このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください
Join the Preview!

Vulnerability Pipeline is in Preview. To enroll in the Preview for Add to Security Inbox rules, click Request Access.

Request Access

Configure inbox rules to manage your Security Inbox effectively, ensuring only the most relevant security issues are highlighted. By customizing conditions, you can focus on critical concerns, prioritize key risks, support compliance, and bring attention to issues that might otherwise be overlooked.

Create an inbox rule

  1. On the Vulnerability Pipeline page, click Add a New Rule and select Add to Security Inbox.
  2. Enter a descriptive name for the rule, for example, Cloud Infrastructure Anomaly Warnings.
  3. Use the following boxes to configure the rule criteria:
    • Any of these types: The types of findings that the rule should check for. Available types include Misconfiguration, Attack Path, Identity Risk, and API Security Finding.
    • Any of these tags or attributes: The resource tags or attributes that must match for the rule to apply.
  4. To add severity criteria to the rule, click Add Severity.
  5. Click Save.

Rule matching order

When Datadog identifies a vulnerability, it evaluates the vulnerability against your sequence of inbox rules. Starting with the first rule, if there’s a match, Datadog adds the vulnerability to the Security Inbox and stops evaluating further. If no match occurs, Datadog moves to the next rule. This process continues until a match is found or all rules are checked without a match.

Further reading

お役に立つドキュメント、リンクや記事: