- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Datadog Cloud SIEM detects real-time threats to your application and infrastructure. These threats can include a targeted attack, a threat intel listed IP communicating with your systems, or an insecure configuration. Once detected, a signal is generated and a notification can be sent out to your team.
This guide walks you through best practices for getting started with Cloud SIEM.
Configure log ingestion to collect logs from your sources. Review Best Practices for Log Management.
You can use out-of-the-box integration pipelines to collect logs for more than 850 integrations, or create custom log pipelines to send:
Enable Cloud SIEM.
Select and configure Content Packs, which provide out-of-the-box content for critical security log sources.
Select and configure additional log sources you want Cloud SIEM to analyze.
Click Activate. A custom Cloud SIEM log index (cloud-siem-xxxx
) is created.
If the Cloud SIEM setup page shows the warning “The Cloud SIEM index is not in the first position”, follow the steps in the Reorder the Cloud SIEM index section.
Click Reorder index in Logs Configuration.
Confirm the modal title says “Move cloud-siem-xxxx to…” and that the cloud-siem-xxxx
text in the index column is light purple.
cloud-siem-xxxx
to go. For example, if you want to make the cloud-siem-xxxx
index the first index, click on the line above the current first index. The new position is highlighted with a thick blue line.The text confirms the position selected: “Select the new placement of your index: Position 1”. Click Move.
Review the warning text. If you are satisfied with the change, click Reorder.
Review the index order and confirm that the cloud-siem-xxxx
index is where you want it. If you want to move the index, click the Move to icon and follow steps 3 to 5.
Navigate back to the Cloud SIEM setup page.
The Cloud SIEM index should be in the first index position now. If the setup page still displays a warning about the index position, wait a few minutes and refresh the browser.
After the index is moved to the first index position, review the settings and statuses for the Content Packs and other log sources. For each integration that shows a warning or an error, click on the integration and follow the instructions to fix it.
Review the out-of-the-box detection rules that begin detecting threats in your environment immediately. Detection rules apply to all processed logs to maximize detection coverage. See the detection rules documentation for more information.
Explore security signals. When a threat is detected with a detection rule, a security signal is generated. See the security signals documentation for more information.
추가 유용한 문서, 링크 및 기사: