- 15 Mar 2025
- 3 Minutes to read
- Print
- DarkLight
Dynatrace Application Security
- Updated on 15 Mar 2025
- 3 Minutes to read
- Print
- DarkLight
Dynatrace provides advanced monitoring and performance management solutions for cloud environments, infrastructure, applications, and user experiences. Dynatrace Application Security strengthen your application’s security by providing following modules:
Dynatrace Runtime Vulnerability Analytics (RVA): identify critical vulnerabilities instantly with automated risk and impact assessments, thanks to in-depth analysis of data access paths and production execution.
Dynatrace Runtime Application Protection (RAP): defend your applications in real time by detecting and blocking attacks through advanced code-level insights and transaction analysis.
More information can be found at the Dynatrace Application Security website.
Integration Method: API
Tables: Vulnerability Finding (2002), Detection Finding (2004), HTTP Activity (4002)
This integration supports the following events.
Event | Description |
---|---|
Attacks | Lists all detected attacks on your applications |
SecurityProblems | Lists the third-party and code-level vulnerabilities detected in your applications. |
This integration is tested with the following versions.
Dynatrace Saas Version | v1.308 |
Dynatrace API version | v2.0 |
Prerequisites
The user should have access to the Dynatrace portal with an account that has Administrator privileges.
The user should have access to the DataBee console.
Configuration Overview
Generate an API token with the required scopes
Add the Dynatrace Application Security data feed in the DataBee console with the below parameters.
DataBee Parameter
Dynatrace Parameter
Token
Dynatrace Configuration
Navigate to Dynatrace portal. Enter your email ID and click Next.
Enter your password and click Sign in.
Once logged in, note the <tenant_id> from the URL which is required later while configuring the data feed. Refer to the screenshot below.
Process group monitoring
For Application Security to work properly, we need to enable deep monitoring. Please follow the steps to enable automatic deep monitoring.
In Dynatrace UI > Go to Apps > Under Manage section > Settings.
Navigate to Processes and contextualize > Process groups.
Under Process groups, click Process group monitoring.
It will open Dynatrace classic UI in new browser tab. Click the toggle Enable automatic deep monitoring.
Enable Runtime Vulnerabilities Analytics (RVA)
In Dynatrace UI > Go to Apps > Under Manage section > Settings.
Navigate to Analyze and alert and select Application Security.
Go to Application protection > General settings.
Under Application Security > Vulnerability Analytics, click General settings.
Toggle the Enable Third-party Vulnerability Analytics button and enable the technologies you want to monitor under Technologies.
Navigate to Code-level Vulnerability Analytics and enable it. Also select Monitor from the drop down for ‘Global Java code-level vulnerability detection control’ and ‘Global .NET code-level vulnerability detection control’.
Once both Third-party Vulnerability Analytics and Code-level Vulnerability Analytics are enabled, click Save changes.
Enable Runtime Application Protection (RPA)
In Dynatrace UI > Go to Apps > Under Manage section > Settings.
Select Analyze and alert > Application security.
Navigate to Application protection > General settings.
Toggle the Enable Runtime Application Protection button and ensure either Monitor; incoming attacks detected only or Block; incoming attacks detected and blocked based on your preferences for both ‘Attack control Java’ and ‘Attack control .NET.’
Once Runtime Application Protection is enabled, click Save changes.
Enable OneAgent monitoring
In Dynatrace UI > Go to Apps > Under Manage section > Settings.
Navigate to Collect and capture > General monitoring settings.
Click OneAgent features.
Ensure you have enabled both code-level attack evaluation [Opt-In] and code-level vulnerability evaluation [Opt-In] for the technology that you want to monitor. You can also use the Filter by option as well.
For code-level attack evaluation [Opt-In], additionally we must enable Instrumentation enabled (change needs a process restart). Once enabled, click Save changes.
Generate personal access tokens
In Dynatrace UI > Go to Apps > Under Manage section > Settings.
Navigate to Environment segmentation > Access tokens.
Enable Personal access tokens and then click Save changes.
Go to Apps > Under Manage section > Personal Access Tokens to generate a personal access token.
Click Generate new token button.
Give an appropriate ‘Token name’ and select Read attacks and Read security problems from the scopes. Once selected click Generate token.
Ensure to copy and save the generated access token as it will be required to configure in DataBee.
DataBee Configuration
Login to the DataBee UI, navigate to Data > Data Feeds and click the Add New Data Feed button.
Search for the Dynatrace and click it as shown below.
Click on the API Ingest option for collection method.
Enter feed contact information and click Next.
In the configuration page, confirm the following:
API Base URL: this is the base URL that DataBee will interact with. Ensure to update <tenant_id> placeholder with your Dynatrace tenant id.
Authorization Method: Bearer Token
Token: paste the Personal Access Token generated earlier in the GitLab console.
Event Types: preselected for all the event types that integration pulls.
Click Submit.
Troubleshooting Tips
Ensure the token is pasted correctly. Since you cannot view the token after the 1st time, re-create the token, paste it on a text editor to ensure no spaces or unexpected characters are included and reconfigure the DataBee feed.
Ensure the Dynatrace scopes/permissions are correct.