If you're currently using the third party or code level vulnerabilities pages, you can upgrade to the
Vulnerabilities app, which provides a unified, improved view in the latest Dynatrace experience.
The new
Vulnerabilities app offers:
Advanced filtering: Use the new filtering mechanism to search and prioritize vulnerabilities across your stack.
Additional prioritization option: Leverage CISA KEV insights.
Full data access: Query vulnerability data in Grail with Dynatrace Query Language (DQL), build dashboards, and automate workflows.
State report queries: Drill down with DQL and create dashboards (see example query).
Guidance from Davis CoPilot: Get explanations and remediation suggestions.
Coming soon OS vulnerabilities, raw events from integrated scanners, host coverage for hosts monitored by Runtime Vulnerability Analytics, and cross‑app vulnerability views (for example, going to
Kubernetes for deeper insights).
Below are the key changes when moving from the classic apps to the latest Dynatrace experience, along with the actions you should take.
| Latest Dynatrace | Previous Dynatrace |
|---|---|
| Permissions are aligned with Dynatrace IAM. | Permissions are tied to management zones and app access. |
Improvement for you:
Your action: Set up IAM permissions before using the
Vulnerabilities app.
| Latest Dynatrace | Previous Dynatrace |
|---|---|
| You can slice and dice data with segments. | You can scope vulnerability data with management zones. |
Improvement for you: Data segmentation acts as logical filtering, recalculating DSS only for selected entities, helping you focus on relevant risks.
Your action: Use the segment selector to filter vulnerabilities and affected entities.
| Latest Dynatrace | Previous Dynatrace |
|---|---|
| You define monitoring rules based on resource attributes and Kubernetes labels. | You define monitoring rules based on management zones or tags. |
Improvement for you: You gain more precise data segmentation, support for Kubernetes labels, and alignment with the Dynatrace unified access and resource model. Rules are easier to maintain, transparent, and future‑proof.
Your action:
Third‑party vulnerabilities:
Code‑level vulnerabilities: Rules are already based on resource attributes; no changes are required.
| Latest Dynatrace | Previous Dynatrace |
|---|---|
You create and orchestrate alerts via Workflows. | You configure security notifications globally in Settings (Classic). |
Improvement for you: You can define granular conditions, integrate with external tools (Slack, Teams, Jira, ServiceNow, email), and orchestrate multiple actions in one workflow. This enables flexible, automated responses tailored to your environment.
Your action: Recreate notifications using workflows.
| Latest Dynatrace | Previous Dynatrace |
|---|---|
| A vulnerability is muted only when all affected entities are muted. | You can mute vulnerabilities globally. |
Improvement for you: You gain finer control, transparency, and assurance that teams focus only on vulnerabilities that remain relevant.
Your action: Adjust your muting practices to entity‑level logic.
Workflows. For examples of how to set up a workflow, see Workflows use cases.Connect with the Dynatrace Community to share feedback and ask questions—your input helps us improve.