이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.
Join the Preview!

Vulnerability Pipeline is in Preview. To enroll in the Preview for Add to Security Inbox rules, click Request Access.

Request Access

Configure inbox rules to manage your Security Inbox effectively, ensuring only the most relevant security issues are highlighted. By customizing conditions, you can focus on critical concerns, prioritize key risks, support compliance, and bring attention to issues that might otherwise be overlooked.

Create an inbox rule

  1. On the Vulnerability Pipeline page, click Add a New Rule and select Add to Security Inbox.
  2. Enter a descriptive name for the rule, for example, Cloud Infrastructure Anomaly Warnings.
  3. Use the following boxes to configure the rule criteria:
    • Any of these types: The types of findings that the rule should check for. Available types include Misconfiguration, Attack Path, Identity Risk, and API Security Finding.
    • Any of these tags or attributes: The resource tags or attributes that must match for the rule to apply.
  4. To add severity criteria to the rule, click Add Severity.
  5. Click Save.

Rule matching order

When Datadog identifies a vulnerability, it evaluates the vulnerability against your sequence of inbox rules. Starting with the first rule, if there’s a match, Datadog adds the vulnerability to the Security Inbox and stops evaluating further. If no match occurs, Datadog moves to the next rule. This process continues until a match is found or all rules are checked without a match.

Further reading

추가 유용한 문서, 링크 및 기사: