Discover how Dynatrace can help you strengthen your applications' security:
Dynatrace Runtime Vulnerability Analytics (RVA): Identify critical vulnerabilities instantly with automated risk and impact assessments, thanks to in-depth analysis of data access paths and production execution.
Dynatrace Runtime Application Protection (RAP): Defend your applications in real time by detecting and blocking attacks through advanced code-level insights and transaction analysis.
Any supported version of Dynatrace. Review the release notes for currently supported versions.
For Application Security to work properly, make sure deep monitoring is enabled in Settings > Processes and containers > Process group monitoring.
For .NET, Go, and Python technologies, for which automatic deep monitoring is disabled, you need to manually enable deep monitoring on each host. For more information, see Process deep monitoring.
Dynatrace detects third-party vulnerabilities in the following technologies.
For .NET, Go, and Python technologies, for which automatic deep monitoring is disabled, you need to manually enable deep monitoring on each host. For more information, see Process deep monitoring.
Java on z/OS is currently not supported.
Using Webpack or other bundlers might have an impact on automatic vulnerability detection. This is because the software components cannot be detected, as they are hidden behind the bundler configuration and not available at runtime. Only packages that are deployed as external packages can be detected and reported. For details, see Node.js: Limitations.
For Python vulnerabilities, Dynatrace currently supports only two states for reachable data assets: Within range and Not available.
To get started with Dynatrace Application Security, follow the instructions below.
To activate Application Security, contact a Dynatrace product expert via live chat.
You need to assign the Security admin group to users who will be allowed to view and manage
To assign Security admin permission
To add an existing user to the group
For more information on user permissions, see Manage user groups and permissions.
optional
By default, once you enable the Security admin group, users can both view and manage vulnerabilities. To restrict the access level to view-only for specific users, so they can view vulnerabilities but not manage them (cannot change their status), you have two options:
To restrict the access of an existing group at the environment or management zone level
The deployed Dynatrace monitoring mode can influence the Application Security results displayed in Dynatrace.
On Linux hosts, if there's no information, which can happen in different monitoring modes or because something went wrong, public internet exposure is detected via eBPF. Potential states are Public network
and Not detected
. Davis Security Score isn't influenced by either of these states.
recommended
Full-Stack Monitoring mode provides complete application performance monitoring, code-level visibility, deep process monitoring, and Infrastructure Monitoring (including PaaS platforms).
Infrastructure Monitoring mode, where OneAgent is configured to provide physical and virtual infrastructure-centric monitoring, provides less complete monitoring than the Full-Stack Monitoring mode. The following functionalities are provided:
In an Infrastructure Monitoring deployment, Davis® AI cannot adapt the Davis Security Score. In this case, the vulnerability's risk value can't be reevaluated, as this can only happen based on the topology information extracted from your environment, and the DSS will be the same as the CVSS base score.
Infrastructure Monitoring mode lacks environmental information, such as reachable data assets or public internet exposure, and limits information on related entities, such as databases and services. A full assessment can be performed only on vulnerabilities that have all related hosts under Full-Stack Monitoring.
Not available
.Not available
. However, if at least one related host is running in Full-Stack Monitoring mode and the vulnerability is exposed or affected, the public internet exposure and reachable data assets features are displayed.In Infrastructure Monitoring mode, vulnerable function information is supported.
If you're using the Dynatrace Platform Subscription (DPS) licensing model, see Host monitoring (DPS): Infrastructure Monitoring.
If you're using the Dynatrace classic licensing, see Application and Infrastructure Monitoring (Host Units).
Discovery mode is a lightweight monitoring mode that provides basic monitoring. The following functionalities are provided:
System metrics (CPU usage, memory usage, disk usage)
For Application Security to work in Discovery mode, after enabling Discovery mode, you also need to enable code-module injection.
In a Discovery mode deployment, Davis AI cannot adapt the Davis Security Score. In this case, the vulnerability's risk value can't be reevaluated, as this can only happen based on the topology information extracted from your environment, and the DSS will be the same as the CVSS base score.
Discovery mode lacks environmental information, such as reachable data assets or public internet exposure, and limits information on related entities, such as databases and services. A full assessment can be performed only on vulnerabilities that have all related hosts under Full-Stack Monitoring.
Not available
.Not available
. However, if at least one related host is running in Full-Stack Monitoring mode and the vulnerability is exposed or affected, the public internet exposure and reachable data assets features are displayed.Public internet exposure is detected on Linux hosts running in Discovery mode via eBPF. Potential states are Public network
and Not detected
. Davis Security Score isn't influenced by either of these states.
In Discovery mode, vulnerable function information is supported.
Discovery mode is only available for the Dynatrace Platform Subscription (DPS) licensing model.
For monitoring consumption information, see Host monitoring (DPS): Foundation & Discovery.
Dynatrace Application Security is licensed based on the consumption of GiB-hours if you're using the Dynatrace Platform Subscription (DPS) licensing model, or Application Security units (ASUs) if you're using the Dynatrace classic licensing.
Browse through some of the most relevant topics to get you started with Application Security.
What is Dynatrace and how to get started:
Elevate security with Dynatrace Davis Anomaly Detection:
Unguard - An open source application security playground:
Vulnerability detection and automated risk assessment with Dynatrace Application Security:
Remediate vulnerabilities like Log4Shell with Dynatrace:
Protect your applications against attacks:
How to achieve cloud native hyperscale security with Dynatrace: