Application Security

Discover how Dynatrace can help you strengthen your applications' security:

  • Any supported version of Dynatrace. Review the release notes for currently supported versions.

  • For Application Security to work properly, make sure deep monitoring is enabled in Settings > Processes and containers > Process group monitoring.

    For .NET, Go, and Python technologies, for which automatic deep monitoring is disabled, you need to manually enable deep monitoring on each host. For more information, see Process deep monitoring.

Application Security isn't supported

Dynatrace detects third-party vulnerabilities in the following technologies.

Technology
Minimum OneAgent version
Go1
1.245
Java2
1.221
Java runtimes
1.253
Kubernetes
1.219
.NET1
1.233
.NET runtimes
1.255
Node.js3
1.231
Node.js runtimes
1.253
PHP
1.231
Python1'4
1.309
Python runtimes
1.309
1

For .NET, Go, and Python technologies, you need to manually enable deep monitoring on each host. For details, see Prerequisites.

2

Java on z/OS is currently not supported.

3

Using Webpack or other bundlers might have an impact on automatic vulnerability detection. This is because the software components cannot be detected, as they are hidden behind the bundler configuration and not available at runtime. Only packages that are deployed as external packages can be detected and reported. For details, see Node.js: Limitations.

4

For Python vulnerabilities, Dynatrace can't yet assess internet exposure and reachable data assets or calculate the Davis Security Score. For now, you can prioritize these vulnerabilities based on the CVSS score.

Dynatrace Application Security is licensed based on the consumption of GiB-hours if you're using the Dynatrace Platform Subscription (DPS) licensing model, or Application Security units (ASUs) if you're using the Dynatrace classic licensing.

To get started with Dynatrace Application Security, follow the instructions below.

To activate Application Security, contact a Dynatrace product expert via live chat.

You need to assign the Manage security problems permission to user groups that will be allowed to view and manage

For details, see Environment permissions and Management zone permissions.

optional

By default, once you enable the Manage security problems permission, users can both view and manage vulnerabilities. To restrict the access level to view-only for specific users, so they can view vulnerabilities but not manage them (cannot change their status), you have two options:

To restrict the access of an existing user group at the environment or management zone level

  1. Go to Environments, then select the desired environment.
  2. Clear Manage security problems and select View security problems for the desired user group.
  1. Go to User authentication > User groups, then select the pencil icon Edit to edit the desired group.
  2. Scroll down to Management zone permissions, then select edit for the desired management zone.
  3. Clear Manage security problems and select View security problems.
  4. Select Save changes.