Dynatrace RUM Technology Detection Scanner
This scanner detects the use of Dynatrace RUM in digital assets. It helps in identifying the presence of Dynatrace Real User Monitoring and OneAgent artifacts.
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
20 days 17 hours
Scan only one
URL
Toolbox
Dynatrace RUM, or Real User Monitoring, is widely used by organizations to monitor and analyze user interactions with their web applications. Businesses leverage this tool to gain insights into user behavior, optimize performance, and enhance user experience across different platforms. It integrates with web and mobile applications, providing real-time data on user activity. IT teams and developers use Dynatrace RUM to identify potential bottlenecks and issues impacting performance. Overall, it is an essential tool for businesses aiming to ensure seamless digital experiences for their users.
The purpose of this scanner is to detect the presence of Dynatrace RUM and OneAgent artifacts on digital assets. By doing so, it identifies the implementation of this technology within a website's infrastructure. The detection helps organizations verify the use of Dynatrace's monitoring solutions in their digital assets. It's designed to recognize specific patterns and configurations related to Dynatrace. This assists in understanding the scope of monitoring practices within their web environments.
Technical details about this detection focus on identifying specific JavaScript artifacts and configurations associated with Dynatrace RUM. The primary target is the presence of the "ruxitagentjs_" script and "data-dtconfig=" configuration within a webpage's body. A successful match is confirmed when the HTTP response status is 200 and the specified artifacts are detected. The scanner efficiently checks for these elements while following any redirects. This ensures a comprehensive scan across the intended digital assets.
If detected improperly or without authorization, the use of Dynatrace RUM could expose sensitive user interaction data to unauthorized parties. Malicious actors could potentially exploit the technology for unauthorized monitoring or exploitation of user data. Further, it might indicate the presence of third-party monitoring which could lead to privacy concerns. Organizations must ensure that such monitoring tools are correctly configured and authorized within their network infrastructure.
REFERENCES