After you activate Application Security, assign permissions, and enable and configure Dynatrace Runtime Vulnerability Analytics, Dynatrace starts monitoring your applications to detect vulnerabilities. Go to Security Overview for an overview of vulnerabilities in your global environment.
For security reasons, access to this page is restricted to users who are part of the Security admin group for the whole environment, not just for a selected set of management zones.
The Application Security overview page displays the following information.
The infographic at the top of the page is based on calculations that take place every 15 minutes and shows
In the foreground, the total count of the most severe open vulnerabilities in your environment (26 critical
in the example above).
Third-party vulnerabilities: The number of the most severe open critical third-party vulnerabilities (21 critical
in the example above). Select it to go to Third-Party Vulnerabilities filtered by the highest risk level and the open status.
This feature isn't displayed if third-party vulnerability detection is disabled.
Code-level vulnerabilities:
The number of open code-level vulnerabilities (5 critical
in the example above). Select it to go to Code-Level Vulnerabilities filtered by the open status.
This feature isn't displayed if code-level vulnerability detection is disabled.
The total number of attacks—exploited, blocked, and allowlisted (2,765 attacks
in the example above)—that occurred over the last 30 days. Select it to go to the unfiltered Attacks.
This feature isn't displayed if Application Protection isn't activated and enabled.
The Risk level section shows a chart of third-party vulnerabilities by risk level (critical
, high
, medium
, low
).
This section isn't displayed if third-party vulnerability detection is disabled.
Two perspectives are displayed:
Currently open vulnerabilities: The number of third-party vulnerabilities currently open, grouped by risk level (21 Critical
, 151 High
, 247 Medium
, 53 Low
in the example above). Select any group to go to Third-Party Vulnerabilities filtered by the respective risk level and open state.
Vulnerability evolution over time: The maximum value of the day for vulnerabilities in your global environment, over the last 30 days, split by risk level. To refine the chart by risk level, select chart legend entries.
Vulnerabilities are constantly reassessed and may change their risk level over time. For details, see Frequently asked questions.
Select View all third-party vulnerabilities to go to the unfiltered list of third-party vulnerabilities in your environment.
The Vulnerabilities section shows a chart of third-party vulnerabilities in your global environment by status (resolved
, open
, muted(open)
), over the last 30 days. You can see when a vulnerability was opened, reopened, resolved, or muted. To refine the chart by risk level, select chart legend entries.
This section isn't displayed if third-party vulnerability detection is disabled.
Select View all third-party vulnerabilities to go to the unfiltered list of third-party vulnerabilities in your environment.
The Host coverage section shows the coverage of hosts on which vulnerability detection is enabled, based on your settings. This helps you determine where there are coverage gaps and how this can relate to the current number of open vulnerabilities in your environment.
This section isn't displayed if third-party vulnerability detection is disabled.
The following information is provided.
The number and percentage of supported hosts from the total number of hosts in your environment. For example, if the total number of hosts is 1,755 hosts, and, from this amount, only 1,398 hosts are supported, then the remaining 357 hosts belong to technologies that are not supported by Dynatrace.
In the foreground, the number of hosts that are excluded from monitoring by monitoring rules. To improve the coverage gaps, you need to decrease this number. For details, see How to increase host coverage.
Supported hosts: All hosts with supported technologies in your environment, regardless of their monitoring status (comprises the monitored and excludes hosts). Select Supported hosts to go to Hosts or Hosts Classic (latest Dynatrace) filtered by supported hosts.
Monitored hosts: The supported hosts in your environment on which Third-Party Vulnerability Analytics is enabled, and that are not excluded from monitoring by monitoring rules. Also displayed is the percentage of monitored hosts from the total number of supported hosts. Select Monitored hosts to go to Hosts or Hosts Classic (latest Dynatrace) filtered by monitored hosts.
Excluded hosts: The number of supported hosts on which Third-Party Vulnerability Analytics is enabled, but that are excluded from monitoring by monitoring rules or by having a relevant technology disabled. Also displayed is the percentage of excluded hosts from the total of supported hosts. Select Excluded hosts to go to Hosts or Hosts Classic (latest Dynatrace) filtered by excluded hosts.
Host coverage is calculated based on the last 70 minutes and uses all hosts in your environment that run a supported technology. See below the calculation mechanism for third-party and code-level vulnerabilities.
To increase the host coverage for third-party and code-level vulnerabilities, follow the instructions below.
It can take up to 10 minutes until any change is displayed.
The Affected process groups section shows the top five process groups affected by third-party vulnerabilities, sorted by
This section isn't displayed if third-party vulnerability detection is disabled.
The following information is provided.
For deeper insights, see Manage third-party vulnerabilities.
Use case: Gain an overview of the third-party vulnerability coverage by technology to determine which technologies have the most affected entities and which process groups or nodes (in the case of Kubernetes vulnerabilities) are the most vulnerable.
This section isn't displayed if third-party vulnerability detection is disabled.
The following information is displayed.
A table listing the supported technologies for third-party vulnerabilities, their monitoring status (enabled or disabled), the monitored entities (process groups or, in the case of Kubernetes vulnerabilities, nodes), and the number and percentage of affected entities from the total number of monitored entities.
A chart of the affected entity evolution by technology over the last 30 days. Hover over the data for details. To refine the chart by technology, select chart legend entries.
To increase technology coverage for third-party vulnerabilities
If you have followed the steps to increase the Application Security host coverage, yet the number of covered hosts stays the same, follow the instructions below.
Make sure that
If you define tags for hosts covered by Application Security and you notice that the number of hosts on Hosts or Hosts Classic (latest Dynatrace) filtered by your Application Security tags is different from the number of hosts displayed in Security Overview under Host coverage, follow the instructions below.
On the risk-level chart, how many third-party vulnerabilities are counted in one day if their risk level changes several times that day (for example, from Medium
to High
, and back to Medium
again)?
In this case, the vulnerability is counted twice, once for Medium
and once for High
.
On the risk-level chart, how many third-party vulnerabilities are counted in one day if the affected process is restarted several times that day, but the vulnerability risk level stays the same (for example, Medium
)?
In this case, the vulnerability is counted one time, as Medium
.