Remediation tracking allows you to track the remediation progress of individual entities (process groups, processes, or Kubernetes nodes) that are affected by a third-party vulnerability.
For process groups and Kubernetes nodes, you can control which of these entities you want to track and which you want to discard. For instance, if you think an entity isn't relevant or is a false positive, you can mute it. By muting an entity, you hide third-party vulnerabilities for certain process groups or Kubernetes nodes.
To access remediation tracking for process groups that are related to a vulnerability
On the Process group overview page, you can
You can filter for process groups by
Entity name: Full or partial name.
Status: Affected
, Resolved
, or Muted
.
Tracking link: Full or partial title of a tracking link that has already been set up. For details, see tracking link.
Public internet exposure: Public network
or Not detected
.
Reachable data assets: Within range
or None within range
.
Name of vulnerable function in use: You can use two colons in your search term (<class>::<function>
) to specify the function and/or class name you're looking for:
<class>::
to filter by a specific class name.<class>::<function>
to filter for a specific function in a specific class.<function>
to filter for a specific function name in any class.You can find the class and function names in the Vulnerable functions section on the details page of a vulnerability.
This section is not displayed
If no vulnerable function information is provided by Snyk or the Dynatrace security research team.
For runtime vulnerabilities, which are based on the NVD feed.
In the example above, the class is org.apache.http.client.utils.URIUtils
, and the function is extractHost
. On the remediation tracking page of process groups related to a vulnerability, you can use the following syntax to filter
org.apache.http.client.utils.URIUtils::
extractHost
org.apache.http.client.utils.URIUtils::extractHost
Example result of filtering by class:
Vulnerable functions usage: In use
, Not in use
, or Restart required
.
For more information about Restart required
, see FAQ: How can I know if information about vulnerable functions is outdated and what can I do about it?.
Assessment accuracy:
Full
filters for related process groups that run in Full-Stack Monitoring mode.Reduced
filters for related process groups that run in Infrastructure Monitoring mode or OneAgent Discovery mode.For details, see Monitoring modes.
The process group list provides the following information.
Current status of the related process group (Affected
, Resolved
, or Muted
).
To track a vulnerability's remediation progress, you can add links to tickets created in your own issue tracking system for the affected entity. Once you add a tracking link, select it to navigate to the associated URL, which opens in a new page. You can easily check, for example, if someone is already working on fixing the vulnerability.
You can add, update, and delete a tracking link individually (for one process group at a time) or in bulk (for several process groups at the same time).
A timestamp showing when the related process group was first detected.
A timestamp showing when the status of the related process group was last updated.
Detailed information about the selected process group.
The process group details section provides the following information:
Details:
Process group name: The name of the affected process group (for example, IIS app pool dotNetBackend_easyTravel_x64
) with a link to the process group details page.
Processes: The number of currently affected processes out of the total number of processes in that process group, indicating the remediation progress. (for example, 2/10 processes affected
).
Status: The current status of the affected process group (Affected
, Resolved
, or Muted
).
Tracking link: Existing tracking links appear here. If no tracking link has been added, you can select Set link to add one.
First detected: A timestamp showing when the related process group was first detected.
Last update: A timestamp showing when the status of the affected process group was last updated.
Vulnerable component: The name of the vulnerable component (for example, .NET 3.5.1.0 .NET Framework
).
jar:file:/app/app.jar!/BOOT-INF/lib/spring-web-5.2.2.RELEASE.jar!/
).This feature is only displayed for vulnerable Java and .NET software components.
Note that to display the origin of .NET software components, the minimum OneAgent version required is OneAgent version 1.301+.
Status: The latest status change.
Risk assessment:
If there's any public internet exposure.
If the symbol is grayed out and crossed out, no public internet exposure was found. If the symbol isn't present, there's no data available.
If there are any reachable data assets affected.
If the symbol is grayed out and crossed out, there aren't any reachable data assets. If the symbol isn't present, there's no data available.
If there are any vulnerable functions in use by a process.
If the symbol is grayed out and crossed out, there's no vulnerable function in use. If the symbol isn't present, there's no data available. For details, see FAQ: Why is there no data available for vulnerable functions?.
If process restart is required, with a link to the specific processes that need to be restarted.
For more information, see FAQ: How can I know if information about vulnerable functions is outdated and what can I do about it?.
To change the vulnerability status of
One affected process group:
Multiple affected process groups:
The option to perform bulk changes isn't available to users with view-only access. The Manage security problems permission is required. For details on permission management, see Fine-tune permissions.
To access remediation tracking for processes that are related to a vulnerability
The affected processes
The related processes (Affected
and Resolved
)
On the Process overview page, you can
You can filter for processes by
Entity name: Full or partial name.
Status: Affected
or Resolved
.
Name of vulnerable function in use: You can use two colons in your search term (<class>::<function>
) to specify the function and/or class name you are looking for:
<class>::
to filter by a specific class name.<class>::<function>
to filter for a specific function in a specific class.<function>
to filter for a specific function name in any class.You can find the class and function names in the Vulnerable functions section on the details page of a vulnerability.
This section is not displayed
If no vulnerable function information is provided by Snyk or the Dynatrace security research team.
For runtime vulnerabilities, which are based on the NVD feed.
In the example above, the class is org.apache.http.client.utils.URIUtils
, and the function is extractHost
. On the remediation tracking page for processes related to a vulnerability, you can use the following syntax to filter
org.apache.http.client.utils.URIUtils::
extractHost
org.apache.http.client.utils.URIUtils::extractHost
Example result of filtering by function:
Vulnerable functions usage: In use
, Not in use
, or Restart required
.
For more information about Restart required
, see FAQ: How can I know if information about vulnerable functions is outdated and what can I do about it?.
The process list provides the following information.
KpiTomcatFrontEnd-CWS-2-IG-51-HG
) with a link to the process details page.PROCESS_GROUP_INSTANCE-B63193A779301A0E
), to distinguish it from other processes with the same name.If there are any vulnerable functions in use by the process, the vulnerable function symbol is displayed.
If the symbol is grayed out and crossed out, there's no vulnerable function in use. If the symbol isn't present, there's no data available. For details, see FAQ: Why is there no data available for vulnerable functions?.
If information about vulnerable functions is outdated, the restart symbol is displayed.
For more information, see FAQ: How can I know if information about vulnerable functions is outdated and what can I do about it?.
The current status of the related process (Affected
or Resolved
).
A timestamp showing when the related process was first detected.
Detailed information about the selected process.
The process details section provides the following information:
Details:
Process group name: The name of the related process group (for example, IIS app pool dotNetBackend_easyTravel_x64
) with a link to the process group details page.
Status: The current status of the related process (Affected
or Resolved
).
First detected: A timestamp showing when the related process was first detected.
Vulnerable component: The name of the vulnerable component (for example, .com.fasterxml.jackson.core:jackson-databind:2.9.9
).
jar:file:/app/app.jar!/BOOT-INF/lib/spring-web-5.2.2.RELEASE.jar!/
).This feature is only displayed for vulnerable Java and .NET software components.
Note that to display the origin of .NET software components, the minimum OneAgent version required is OneAgent version 1.301+.
Risk assessment: Presence of vulnerable functions in use by the process.
If there are any vulnerable functions in use by the process, the vulnerable function symbol is displayed.
If the symbol is grayed out and crossed out, there's no vulnerable function in use.
If the symbol isn't present, there's no data available. For details, see FAQ: Why is there no data available for vulnerable functions?.
If information about vulnerable functions is outdated, you are prompted to restart the process.
For more information, see FAQ: How can I know if information about vulnerable functions is outdated and what can I do about it?.
To access remediation tracking for Kubernetes nodes that are related to a vulnerability
On the Kubernetes node overview page you can
You can filter for nodes by
Affected
, Resolved
, or Muted
.The Kubernetes node list provides the following information.
The name of the affected node with a link to the host details page.
The current status of the affected node (Affected
, Resolved
, or Muted
).
To keep track of a vulnerability's remediation progress you can add links to tickets created in your own issue tracking system for the affected entity. Once you add a tracking link, select it to navigate to the associated URL, which opens in a new page. You can easily check, for example, if someone is already working on fixing the vulnerability.
You can add, update, and delete a tracking link individually (for one node at a time) or in bulk (for several nodes at the same time).
A timestamp showing when the affected node was first detected.
A timestamp showing when the status of the affected node was last updated.
Detailed information about the selected node.
The Kubernetes node details section provides the following information:
deb-10-k3s-oi-01
).Affected
, Resolved
, or Muted
).Kubernetes v1.21.9+k3s1 master
).To change the vulnerability status of
One affected node:
Multiple affected nodes: