How This Briefing Works
This report opens with key findings, then maps the gaps between what Dynatrace discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Analysis pending. Findings will appear here once intelligence collection is complete.
Claims vs. Observed Behavior
pending
“Requires scanner verification of runtime behavior”
Analysis based on Dynatrace documentation, community forums, and court filings
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
Recommended Actions for Dynatrace
- →- Configure Session Replay masking using Dynatrace's Allow List mode to explicitly define what content is captured rather than relying on blocklist masking. - Implement opt-in mode for session replay to ensure users provide informed consent before recordings begin. - Audit role-based access controls to restrict session replay viewing to authorized teams only. - Review data retention policies for session recordings separately from APM telemetry to minimize PII exposure windows. - Evaluate URL exclusion rules to prevent session recording on sensitive pages (payment, account settings, healthcare portals).
Negotiation Leverage
- →Leverage: Dynatrace's primary value is APM and infrastructure monitoring, not session replay. Use this to negotiate session replay as an add-on with specific data handling terms rather than accepting platform-wide data processing defaults. Key questions: Can session replay data be isolated from APM telemetry in terms of access controls and retention? What is the data residency for session recordings specifically? Does Dynatrace use session replay data for any internal purposes (model training, benchmarking)? Protections to require: Separate data processing addendum for session replay data. Contractual prohibition on using session recordings for purposes beyond the stated use case. Right to audit masking configuration. Data deletion SLA for session recordings upon contract termination or feature deactivation.
IOC Manifest
Indicators of compromise across 3 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
99 detection signatures across scripts, domains, cookies, and network endpoints