- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`The Hosts and Containers view in Datadog Workload Protection Inventory provides a unified view of host-level agent deployment, configuration health, and security feature status.
The Hosts and Containers view shows the hostname of all active Agents running directly on hosts or as containers. This includes hosts with Workload Protection enabled or disabled.
Hosts and Containers enables DevSecOps teams to:
The Hosts and Containers inventory supports several common DevSecOps use cases.
To identify hosts where runtime threat detection is not configured:
In Hosts and Containers, set the following facets to false:
The hosts and containers missing one or more of these features are shown with an orange icon. This list flags coverage gaps that expose the workload to undetected process, file, or network-level threats.
For remediation guidance, hover over the icon for a feature and click Configure.
To validate Agent health:
In the Agent Version column, look for older versions identified with yellow labels.
Yellow labels indicate versions that might not support all security features.
Click a version label (for example, 7.69.1), and select Filter by agent_version:[number]. This isolates all hosts running that version.
Outside of Hosts and Containers, check each Agent host for upgrade readiness and schedule upgrades accordingly.
Hosts without CSM Misconfigurations enabled can’t surface IAM, logging, or encryption misconfigurations. Misconfiguration checks are critical for CIS Benchmarks and NIST-aligned cloud security posture management.
To check whether posture checks are enabled for a host:
In Hosts and Containers, set the Misconfigurations Enabled facet to false.
The hosts and containers without CSM Misconfigurations enabled are indicated by an orange icon.
For remediation guidance, hover over the CSM Misconfigurations icon and click Configure.
See Cloud Security Vulnerabilities deployment methods.
The Cluster Name column links hosts to logical infrastructure boundaries like Kubernetes clusters. Filter on a cluster by clicking its name and selecting Filter by cluster_name:[name].
Filtering on a cluster confirms whether protections are applied uniformly. This ensures protections are applied consistently across environments and regions.
Hosts and Containers supports investigations and incident triage. Use the feature icon panel to spot protection gaps.
Typically, hosts missing critical features like Workload Protection or Host/Container Vulnerability Scanning are triaged first.
Hover over a feature icon and click Configure to see remediation steps for all feature gaps. This enables triage without context switching.
Hosts and Containers provides a live audit view for workload security posture. Filters such as Workload Protection Enabled and Agent Version demonstrate control coverage for frameworks such as SOC 2, PCI DSS, or FedRAMP.