- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`This topic describes how to use the App and API Protection Users explorer to investigate the risks associated with the users tracked by security traces.
Datadog populates the Users explorer by associating users with security traces from events like login attempts. This makes the Users explorer an inventory of tracked users. Users are identified by user ID (@usr.id
) and, when available, user name and email address. See Adding authenticated user information to traces and enabling user blocking capability.
Typically, users in the Users explorer are not a risk. However, the explorer helps you identify user accounts that are at risk or are actively being attacked (for example, through attempts to compromise an account).
With the Users explorer, you can investigate and take action on the user accounts flagged as risks using risk categories.
The Users explorer assigns one or more of the following risk categories to a user identified as a risk:
To understand the difference between the different explorers, review these security approaches they support:
Each explorer focuses on a specific use case:
Credential Stuffing Attack
or Command Injection
. Signals have workflow capabilities, a description, severity, and correlated Traces. Interactions include user assignment workflows, automated protection, analytics, search, and pivoting to Traces Explorer.suspicious
(IP addresses that have attacked in the last 24 hours up to a threshold) and flagged
(IP addresses that have exceeded that threshold).To start reviewing users, go to the Users explorer.
The main sections in the Users explorer are:
To block an individual user, do the following:
Click Block in the user’s row, and choose a blocking duration.
In Select Security Responses, select Block with Datadog’s Library.
Permanently or temporarily blocked authenticated users are added to the Denylist. Manage the list on the Datadog Denylist page.
When you select two or more users, you can use the Compare and Block button to compare datapoints across potentially compromised users.
When you click Compare and Block, several metrics are displayed in Block selected users. These metrics help you detect whether you are dealing with a single attacker, a larger coordinated campaign, or widespread credential exposure.
Here’s a breakdown of the benefits of comparing each datapoint across two (or more) compromised users.
Benefit: Identifies if compromised accounts are accessed from the same internet service provider (ISP) or network operator.
If multiple users are compromised from the same ASN (Autonomous System Number), it could suggest:
Benefit: Reveals if the attacker is using automated tools or a specific browser configuration.
Matching user agents could mean:
Benefit: Exposes if access attempts are coming from the same country or region.
If multiple users are being accessed from the same location (especially foreign or unexpected ones), it:
Benefit: Groups affected users by IP domain, which typically represents their organization.
Benefits include:
Benefit: Shows the associated Threat Intelligence Category.
Comparing helps you:
corp_vpn
, which are IPs used by businesses, and hosting_proxy
, which is largely malicious).Benefit: Provides insights about the attacker reputation based on IP. Flagged IPs aren’t necessarily malicious, but they are known to be misused. Misuse is often without the user knowing, for example, in the case of residential_proxy
. These users are worth closer attention.
Matching intentions reveal:
Benefit: Highlights whether multiple (especially anomalous or malicious) IPs were used to access one user.
Overlap between users might indicate:
Detail | Value of Comparison |
---|---|
Users per ASN | Identify shared attacker infrastructure or VPN use |
Users per User Agent | Spot common tooling or automation |
Users per Location | Detect geolocation-based threat patterns |
Users per Domain | Pinpoint org-wide targeting or breaches |
Threat Intel Category | Understand attack type (phishing, malware, etc.) |
Threat Intel Intention | Determine attacker’s objective |
IPs per User | Trace attacker network behavior and connections |
Here are some investigation tips for comparing each datapoint across two (or more) compromised users: