Integrate vulnerability insights across Dynatrace and external apps

  • Latest Dynatrace
  • How-to guide

Dynatrace doesn't just detect vulnerabilities; it helps you act on them. You can navigate across Dynatrace apps for deeper context, share findings with external tools, and automate remediation workflows to accelerate response and reduce risk.

Cross-app navigation

Clickable elements in the Vulnerabilities app, such as related entities, affected process groups, Kubernetes nodes, or reachable data assets, serve as entry points into other Dynatrace apps, allowing you to explore related context and take informed action.

  • Examples:

    • When viewing the Exploit attempts section of a code-level vulnerability in the Vulnerabilities app, you can either select an individual exploit attempt or use the View all related exploit attempts button to access detailed information in the Threats & Exploits Threats & Exploits app. This enables you to investigate technical details, correlate runtime evidence, and determine whether the vulnerability is being actively targeted, helping you prioritize remediation based on actual risk.

    • When viewing a vulnerability tied to a Kubernetes node in the Vulnerabilities app, you can select the affected node from the Kubernetes node overview to jump directly into the Kubernetes (new) Kubernetes app, where you can assess its health, dependencies, and workload impact.

Navigation also works in reverse. When exploring entities in other Dynatrace apps, such as Kubernetes or Infrastructure & Operations, you may encounter vulnerability indicators or links that guide you directly to Vulnerabilities for deeper analysis.

  • Examples:

    • From the Kubernetes (new) Kubernetes app, selecting a vulnerability in the Vulnerabilities section of a node or workload opens the Vulnerabilities app, pre-filtered to that specific vulnerability.

    • From the Infrastructure & Operations Infrastructure & Operations app, selecting the vulnerability indicator in the upper-right corner of the page opens the Vulnerabilities app, filtered by that host.

This bidirectional navigation ensures you're always one click away from full security context.

Share and automate with external apps

Use Workflow connectors to share vulnerability data with external platforms and automate remediation tasks.

These integrations help ensure that the right teams receive timely, actionable information, without manual effort.

Automate remediation workflows

Use the Workflows Workflows app to automate actions based on vulnerability severity, type, or affected entities.

  • Examples:

    • Auto-assign remediation tasks in Jira.

    • Send alerts to specific channels in Slack.

    • Launch custom scripts or CI/CD jobs using connectors like Ansible or Jenkins.

This enables proactive, scalable vulnerability management across your environment.

Download vulnerability data as CSV

You can download data in the vulnerabilities table as a CSV file for external analysis or reporting.

To download:

  1. On the Prioritization page, apply any filters to narrow down the results.
  2. Select Download table to save the current view as a CSV file.

The downloaded file reflects the filters applied at the time of download.

Related tags
Application Security