After setting up Application Security, you can get started with Dynatrace Runtime Vulnerability Analytics. You have the following options:
Runtime Vulnerability Analytics is licensed based on the consumption of GiB-hours if you're using the Dynatrace Platform Subscription (DPS) licensing model, or Application Security units (ASUs) if you're using the Dynatrace classic licensing.
OneAgent version 1.239+
Third-party vulnerability detection helps you identify open-source and third-party vulnerabilities in production and pre-production environments at runtime.
Enable Third-party Vulnerability Analytics
Configure the global third-party vulnerability detection control
Control by technology
Enable OneAgent monitoring for Java vulnerable functions
To define the default third-party vulnerability detection control for all processes
You can also define custom monitoring rules based on certain process group tags, host tags, and management zones. In this case, the default monitoring mode applies to all processes that are not matched by a rule.
After you enable Third-party Vulnerability Analytics, Dynatrace starts generating vulnerabilities for all supported technologies by default. To control which of these technologies should receive vulnerabilities
Go to Settings and select Application Security > Vulnerability Analytics > General settings.
Under Third-party Vulnerability Analytics, enable or disable technologies as needed.
Runtime technologies (for example, Java, Node.js, and .NET runtimes) are tied to the corresponding main technology (for example, Java and Node.js). If the main technology is disabled, the corresponding runtime technology is automatically disabled. If you enable the main technology, enabling the corresponding runtime technology is optional.
Select Save changes.
For Dynatrace to evaluate the usage of the vulnerable function for Java, you need to enable OneAgent reporting for Java vulnerable functions.
For more information about function usage, see Vulnerable functions.
After you enable third-party vulnerability detection, you can start monitoring third-party vulnerabilities, set up monitoring rules, and create security notifications.
OneAgent version 1.259+
Code-level vulnerability detection leverages code inspection at runtime to identify security vulnerabilities in libraries and first-party code.
Enable Code-level Vulnerability Analytics
Configure the global code-level vulnerability detection control
Enable OneAgent monitoring
Code-level Vulnerability Analytics is designed to carry a production-ready performance footprint. The overhead depends on your application but should be negligible in most cases.
To define the default code-level vulnerability detection control for all process groups
You can also define custom monitoring rules based on certain process groups. In this case, custom rules override the global detection control for the selected technology, and Runtime Vulnerability Analytics continues to monitor the code-level vulnerabilities based on your rules.
code-level vulnerability evaluation
and enable the feature for the technologies you want to monitor.After you enable code-level vulnerability detection, you can start monitoring code-level vulnerabilities, set up monitoring rules, and create security notifications.