The Findings page, accessible by selecting the Findings tab in
Vulnerabilities, consolidates vulnerability findings from Dynatrace and integrated external security tools into a single, actionable view. It helps reduce noise from multiple scanners (network, web app, cloud, container, SAST), providing developers and security teams with a holistic view of vulnerabilities across assets and layers of their environments.
By default, the Findings page displays Dynatrace‑generated results (third‑party and code‑level). To extend it with external findings, set up integrations via OpenPipeline. For the list of supported integrations and setup instructions, see Security events ingest.
In the findings table available on the Findings page, you can explore and refine vulnerability finding data:
You have several options to filter and sort findings:
Filter by timeframe: Define the period from which your data is being queried. If you don't specify the timeframe, the default Last 30 minutes is applied, meaning that the data being fetched is from the last thirty minutes.
Filter by segments: Segments provide quick access to predefined logical filters. The segment selector allows you to filter results based on these predefined logical filters.
Selecting one or multiple segments results in fewer findings.
For more information on segments and how they work, see Segments.
Filter by expressions: In the filter field, you can use complex filter expressions to select which information is to be displayed, such as:
Add multiple filters on the same filter key
Use AND and OR operators
Use the wildcard (*) to search for patterns
Filter numbers with > and <
To filter by expressions, you have two options:
To reset the filters to the default mode, select on the right of the filter field.
If the selected filter doesn't show in the table, go to the column settings and make sure to add the corresponding column to the table.
Sort columns: You can sort the order of columns and of results.
To select the order of columns, you have two options:
To select the order in which results in a column should be displayed:
If more than 100,000 findings are displayed, sorting isn't available. This limitation prevents performance issues with very large result sets.
To enable sorting, narrow your scope by applying filters.
In the upper-left corner of the table, you can choose between two preset views of the results:
You can easily switch between the two views and customize them (add or remove columns) according to your needs.
Many vulnerability findings are cyclical, reappearing in every scan if the environment or feed hasn't changed. This can create noise.
To reduce this noise,
Vulnerabilities deduplicates findings by default: only the latest event of a finding with the same ID is displayed.
Two findings are considered duplicates (same finding ID) if all of the following fields match:
object.idvulnerability.idcomponent.namecomponent.versionproduct.nameproduct.vendorFor details on these fields, see the Dynatrace semantic dictionary.
To drill into an issue or specific affected object and observe the full history—even if it contains periodic identical findings—turn off Show unique findings at the top of the table.
The chart on the Findings page allows you to visualize results based on your selected criteria.
The X-axis displays the time when the findings were detected.
The Y-axis displays the count of the detected findings.
Select different dimensions using the Split by options in the drop-down list:
Severity: Shows the distribution of findings by severity level (for example, Critical, High, Medium, Low).
Affected object: Groups findings by the impacted Dynatrace entity (such as process, service, or host).
Provider: Separates findings based on the source that reported them (for example, Dynatrace Runtime Vulnerability Analytics or an external security tool).
These options help you quickly identify trends and concentrations across different dimensions, reducing noise and highlighting where attention is most needed.
Selecting a finding in the Findings table opens the details pane, which provides full context about the vulnerability. This view helps you quickly assess severity, trace affected components, and connect findings to remediation workflows.
The details pane includes:
Select the Source tab for a complete list of information available from the ingested finding.
You can extend your analysis beyond
Vulnerabilities by sharing or reusing findings in other Dynatrace apps: