<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Transition from Classic to New Application Security monitoring rules in Dynatrace tips</title>
    <link>https://community.dynatrace.com/t5/Dynatrace-tips/Transition-from-Classic-to-New-Application-Security-monitoring/m-p/278104#M1647</link>
    <description>&lt;P&gt;&lt;STRONG&gt;Glossary&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Resource &lt;/SPAN&gt;attribute = &lt;SPAN&gt;a key-value-pair that is sent by the Dynatrace OneAgent that is easily customisable by the customer.&lt;/SPAN&gt; (&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;A href="https://docs.dynatrace.com/docs/discover-dynatrace/platform/oneagent/resourcel-attributes" target="_self"&gt;Resource attributes - Dynatrace Docs&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; )&lt;/P&gt;
&lt;P&gt;K8s labels = Labels that are set on various Kubernetes resources when managing the Kubernetes environment (&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;A href="https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/" target="_self"&gt;Labels and Selectors&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; )&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Tips for engaging with the&lt;SPAN&gt; New &lt;/SPAN&gt;rules&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;We suggest creating the new rules &lt;STRONG&gt;first&lt;/STRONG&gt; and verifying with the per-rule preview to make sure the desired entities are matched.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;After you’re satisfied with the rules, you can flip the toggle called&lt;EM&gt; &lt;SPAN class=""&gt;Enable new monitoring rules&lt;/SPAN&gt;&lt;/EM&gt; in &lt;EM&gt;&lt;SPAN class=""&gt;Settings app &amp;gt; Application security &amp;gt; General settings&lt;/SPAN&gt;.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Every rule can consist of multiple conditions that are linked by a logical &lt;SPAN class=""&gt;AND&lt;/SPAN&gt; operator.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-unicode-emoji" title=":information:"&gt;ℹ️&lt;/span&gt;&lt;SPAN&gt;Please be mindful when switching the monitoring rules, as switching from Classic to New monitoring rules has an impact on the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;entities that you monitor.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The problem&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In classic Dynatrace, &lt;SPAN&gt;you &lt;/SPAN&gt;could define rules for Third-party vulnerabilities based on &lt;SPAN&gt;management zones&lt;/SPAN&gt;, &lt;SPAN&gt;host tags&lt;/SPAN&gt;, and process tags.&lt;/P&gt;
&lt;P&gt;This approach had some inconveniences:&lt;/P&gt;
&lt;UL class=""&gt;
&lt;LI&gt;
&lt;P&gt;Time delay when adding new entities to a management zone.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;The necessity to understand various Dynatrace &lt;SPAN&gt;concepts (like “management zones” and “tags”)&lt;/SPAN&gt; &lt;SPAN&gt;to create rules based on them. &lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;A lot of complexity and a lack of transparency on what will be monitored.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;One ruleset targeting different entity types, Application&lt;SPAN&gt; Security is&lt;/SPAN&gt; monitoring (processes, K8s resources)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;No ease-of-use when modifying rules (e.g., no &lt;SPAN&gt;auto-complete&lt;/SPAN&gt; - making the rule prone to typos)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;A different setup from code-level vulnerabilities and attack protection.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The &lt;SPAN&gt;solution&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;We introduced a new way of setting up what you want to monitor with Application Security.&lt;/P&gt;
&lt;P&gt;Existing customers are eligible to see &lt;SPAN&gt;both &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Classic&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; and &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;New&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; rules&lt;/SPAN&gt;, while new customers will only be able to see &lt;SPAN&gt;the &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;New&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; ones&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;Existing customers can see&lt;SPAN&gt; a toggle in the classic settings&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt; (&lt;/SPAN&gt;&lt;EM&gt;Application security &amp;gt; General settings&lt;/EM&gt;&lt;/SPAN&gt;) called &lt;EM&gt;&lt;SPAN class=""&gt;Enable new monitoring rules&lt;/SPAN&gt;&lt;/EM&gt; to switch between the rule sets.&lt;/P&gt;
&lt;DIV class=""&gt;
&lt;DIV class=""&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV class=""&gt;
&lt;DIV&gt;
&lt;DIV class=""&gt;
&lt;DIV class=""&gt;
&lt;DIV&gt;
&lt;DIV&gt; &lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RVA_Settings.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/28210i577E278D34138D7E/image-size/large?v=v2&amp;amp;px=999" role="button" title="RVA_Settings.png" alt="RVA_Settings.png" /&gt;&lt;/span&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;New&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; rules&lt;/SPAN&gt; are based on more transparent and straightforward concepts:&lt;/P&gt;
&lt;UL class=""&gt;
&lt;LI&gt;
&lt;P&gt;Library and runtime vulnerability monitoring can be configured using &lt;STRONG&gt;&lt;SPAN&gt;resource attributes&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt; for example, &lt;EM&gt;&lt;SPAN class=""&gt;host.name contains prod&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Kubernetes vulnerability monitoring can be configured using &lt;STRONG&gt;&lt;SPAN&gt;Kubernetes labels&lt;/SPAN&gt;&lt;/STRONG&gt;, for example, &lt;EM&gt;&lt;SPAN class=""&gt;kubernetes.io/hostname contains prod&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;We introduced more ease-of-use and transparency &lt;SPAN&gt;when setting up rules: &lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class=""&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;You get suggestions&lt;/SPAN&gt; for keys &amp;amp; values&lt;/P&gt;
&lt;UL class=""&gt;
&lt;LI&gt;
&lt;P&gt;Based on the information available in your environment&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;You’re still able to enter any text in these fields&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;You have more comparison options&lt;/SPAN&gt; (e.g. &lt;EM&gt;&lt;SPAN class=""&gt;contains&lt;/SPAN&gt;, &lt;SPAN class=""&gt;exists&lt;/SPAN&gt;, &lt;SPAN class=""&gt;startsWith&lt;/SPAN&gt;,&lt;/EM&gt; …)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;Each rule allows you to preview the entities that are matched with the &lt;/SPAN&gt;&lt;SPAN&gt;conditions&lt;/SPAN&gt;&lt;SPAN&gt; given&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV class=""&gt;
&lt;DIV class=""&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV class=""&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class=""&gt;
&lt;DIV class=""&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV class=""&gt;
&lt;DIV&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Rule_suggestions.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/28213i1EAD1A7230B0C428/image-size/large?v=v2&amp;amp;px=999" role="button" title="Rule_suggestions.png" alt="Rule_suggestions.png" /&gt;&lt;/span&gt;&lt;/DIV&gt;
&lt;DIV class="lia-align-center"&gt;&lt;EM&gt;Suggestions&lt;/EM&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Rule_preview.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/28214i866E48F54DC0C2D5/image-size/large?v=v2&amp;amp;px=999" role="button" title="Rule_preview.png" alt="Rule_preview.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Per-rule preview of matched entities of the rule&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You can read more &lt;/SPAN&gt;about the new monitoring rules in the public documentation: &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;A href="https://docs.dynatrace.com/docs/shortlink/tpv-monitoring-rules#new" target="_self"&gt;Monitoring rules - Third-party Vulnerability Analytics - Dynatrace Docs&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;We came up with a set of common use cases you could consider when setting up the “new” monitoring rules. &lt;SPAN&gt;They can also be found in the p&lt;/SPAN&gt;ublic documentation: &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;A href="https://docs.dynatrace.com/docs/secure/application-security/vulnerability-analytics/third-party-vulnerabilities/use-cases-monitoring-rules" target="_self"&gt;use cases for monitoring rules - Dynatrace Docs&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; .&lt;/P&gt;</description>
    <pubDate>Fri, 30 May 2025 06:54:58 GMT</pubDate>
    <dc:creator>dburgstaller</dc:creator>
    <dc:date>2025-05-30T06:54:58Z</dc:date>
    <item>
      <title>Transition from Classic to New Application Security monitoring rules</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/Transition-from-Classic-to-New-Application-Security-monitoring/m-p/278104#M1647</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Glossary&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Resource &lt;/SPAN&gt;attribute = &lt;SPAN&gt;a key-value-pair that is sent by the Dynatrace OneAgent that is easily customisable by the customer.&lt;/SPAN&gt; (&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;A href="https://docs.dynatrace.com/docs/discover-dynatrace/platform/oneagent/resourcel-attributes" target="_self"&gt;Resource attributes - Dynatrace Docs&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; )&lt;/P&gt;
&lt;P&gt;K8s labels = Labels that are set on various Kubernetes resources when managing the Kubernetes environment (&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;A href="https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/" target="_self"&gt;Labels and Selectors&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; )&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Tips for engaging with the&lt;SPAN&gt; New &lt;/SPAN&gt;rules&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;We suggest creating the new rules &lt;STRONG&gt;first&lt;/STRONG&gt; and verifying with the per-rule preview to make sure the desired entities are matched.&lt;/P&gt;
&lt;P class="lia-align-left"&gt;After you’re satisfied with the rules, you can flip the toggle called&lt;EM&gt; &lt;SPAN class=""&gt;Enable new monitoring rules&lt;/SPAN&gt;&lt;/EM&gt; in &lt;EM&gt;&lt;SPAN class=""&gt;Settings app &amp;gt; Application security &amp;gt; General settings&lt;/SPAN&gt;.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Every rule can consist of multiple conditions that are linked by a logical &lt;SPAN class=""&gt;AND&lt;/SPAN&gt; operator.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-unicode-emoji" title=":information:"&gt;ℹ️&lt;/span&gt;&lt;SPAN&gt;Please be mindful when switching the monitoring rules, as switching from Classic to New monitoring rules has an impact on the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;entities that you monitor.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The problem&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In classic Dynatrace, &lt;SPAN&gt;you &lt;/SPAN&gt;could define rules for Third-party vulnerabilities based on &lt;SPAN&gt;management zones&lt;/SPAN&gt;, &lt;SPAN&gt;host tags&lt;/SPAN&gt;, and process tags.&lt;/P&gt;
&lt;P&gt;This approach had some inconveniences:&lt;/P&gt;
&lt;UL class=""&gt;
&lt;LI&gt;
&lt;P&gt;Time delay when adding new entities to a management zone.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;The necessity to understand various Dynatrace &lt;SPAN&gt;concepts (like “management zones” and “tags”)&lt;/SPAN&gt; &lt;SPAN&gt;to create rules based on them. &lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;A lot of complexity and a lack of transparency on what will be monitored.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;One ruleset targeting different entity types, Application&lt;SPAN&gt; Security is&lt;/SPAN&gt; monitoring (processes, K8s resources)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;No ease-of-use when modifying rules (e.g., no &lt;SPAN&gt;auto-complete&lt;/SPAN&gt; - making the rule prone to typos)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;A different setup from code-level vulnerabilities and attack protection.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The &lt;SPAN&gt;solution&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;We introduced a new way of setting up what you want to monitor with Application Security.&lt;/P&gt;
&lt;P&gt;Existing customers are eligible to see &lt;SPAN&gt;both &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Classic&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; and &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;New&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; rules&lt;/SPAN&gt;, while new customers will only be able to see &lt;SPAN&gt;the &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;New&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; ones&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;Existing customers can see&lt;SPAN&gt; a toggle in the classic settings&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt; (&lt;/SPAN&gt;&lt;EM&gt;Application security &amp;gt; General settings&lt;/EM&gt;&lt;/SPAN&gt;) called &lt;EM&gt;&lt;SPAN class=""&gt;Enable new monitoring rules&lt;/SPAN&gt;&lt;/EM&gt; to switch between the rule sets.&lt;/P&gt;
&lt;DIV class=""&gt;
&lt;DIV class=""&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV class=""&gt;
&lt;DIV&gt;
&lt;DIV class=""&gt;
&lt;DIV class=""&gt;
&lt;DIV&gt;
&lt;DIV&gt; &lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RVA_Settings.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/28210i577E278D34138D7E/image-size/large?v=v2&amp;amp;px=999" role="button" title="RVA_Settings.png" alt="RVA_Settings.png" /&gt;&lt;/span&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;New&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; rules&lt;/SPAN&gt; are based on more transparent and straightforward concepts:&lt;/P&gt;
&lt;UL class=""&gt;
&lt;LI&gt;
&lt;P&gt;Library and runtime vulnerability monitoring can be configured using &lt;STRONG&gt;&lt;SPAN&gt;resource attributes&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt; for example, &lt;EM&gt;&lt;SPAN class=""&gt;host.name contains prod&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Kubernetes vulnerability monitoring can be configured using &lt;STRONG&gt;&lt;SPAN&gt;Kubernetes labels&lt;/SPAN&gt;&lt;/STRONG&gt;, for example, &lt;EM&gt;&lt;SPAN class=""&gt;kubernetes.io/hostname contains prod&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;We introduced more ease-of-use and transparency &lt;SPAN&gt;when setting up rules: &lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class=""&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;You get suggestions&lt;/SPAN&gt; for keys &amp;amp; values&lt;/P&gt;
&lt;UL class=""&gt;
&lt;LI&gt;
&lt;P&gt;Based on the information available in your environment&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;You’re still able to enter any text in these fields&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;You have more comparison options&lt;/SPAN&gt; (e.g. &lt;EM&gt;&lt;SPAN class=""&gt;contains&lt;/SPAN&gt;, &lt;SPAN class=""&gt;exists&lt;/SPAN&gt;, &lt;SPAN class=""&gt;startsWith&lt;/SPAN&gt;,&lt;/EM&gt; …)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;Each rule allows you to preview the entities that are matched with the &lt;/SPAN&gt;&lt;SPAN&gt;conditions&lt;/SPAN&gt;&lt;SPAN&gt; given&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV class=""&gt;
&lt;DIV class=""&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV class=""&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class=""&gt;
&lt;DIV class=""&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV class=""&gt;
&lt;DIV&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Rule_suggestions.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/28213i1EAD1A7230B0C428/image-size/large?v=v2&amp;amp;px=999" role="button" title="Rule_suggestions.png" alt="Rule_suggestions.png" /&gt;&lt;/span&gt;&lt;/DIV&gt;
&lt;DIV class="lia-align-center"&gt;&lt;EM&gt;Suggestions&lt;/EM&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Rule_preview.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/28214i866E48F54DC0C2D5/image-size/large?v=v2&amp;amp;px=999" role="button" title="Rule_preview.png" alt="Rule_preview.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;EM&gt;Per-rule preview of matched entities of the rule&lt;/EM&gt;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You can read more &lt;/SPAN&gt;about the new monitoring rules in the public documentation: &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;A href="https://docs.dynatrace.com/docs/shortlink/tpv-monitoring-rules#new" target="_self"&gt;Monitoring rules - Third-party Vulnerability Analytics - Dynatrace Docs&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;We came up with a set of common use cases you could consider when setting up the “new” monitoring rules. &lt;SPAN&gt;They can also be found in the p&lt;/SPAN&gt;ublic documentation: &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;A href="https://docs.dynatrace.com/docs/secure/application-security/vulnerability-analytics/third-party-vulnerabilities/use-cases-monitoring-rules" target="_self"&gt;use cases for monitoring rules - Dynatrace Docs&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; .&lt;/P&gt;</description>
      <pubDate>Fri, 30 May 2025 06:54:58 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/Transition-from-Classic-to-New-Application-Security-monitoring/m-p/278104#M1647</guid>
      <dc:creator>dburgstaller</dc:creator>
      <dc:date>2025-05-30T06:54:58Z</dc:date>
    </item>
  </channel>
</rss>

