<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Scenario: Restrict Team to only their MZ (Synthetic + Hosts) in New UI in Synthetic Monitoring</title>
    <link>https://community.dynatrace.com/t5/Synthetic-Monitoring/Scenario-Restrict-Team-to-only-their-MZ-Synthetic-Hosts-in-New/m-p/294818#M3349</link>
    <description>&lt;P&gt;We have &lt;STRONG&gt;Team ABC&lt;/STRONG&gt; and they own a &lt;STRONG&gt;Management Zone (MZ) = XYZ&lt;/STRONG&gt; in Dynatrace.&lt;/P&gt;
&lt;P&gt;We want to provide &lt;STRONG&gt;New UI access&lt;/STRONG&gt; to Team ABC users, but restrict them so they can &lt;STRONG&gt;only see&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Synthetic monitors&lt;/STRONG&gt; that belong to &lt;STRONG&gt;MZ XYZ&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Hosts / infrastructure entities&lt;/STRONG&gt; that belong to &lt;STRONG&gt;MZ XYZ&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;What we did so far&lt;/H3&gt;
&lt;OL class=""&gt;
&lt;LI&gt;Created a &lt;STRONG&gt;policy&lt;/STRONG&gt; that includes permissions for:
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Hosts / Infrastructure (view)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Synthetic monitors (view)&lt;/STRONG&gt; (and results if needed)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Applied a &lt;STRONG&gt;policy boundary&lt;/STRONG&gt; to restrict access in the New UI.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;Problem / Question&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Even after creating the policy + boundary, we are not clear on how to ensure &lt;STRONG&gt;entity-level restriction&lt;/STRONG&gt; so Team ABC users can &lt;STRONG&gt;only see Synthetic monitors and Hosts that are in their Management Zone XYZ&lt;/STRONG&gt; (and not monitors/hosts belonging to other teams/MZs).&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Question:&lt;/STRONG&gt; What is the correct way (best practice) to restrict visibility to &lt;STRONG&gt;only entities included in a specific Management Zone (XYZ)&lt;/STRONG&gt; in the &lt;STRONG&gt;Dynatrace New UI&lt;/STRONG&gt; for:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Synthetic monitors&lt;/LI&gt;
&lt;LI&gt;Hosts (infra)&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;What guidance we are looking for&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;Should the boundary be configured specifically as a &lt;STRONG&gt;Management Zone boundary&lt;/STRONG&gt; (XYZ)?&lt;/LI&gt;
&lt;LI&gt;Are there any additional permission sets required (or permissions to avoid) that may “leak” visibility outside the MZ?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;It would be helpful if Dynatrace provided clearer guidance (or simplified configuration) on how to enforce &lt;STRONG&gt;entity-level scoping by Management Zone&lt;/STRONG&gt; for Synthetic and Infrastructure in the New UI using &lt;STRONG&gt;policies and boundaries&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
    <pubDate>Tue, 17 Feb 2026 08:08:36 GMT</pubDate>
    <dc:creator>n_957</dc:creator>
    <dc:date>2026-02-17T08:08:36Z</dc:date>
    <item>
      <title>Scenario: Restrict Team to only their MZ (Synthetic + Hosts) in New UI</title>
      <link>https://community.dynatrace.com/t5/Synthetic-Monitoring/Scenario-Restrict-Team-to-only-their-MZ-Synthetic-Hosts-in-New/m-p/294818#M3349</link>
      <description>&lt;P&gt;We have &lt;STRONG&gt;Team ABC&lt;/STRONG&gt; and they own a &lt;STRONG&gt;Management Zone (MZ) = XYZ&lt;/STRONG&gt; in Dynatrace.&lt;/P&gt;
&lt;P&gt;We want to provide &lt;STRONG&gt;New UI access&lt;/STRONG&gt; to Team ABC users, but restrict them so they can &lt;STRONG&gt;only see&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Synthetic monitors&lt;/STRONG&gt; that belong to &lt;STRONG&gt;MZ XYZ&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Hosts / infrastructure entities&lt;/STRONG&gt; that belong to &lt;STRONG&gt;MZ XYZ&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;What we did so far&lt;/H3&gt;
&lt;OL class=""&gt;
&lt;LI&gt;Created a &lt;STRONG&gt;policy&lt;/STRONG&gt; that includes permissions for:
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Hosts / Infrastructure (view)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Synthetic monitors (view)&lt;/STRONG&gt; (and results if needed)&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Applied a &lt;STRONG&gt;policy boundary&lt;/STRONG&gt; to restrict access in the New UI.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;Problem / Question&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Even after creating the policy + boundary, we are not clear on how to ensure &lt;STRONG&gt;entity-level restriction&lt;/STRONG&gt; so Team ABC users can &lt;STRONG&gt;only see Synthetic monitors and Hosts that are in their Management Zone XYZ&lt;/STRONG&gt; (and not monitors/hosts belonging to other teams/MZs).&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Question:&lt;/STRONG&gt; What is the correct way (best practice) to restrict visibility to &lt;STRONG&gt;only entities included in a specific Management Zone (XYZ)&lt;/STRONG&gt; in the &lt;STRONG&gt;Dynatrace New UI&lt;/STRONG&gt; for:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Synthetic monitors&lt;/LI&gt;
&lt;LI&gt;Hosts (infra)&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;What guidance we are looking for&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;Should the boundary be configured specifically as a &lt;STRONG&gt;Management Zone boundary&lt;/STRONG&gt; (XYZ)?&lt;/LI&gt;
&lt;LI&gt;Are there any additional permission sets required (or permissions to avoid) that may “leak” visibility outside the MZ?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;It would be helpful if Dynatrace provided clearer guidance (or simplified configuration) on how to enforce &lt;STRONG&gt;entity-level scoping by Management Zone&lt;/STRONG&gt; for Synthetic and Infrastructure in the New UI using &lt;STRONG&gt;policies and boundaries&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2026 08:08:36 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Synthetic-Monitoring/Scenario-Restrict-Team-to-only-their-MZ-Synthetic-Hosts-in-New/m-p/294818#M3349</guid>
      <dc:creator>n_957</dc:creator>
      <dc:date>2026-02-17T08:08:36Z</dc:date>
    </item>
    <item>
      <title>Re: Scenario: Restrict Team to only their MZ (Synthetic + Hosts) in New UI</title>
      <link>https://community.dynatrace.com/t5/Synthetic-Monitoring/Scenario-Restrict-Team-to-only-their-MZ-Synthetic-Hosts-in-New/m-p/294862#M3350</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;As I understand, you want&amp;nbsp;Team ABC can see only Synthetic monitors + Hosts that belong to MZ XYZ in the New UI&amp;nbsp;is typically enforced not by Management Zone alone, but by Grail security context (dt.security_context) + IAM policies/boundaries.&lt;BR /&gt;New UI Synthetic app is Grail-based and requires storage:* permissions (entities/metrics/events…). Grail doesn’t use Management Zones for record-level access control—MZ is primarily a classic UI partition/filter, while Grail ABAC is done via storage: fields.&lt;BR /&gt;link to documentation:&lt;BR /&gt;&lt;A href="https://docs.dynatrace.com/docs/manage/identity-access-management/permission-management/manage-user-permissions-policies/iam-policy-boundaries" target="_self"&gt;Policy boundaries&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;I think you can try this approach:&lt;/P&gt;&lt;P&gt;1. Tag the entities (Hosts + Synthetic) with dt.security_context, e.g. XYZ.&lt;/P&gt;&lt;P&gt;2. Create a policy boundary on that security context, e.g.&lt;BR /&gt;storage:dt.security_context = "XYZ";&lt;/P&gt;&lt;P&gt;3. Grant only minimal storage:* read (e.g. storage:entities:read, storage:metrics:read, storage:events:read + optionally document:*) and apply the boundary to the group binding.&lt;/P&gt;&lt;P&gt;Should the boundary be on the MZ?&lt;BR /&gt;You can reference MZ in boundaries (environment:management-zone ...) only where supported. For Synthetic in the New UI (Grail), reliable entity-level scoping is storage: + dt.security_context, not MZ.&lt;/P&gt;&lt;P&gt;Common “leaks”: broad environment-wide grants and mixing role-based permissions with IAM.&lt;/P&gt;&lt;P&gt;What MZ still provides: mainly filtering/partitioning in views, not always hard ABAC for Grail data.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;To make building and validating these policies easier, I recommend using:&lt;BR /&gt;&lt;A href="https://omnilogy.pl/en/policy-manager" target="_self"&gt;Omnilogy- Policy Manager&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2026 12:54:47 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Synthetic-Monitoring/Scenario-Restrict-Team-to-only-their-MZ-Synthetic-Hosts-in-New/m-p/294862#M3350</guid>
      <dc:creator>t_pawlak</dc:creator>
      <dc:date>2026-02-17T12:54:47Z</dc:date>
    </item>
    <item>
      <title>Re: Scenario: Restrict Team to only their MZ (Synthetic + Hosts) in New UI</title>
      <link>https://community.dynatrace.com/t5/Synthetic-Monitoring/Scenario-Restrict-Team-to-only-their-MZ-Synthetic-Hosts-in-New/m-p/294876#M3351</link>
      <description>&lt;P&gt;Hello t_pawlak,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the reply and details. I will check and keep you posted.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2026 16:50:52 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Synthetic-Monitoring/Scenario-Restrict-Team-to-only-their-MZ-Synthetic-Hosts-in-New/m-p/294876#M3351</guid>
      <dc:creator>n_957</dc:creator>
      <dc:date>2026-02-17T16:50:52Z</dc:date>
    </item>
  </channel>
</rss>

