OneAgent security on Windows
To fully automate the monitoring of your operating systems, processes, and network interfaces, Dynatrace requires privileged access to your operating system during both installation and operation.
OneAgent is tested extensively to ensure that it has minimal performance impact on your system and conforms to the highest security standards.
OneAgent requires admin privileges on Windows, for both installation and operation.
OneAgent installer requires admin privileges to:
- Create the OneAgent service.
- Modify certain registry keys.
- Install packet capture driver (Npcap or WinPcap) for network metrics collection. For more information, see Packet capture driver (pcap).
- Install oneagentmon device.
OneAgent requires admin privileges to:
- List all processes.
- Get memory statistics for all processes.
- Read each process command line and environment.
- View the descriptions of executable files.
- Read application configuration for Apache and IIS
- View the list of libraries loaded for each process.
- Read Windows registry keys.
- Read .NET application domain for .NET 2.0, 3.0, and 3.5.
- Start monitoring network traffic.
- Parse executables for Go Discovery.
- Gather monitoring data related to Docker containers.
Operating system changes
OneAgent performs the following changes to your system:
OneAgent installer modifies the following aspects of your system:
Starting with version 1.195, no user account is created to run OneAgent extensions. Instead, the
NT AUTHORITY\SYSTEMprivileged system account is used. For more information, see OneAgent extension user.
Dynatrace OneAgentservice is created.
The Dynatrace OneAgent program is registered with Windows Installer.
oneagentmondriver is installed and
OneAgentMondevice is created. It's required to enable automatic injection into processes.
Registry sub-trees are created:
For OneAgent version 1.255+, Npcap is installed by default and may cause a network disruption on:
- Windows Server 2016
- Windows Server 2019 build 1809 without hotfix KB4571748
- Windows 10 build 1809 without hotfix KB4571748
For OneAgent version 1.253 and earlier, you need to uninstall any existing
WinPcapdriver to allow
Npcapinstallation. Do this on all Windows versions, except for
Windows Server 2019 build 1809 without hotfix KB4571748. For more information, see Uninstall WinPcap driver to allow Npcap installation.
Npcapdriver is installed with the
/admin_onlyflag set, which restricts Npcap's packet reading and writing to users with Administrator privileges only. Unprivileged users can't access Npcap's functionality on a monitored host. Note that WinPcap doesn't offer this restriction. For more information, see Customize OneAgent installation on Windows.
Make sure these Npcap and WinPcap operations are permitted in your system's security settings:
- Npcap: Writing registry values to
- Npcap: Reading and writing registry values to
- Winpcap: Reading and writing registry values to
- Npcap and Winpcap: Loading
- Npcap and Winpcap: Reading registry values regarding present network interfaces in
OneAgents installer adds the following files to your system:
- OneAgent binaries and configuration files are saved in
%PROGRAMFILES%\dynatrace\oneagent. Note that you can change the location using the INSTALL_PATH parameter.
- Installer temporary files are saved in
C:\AI_RecycleBin. The folder is deleted after the installation is complete.
- OneAgent temporary files and runtime configuration are saved in
- OneAgent persistent configuration is saved in
- Large runtime data, such as memory dumps, is saved in
%PROGRAMDATA%\dynatrace\oneagent\datastorage. Note that you can change the location of large runtime data using the DATA_STORAGE parameter.
System logs downloaded by OneAgent
OneAgent downloads Security, System, and Application system logs from the last 14 days so that Dynatrace can diagnose issues that may be caused by conditions in your environment. Most often such issues are related to deep monitoring or automatic updates.
To revoke access to system logs, use the
oneagentctl command with the
--set-system-logs-access-enabled parameter set to
For more information, see OneAgent configuration via command-line interface
Globally writable directories
The OneAgent directory structure contains globally writable directories (directories where the
Everyone user group can write, modify, or execute). Changing these permissions by users is not supported.
OneAgent injection mechanism
Such permissions on the selected set of directories are necessary for successful OneAgent injection into the processes on the monitored hosts. When OneAgent injects into a process, the code module responsible for injection runs in the context of the original injected process. Consequently, the users under which these processes are run need to be permitted to write into the OneAgent directory structure, which is the reason for the global write permissions that allow that.
Similarly, certain log files require global write permissions to allow applications running under various users to write to them.
We're aware that global read and write permissions on OneAgent directories get flagged by security scan heuristics, but we can assure you that they're fully secure.
- We keep the number of globally writable directories as limited as possible.
- We leverage advanced file permissions and use the
Creator Ownerpermission to limits access to files.
The OneAgent installer is signed against one or more DigiCert root certificates. For regularly maintained systems, Windows verifies that the OneAgent installer has been published by a verified publisher.
If your Windows-based system has been offline since March 2021 or longer, Windows won't be able to verify the installer and the OneAgent installer publisher will appear as Unknown publisher when you attempt an installation or update. In such a case, you need to download the latest certificate from DigiCert root certificates and add it to your system. Among all the DigiCert certificates, the
DigiCert Global Root G3 is mandatory for successful verification of the OneAgent installer.
- See How to: View certificates with the MMC snap-in in Microsoft docs to learn which root certificates are installed in your system.
- Download the latest root certificates from DigiCert root certificates.
Windows 2008 R2
Starting with OneAgent version 1.225, the installer is signed using the SHA-2 algorithm. Consequently, Windows 2008 R2 hosts are required to have SHA-2 code signing support installed. If you use Windows Update, the updates were offered to you automatically (KB4474419 and KB4490628). If, however, your Windows 2008 R2 system doesn't support verifying SHA-2 signed installers, OneAgent auto-update and installation won't work if
Applocker is configured to block unknown publishers and/or security warnings may be displayed. For more information, see the Microsoft 2019 SHA-2 Code Signing Support requirement for Windows and WSUS announcement.