Monitor detection findings and detect targeted vulnerabilities.
Filter, format, group, and sort results to structure and refine your analysis.
Visualize findings to understand trends and distributions.
Enrich findings with external reputation data.
Assess affected objects and understand overall system impact.
Identify and safeguard critical applications.
Monitor real-time security coverage.
Threats & Exploits is dedicated to DevSecOps, security engineers, and security architects.
Depending on the type of ingested data you want to monitor with
Threats & Exploits (data from your Dynatrace-monitored environment or from third-party sources), the following requirements must be met:
For a list of permissions required, go to Hub, select
Threats & Exploits, and display Technical information.
Threats & Exploits streamlines the triage of detection findings, offering an up-to-date view of the application security threat landscape enhanced by Dynatrace deep observability. It helps you immediately detect zero-day vulnerabilities and take defensive measures to protect against exploitation.





Once you open
Threats & Exploits, you can see the list of findings from your ingested data.
Threats & Exploits