- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`This topic describes threat intelligence for App and API Protection (AAP).
Datadog provides built-in threat intelligence datasets for AAP. This provides additional evidence when acting on security activity and reduces detection thresholds for some business logic detections.
Additionally, AAP supports bring your own threat intelligence. This functionality enriches detections with business-specific threat intelligence.
Datadog recommends the following methods for consuming threat intelligence:
Datadog recommends against the following:
Users can filter threat intelligence on the Signals and Traces explorers using facets and the search bar.
To search for all traces flagged by a specific source, use the following query with the source name:
@threat_intel.results.source.name:<SOURCE_NAME>
To query for all traces containing threat intelligence from any source, use the following query:
@appsec.threat_intel:true
AAP supports enriching and searching traces with threat intelligence indicators of compromise stored in Datadog reference tables. Reference Tables allow you to combine metadata with information already in Datadog.
For more information, see the Bring Your Own Threat Intelligence guide.
When viewing the traces in the AAP Traces Explorer, you can see threat intelligence data under the @appsec
attribute. The category
and security_activity
attributes are both set.
Under @threat_intel.results
you can always see the full details of what was matched from which source.