- 重要な情報
- アプリ内
- インフラストラクチャー
- アプリケーションパフォーマンス
- 継続的インテグレーション
- ログ管理
- セキュリティ
- UX モニタリング
- 管理
The Findings Explorer allows you to:
In addition to reviewing and responding to findings, you can set notifications for failed findings, and configure signals to correlate and triage misconfigurations in the same view as real-time threats generated by Cloud SIEM and Cloud Workload Security. This allows users to accelerate investigations as the root-cause for many of today’s cloud breaches are misconfigured services that have been nefariously exploited.
A finding is the primary primitive for a rule evaluation against a resource. Every time a resource is evaluated against a rule, a finding is generated with a Pass or Fail status. Resources are evaluated in increments between 15 minutes and four hours (depending on type). Datadog generates new findings as soon as a new scan is completed, and stores a complete history of all findings for the past 15 months so they are available in case of an investigation or audit.
Clicking on an individual finding that has failed to see details about the misconfigured resource, the rule description, its framework or industry benchmark mapping, and suggested remediation steps.
Aggregate findings by rule using the query search bar. This view shows a checklist of all of the detection rules that Datadog scans. Filtering by evaluation:fail
status narrows the list to all detection rules that have issues that need to be addressed. The side panel shows details of each resource that has been evaluated by the rule.
The side panel shows details of each resource that has been evaluated by the rule.
Findings can also be aggregated by resource to rank order resources that have failed the most rule evaluations so you can prioritize remediation.
The side panel lists detection rules that were evaluated against the resource, some of which you may choose to be addressed to improve your security configuration posture.
Muted findings is a beta feature available to all CSPM customers. If you have feedback or questions, contact Datadog support.
Sometimes, a finding does not match the use case for your business, or you choose to accept it as a known risk. To ignore these findings, mute the finding for the impacted resource so you can focus on high-severity and critical findings.
For example, the ‘Block Public Access’ feature is enabled for S3 bucket rule evaluates whether an S3 bucket is publicly accessible. If you have an S3 bucket with static assets that are meant to be publicly shared, you can mute the finding for the S3 bucket.
You can mute pass/fail findings at any time. Muting a finding removes it from the calculation of your posture score.
Muted findings automatically unmute after the specified mute duration expires. You can also manually unmute a finding.
To view your organization’s muted findings: