the right of the filter field.
If the selected filter doesn't show in the vulnerabilities table, go to the column settings and make sure to add the corresponding column to the table.
Select which columns are to be displayed in the vulnerabilities table:
Select the order in which results in a column should be displayed:
Take a look at the relevant information while browsing through the vulnerabilities table without navigating to the details page of a vulnerability.
Explore the most essential data on the details page of a vulnerability. This provides you the context needed to analyze the impact and address remediation actions.
Now that you know your way around Vulnerabilities , you can
Try Vulnerabilities and share your feedback to help us improve.
For a better understanding of key concepts used in Vulnerabilities , associated with use cases and frequently asked questions, see Concepts.