This website uses Cookies. Click Accept to agree to our website's cookie use as described in our Privacy Policy. Click Preferences to customize your cookie settings.
This is a Self Service Diagnostics article of type Partial-Self-Service.
Self Service Summary
Issue
Solution
Tasks
Alternative
A Dynatrace component is suspected ...
Self Service Summary
This article of type Full-Self-Service gives an overview about Kubernetes monitoring modes and helps with known false positive scan results for Dynatrace on Kubernetes.
...
Self Service Summary
Security Team is asking to "enable HSTS", is alerting that "HSTS is missing", "Strict Transport Security Not Enforced", or that the "Strict Transport Securit...
Self Service Summary
Security Team is reporting "missing httpOnly flag for dtCookie" or "Dynatrace cookies are vulnerable because httpOnly attribute is not set".
Issue
Solution
...
Self Service Summary
Some customers have detected exposure to the "LUCKY13 Vulnerability attack" in their VA scans for our Managed component. Also known as CVE-2013-0169, this vulnerability has be...
Self Service Summary
Security team or scan/vulnerability assessment is reporting that a Dynatrace component is using vulnerable ciphers (an insecure certificate) and affected ciphers shoul...
We are soon going to have MFA enforced on all customer logins to our portals. This MFA is a regular OTP that goes to user's as SMS or Email.
From security stand point there is no way we can a...
Hello, We are a small Dynatrace team working within a large organization, focusing on a self-serve model where "Power Users" manage application monitoring. Recently, we've encountered challenges wit...
Hello All, To keep it simple: - Segments are simply put, filters and security context can be used as a kind of ACL - You can only have one security context, this is as designed - Security c...
Hi, team
Is there a way to mask log fields for specific roles?
I'd like Team A to have access to the original data, while Team B would like the field masked.