Application Security and monitoring modes
The deployed Dynatrace monitoring mode can influence the Application Security results displayed in Dynatrace.
Full-Stack Monitoring mode
recommended
Full-Stack Monitoring provides complete application performance monitoring, code-level visibility, deep process monitoring, and Infrastructure Monitoring (including PaaS platforms).
Infrastructure Monitoring mode
Infrastructure Monitoring, where OneAgent is configured to provide physical and virtual infrastructure-centric monitoring, necessarily provides less complete monitoring.
-
In an Infrastructure Monitoring deployment, Davis® AI cannot adapt the Davis Security Score. In this case, the vulnerability risk value can't be reevaluated, as this can only happen based on the topology information extracted from your environment, and the DSS will be the same as the CVSS base score.
-
Infrastructure Monitoring mode lacks environmental information, such as reachable data assets or public internet exposure, and limits information on related entities, such as databases and services. A full assessment can be performed only on vulnerabilities that have all related hosts under Full-Stack Monitoring.
- If related hosts are running in infrastructure-only mode, there's not enough data sent by OneAgents to examine whether there's exposure or sensitive data affected, therefore the values for public internet exposure and reachable data assets are set to
Not available
. - If all related hosts are running in full-stack mode except one, which runs in infrastructure-only mode, and the vulnerability isn't exposed or affected (based on the hosts in full-stack mode), the values for public internet exposure and reachable data assets are set to
Not available
. However, if at least one related host is running in full-stack mode and the vulnerability is exposed or affected, the public internet exposure and reachable data assets features are displayed.
- If related hosts are running in infrastructure-only mode, there's not enough data sent by OneAgents to examine whether there's exposure or sensitive data affected, therefore the values for public internet exposure and reachable data assets are set to