<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article AppSec: Reported vulnerability is considered as a false positive in Troubleshooting</title>
    <link>https://community.dynatrace.com/t5/Troubleshooting/AppSec-Reported-vulnerability-is-considered-as-a-false-positive/ta-p/195677</link>
    <description>&lt;DIV class=""&gt;
&lt;DIV class=""&gt;
&lt;PRE&gt;This article is about using Dynatrace AppSec and dealing with reported false-positives in your applications.&lt;BR /&gt;Looking for &lt;SPAN&gt;known CVEs in Dynatrace components&lt;/SPAN&gt;? Go to &lt;A href="https://cve-status.dynatrace.com" target="_blank" rel="noopener"&gt;https://cve-status.dynatrace.com&lt;/A&gt;&lt;/PRE&gt;
&lt;P&gt;This is a Self Service Diagnostics article of type&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;&lt;SPAN class=""&gt;Full-Self-Service&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;For unexpected product issues on the Dynatrace side please submit a Support Ticket.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H2&gt;Self Service Summary&lt;/H2&gt;
&lt;TABLE border="1" cellpadding="10"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Issue&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Solution&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Tasks&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Alternative&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;SPAN class=""&gt;Reported third-party vulnerabilities for certain process groups or Kubernetes nodes are not relevant for your environment&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN class=""&gt;Mute entities: They will be hidden and not taken into account for Application Security metrics or Davis Security Score&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN class=""&gt;Mute* entities via UI (&lt;A href="https://www.dynatrace.com/support/help/how-to-use-dynatrace/application-security/filter-third-party-vulnerabilities#mute" target="_blank" rel="noopener"&gt;security problem&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or its&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.dynatrace.com/support/help/how-to-use-dynatrace/application-security/remediation-tracking" target="_blank" rel="noopener"&gt;individual items&lt;/A&gt;) or API (&lt;A href="https://www.dynatrace.com/support/help/dynatrace-api/environment-api/application-security/security-problems/post-problem-mute" target="_blank" rel="noopener"&gt;security problem&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.dynatrace.com/support/help/dynatrace-api/environment-api/application-security/security-problems/put-remediation-items" target="_blank" rel="noopener"&gt;individual items&lt;/A&gt;)&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN class=""&gt;Set up fine-grained&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.dynatrace.com/support/help/how-to-use-dynatrace/application-security/define-monitoring-rules" target="_blank" rel="noopener"&gt;Security-monitoring rules&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for affected processes, e.g. based on process or host tags&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN class=""&gt;* Available mute state changes include CONFIGURATION_NOT_AFFECTED, FALSE_POSITIVE, IGNORE, OTHER, VULNERABLE_CODE_NOT_IN_USE&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The following query examples may be helpful to identify relevant processes before muting them:&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;H2&gt;Filter by Java version&lt;/H2&gt;
&lt;P&gt;This example shows how to filter out processes of a security problem with a Java version &amp;lt; 9.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;Steps to reproduce:&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;A href="https://www.dynatrace.com/support/help/dynatrace-api/environment-api/application-security/security-problems/get-all" target="_blank" rel="noopener"&gt;Get all security problems&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.dynatrace.com/support/help/dynatrace-api/environment-api/application-security/security-problems/get-problem" target="_self"&gt;For each: Get a list of "affectedEntities" (processes)&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.dynatrace.com/support/help/dynatrace-api/environment-api/entity-v2/get-entity" target="_self"&gt;For each: Get entity (process) property "softwareTechnologies"&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and filter by version ("type"="JAVA")&lt;/LI&gt;
&lt;/OL&gt;
&lt;PRE&gt;...&lt;BR /&gt;"softwareTechnologies": [&lt;BR /&gt;  {&lt;BR /&gt;    "type": "JAVA"&lt;BR /&gt;  },&lt;BR /&gt;  {&lt;BR /&gt;    "type": "JAVA",&lt;BR /&gt;    "edition": "OpenJDK",&lt;BR /&gt;    "version": "1.8.0_312"&lt;BR /&gt;  },&lt;BR /&gt;...&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN class=""&gt;Related Python script:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/robinwyss/spring4shell-dynatrace-export" target="_blank" rel="noopener noreferrer"&gt;https://github.com/robinwyss/spring4shell-dynatrace-export&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H2&gt;Filter by third-party library data&lt;/H2&gt;
&lt;P&gt;This example shows how to identify processes with a certain third-party library package name or version.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;Step to reproduce:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.dynatrace.com/support/help/dynatrace-api/environment-api/entity-v2/get-entities-list" target="_self" rel="undefined"&gt;Get entities&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;using&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;"entitySelector" type(SOFTWARE_COMPONENT), softwareComponentType(JAVA) and your specific criteria e.g. packageName(org.springframework.boot:spring-boot), softwareComponentFileName(spring-boot-1.5.12.RELEASE.jar), or softwareComponentShortName(spring-boot),&lt;BR /&gt;and response "fields" fromRelationships.isSoftwareComponentOfPgi to retrieve affected processes.&lt;/LI&gt;
&lt;LI&gt;previously identified Process Group Instances and response "fields" fromRelationships.isInstanceOf to retrieve affected Process Groups required for remediation.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;Notes&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The libraries in use by PROCESS_GROUP_INSTANCES are reported as SOFTWARE_COMPONENT entities by the OneAgent.&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Possible properties of an entity of a specified type can be listed via the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.dynatrace.com/support/help/dynatrace-api/environment-api/entity-v2/get-entity-type" target="_self" rel="undefined"&gt;entityTypes API&lt;/A&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Request 1&lt;/STRONG&gt;:&lt;/P&gt;
&lt;PRE&gt;GET /api/v2/entities?entitySelector=type(SOFTWARE_COMPONENT),softwareComponentType(JAVA),packageName(org.springframework.boot:spring-boot)&amp;amp;fields=properties.packageName,properties.softwareComponentFileName,properties.softwareComponentShortName,properties.softwareComponentType,fromRelationships.isSoftwareComponentOfPgi&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;Response&lt;/STRONG&gt;:&lt;/P&gt;
&lt;PRE&gt;...&lt;BR /&gt;"entities": [&lt;BR /&gt;  {&lt;BR /&gt;    "entityId": "SOFTWARE_COMPONENT-x",&lt;BR /&gt;    "displayName": "org.springframework.boot:spring-boot:1.5.12.RELEASE",&lt;BR /&gt;    "properties": {&lt;BR /&gt;      "softwareComponentFileName": "spring-boot-1.5.12.RELEASE.jar",&lt;BR /&gt;      "softwareComponentType": "JAVA",&lt;BR /&gt;      "softwareComponentShortName": "spring-boot",&lt;BR /&gt;      "packageName": "org.springframework.boot:spring-boot"&lt;BR /&gt;    },&lt;BR /&gt;    "fromRelationships": {&lt;BR /&gt;      "isSoftwareComponentOfPgi": [&lt;BR /&gt;        {&lt;BR /&gt;          "id": "PROCESS_GROUP_INSTANCE-x",&lt;BR /&gt;          "type": "PROCESS_GROUP_INSTANCE"&lt;BR /&gt;        },&lt;BR /&gt;        {&lt;BR /&gt;          "id": "PROCESS_GROUP_INSTANCE-x",&lt;BR /&gt;          "type": "PROCESS_GROUP_INSTANCE"&lt;BR /&gt;        }&lt;BR /&gt;      ]&lt;BR /&gt;    }&lt;BR /&gt;  }&lt;BR /&gt;]&lt;BR /&gt;...&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Request 2&lt;/STRONG&gt;:&lt;/P&gt;
&lt;PRE&gt;GET /api/v2/entities/PROCESS_GROUP_INSTANCE-x?fields=fromRelationships.isInstanceOf&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;Response&lt;/STRONG&gt;:&lt;/P&gt;
&lt;PRE&gt;{ &lt;BR /&gt;  "entityId": "PROCESS_GROUP_INSTANCE-x", &lt;BR /&gt;  "type": "PROCESS_GROUP_INSTANCE", &lt;BR /&gt;  "displayName": "NAME", &lt;BR /&gt;  "fromRelationships": { &lt;BR /&gt;    "isInstanceOf": [ &lt;BR /&gt;      { &lt;BR /&gt;        "id": "PROCESS_GROUP-x", &lt;BR /&gt;        "type": "PROCESS_GROUP" &lt;BR /&gt;      } &lt;BR /&gt;    ] &lt;BR /&gt;  } &lt;BR /&gt;}&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Tue, 21 Oct 2025 16:20:01 GMT</pubDate>
    <dc:creator>stefanie_pachne</dc:creator>
    <dc:date>2025-10-21T16:20:01Z</dc:date>
    <item>
      <title>AppSec: Reported vulnerability is considered as a false positive</title>
      <link>https://community.dynatrace.com/t5/Troubleshooting/AppSec-Reported-vulnerability-is-considered-as-a-false-positive/ta-p/195677</link>
      <description>&lt;DIV class=""&gt;
&lt;DIV class=""&gt;
&lt;PRE&gt;This article is about using Dynatrace AppSec and dealing with reported false-positives in your applications.&lt;BR /&gt;Looking for &lt;SPAN&gt;known CVEs in Dynatrace components&lt;/SPAN&gt;? Go to &lt;A href="https://cve-status.dynatrace.com" target="_blank" rel="noopener"&gt;https://cve-status.dynatrace.com&lt;/A&gt;&lt;/PRE&gt;
&lt;P&gt;This is a Self Service Diagnostics article of type&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;&lt;SPAN class=""&gt;Full-Self-Service&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;For unexpected product issues on the Dynatrace side please submit a Support Ticket.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H2&gt;Self Service Summary&lt;/H2&gt;
&lt;TABLE border="1" cellpadding="10"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Issue&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Solution&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Tasks&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Alternative&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;SPAN class=""&gt;Reported third-party vulnerabilities for certain process groups or Kubernetes nodes are not relevant for your environment&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN class=""&gt;Mute entities: They will be hidden and not taken into account for Application Security metrics or Davis Security Score&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN class=""&gt;Mute* entities via UI (&lt;A href="https://www.dynatrace.com/support/help/how-to-use-dynatrace/application-security/filter-third-party-vulnerabilities#mute" target="_blank" rel="noopener"&gt;security problem&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or its&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.dynatrace.com/support/help/how-to-use-dynatrace/application-security/remediation-tracking" target="_blank" rel="noopener"&gt;individual items&lt;/A&gt;) or API (&lt;A href="https://www.dynatrace.com/support/help/dynatrace-api/environment-api/application-security/security-problems/post-problem-mute" target="_blank" rel="noopener"&gt;security problem&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.dynatrace.com/support/help/dynatrace-api/environment-api/application-security/security-problems/put-remediation-items" target="_blank" rel="noopener"&gt;individual items&lt;/A&gt;)&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN class=""&gt;Set up fine-grained&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.dynatrace.com/support/help/how-to-use-dynatrace/application-security/define-monitoring-rules" target="_blank" rel="noopener"&gt;Security-monitoring rules&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for affected processes, e.g. based on process or host tags&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;SPAN class=""&gt;* Available mute state changes include CONFIGURATION_NOT_AFFECTED, FALSE_POSITIVE, IGNORE, OTHER, VULNERABLE_CODE_NOT_IN_USE&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The following query examples may be helpful to identify relevant processes before muting them:&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;H2&gt;Filter by Java version&lt;/H2&gt;
&lt;P&gt;This example shows how to filter out processes of a security problem with a Java version &amp;lt; 9.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;Steps to reproduce:&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;A href="https://www.dynatrace.com/support/help/dynatrace-api/environment-api/application-security/security-problems/get-all" target="_blank" rel="noopener"&gt;Get all security problems&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.dynatrace.com/support/help/dynatrace-api/environment-api/application-security/security-problems/get-problem" target="_self"&gt;For each: Get a list of "affectedEntities" (processes)&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.dynatrace.com/support/help/dynatrace-api/environment-api/entity-v2/get-entity" target="_self"&gt;For each: Get entity (process) property "softwareTechnologies"&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and filter by version ("type"="JAVA")&lt;/LI&gt;
&lt;/OL&gt;
&lt;PRE&gt;...&lt;BR /&gt;"softwareTechnologies": [&lt;BR /&gt;  {&lt;BR /&gt;    "type": "JAVA"&lt;BR /&gt;  },&lt;BR /&gt;  {&lt;BR /&gt;    "type": "JAVA",&lt;BR /&gt;    "edition": "OpenJDK",&lt;BR /&gt;    "version": "1.8.0_312"&lt;BR /&gt;  },&lt;BR /&gt;...&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN class=""&gt;Related Python script:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/robinwyss/spring4shell-dynatrace-export" target="_blank" rel="noopener noreferrer"&gt;https://github.com/robinwyss/spring4shell-dynatrace-export&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H2&gt;Filter by third-party library data&lt;/H2&gt;
&lt;P&gt;This example shows how to identify processes with a certain third-party library package name or version.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;Step to reproduce:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.dynatrace.com/support/help/dynatrace-api/environment-api/entity-v2/get-entities-list" target="_self" rel="undefined"&gt;Get entities&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;using&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;"entitySelector" type(SOFTWARE_COMPONENT), softwareComponentType(JAVA) and your specific criteria e.g. packageName(org.springframework.boot:spring-boot), softwareComponentFileName(spring-boot-1.5.12.RELEASE.jar), or softwareComponentShortName(spring-boot),&lt;BR /&gt;and response "fields" fromRelationships.isSoftwareComponentOfPgi to retrieve affected processes.&lt;/LI&gt;
&lt;LI&gt;previously identified Process Group Instances and response "fields" fromRelationships.isInstanceOf to retrieve affected Process Groups required for remediation.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;Notes&lt;/STRONG&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The libraries in use by PROCESS_GROUP_INSTANCES are reported as SOFTWARE_COMPONENT entities by the OneAgent.&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Possible properties of an entity of a specified type can be listed via the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.dynatrace.com/support/help/dynatrace-api/environment-api/entity-v2/get-entity-type" target="_self" rel="undefined"&gt;entityTypes API&lt;/A&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Request 1&lt;/STRONG&gt;:&lt;/P&gt;
&lt;PRE&gt;GET /api/v2/entities?entitySelector=type(SOFTWARE_COMPONENT),softwareComponentType(JAVA),packageName(org.springframework.boot:spring-boot)&amp;amp;fields=properties.packageName,properties.softwareComponentFileName,properties.softwareComponentShortName,properties.softwareComponentType,fromRelationships.isSoftwareComponentOfPgi&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;Response&lt;/STRONG&gt;:&lt;/P&gt;
&lt;PRE&gt;...&lt;BR /&gt;"entities": [&lt;BR /&gt;  {&lt;BR /&gt;    "entityId": "SOFTWARE_COMPONENT-x",&lt;BR /&gt;    "displayName": "org.springframework.boot:spring-boot:1.5.12.RELEASE",&lt;BR /&gt;    "properties": {&lt;BR /&gt;      "softwareComponentFileName": "spring-boot-1.5.12.RELEASE.jar",&lt;BR /&gt;      "softwareComponentType": "JAVA",&lt;BR /&gt;      "softwareComponentShortName": "spring-boot",&lt;BR /&gt;      "packageName": "org.springframework.boot:spring-boot"&lt;BR /&gt;    },&lt;BR /&gt;    "fromRelationships": {&lt;BR /&gt;      "isSoftwareComponentOfPgi": [&lt;BR /&gt;        {&lt;BR /&gt;          "id": "PROCESS_GROUP_INSTANCE-x",&lt;BR /&gt;          "type": "PROCESS_GROUP_INSTANCE"&lt;BR /&gt;        },&lt;BR /&gt;        {&lt;BR /&gt;          "id": "PROCESS_GROUP_INSTANCE-x",&lt;BR /&gt;          "type": "PROCESS_GROUP_INSTANCE"&lt;BR /&gt;        }&lt;BR /&gt;      ]&lt;BR /&gt;    }&lt;BR /&gt;  }&lt;BR /&gt;]&lt;BR /&gt;...&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Request 2&lt;/STRONG&gt;:&lt;/P&gt;
&lt;PRE&gt;GET /api/v2/entities/PROCESS_GROUP_INSTANCE-x?fields=fromRelationships.isInstanceOf&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;Response&lt;/STRONG&gt;:&lt;/P&gt;
&lt;PRE&gt;{ &lt;BR /&gt;  "entityId": "PROCESS_GROUP_INSTANCE-x", &lt;BR /&gt;  "type": "PROCESS_GROUP_INSTANCE", &lt;BR /&gt;  "displayName": "NAME", &lt;BR /&gt;  "fromRelationships": { &lt;BR /&gt;    "isInstanceOf": [ &lt;BR /&gt;      { &lt;BR /&gt;        "id": "PROCESS_GROUP-x", &lt;BR /&gt;        "type": "PROCESS_GROUP" &lt;BR /&gt;      } &lt;BR /&gt;    ] &lt;BR /&gt;  } &lt;BR /&gt;}&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 21 Oct 2025 16:20:01 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Troubleshooting/AppSec-Reported-vulnerability-is-considered-as-a-false-positive/ta-p/195677</guid>
      <dc:creator>stefanie_pachne</dc:creator>
      <dc:date>2025-10-21T16:20:01Z</dc:date>
    </item>
    <item>
      <title>Re: Reported vulnerability is considered as a false positive</title>
      <link>https://community.dynatrace.com/t5/Troubleshooting/AppSec-Reported-vulnerability-is-considered-as-a-false-positive/tac-p/202027#M100</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/28409"&gt;@stefanie_pachne&lt;/a&gt;&amp;nbsp;for sharing this &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 14:56:38 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Troubleshooting/AppSec-Reported-vulnerability-is-considered-as-a-false-positive/tac-p/202027#M100</guid>
      <dc:creator>ChadTurner</dc:creator>
      <dc:date>2023-01-10T14:56:38Z</dc:date>
    </item>
  </channel>
</rss>

