---
title: Salesforce Shield alert on anomaly event
description: Datadog, the leading service for cloud-scale monitoring.
breadcrumbs: >-
  Docs > Datadog Security > OOTB Rules > Salesforce Shield alert on anomaly
  event
---

# Salesforce Shield alert on anomaly event
Classification:attackTactic:[TA0001-initial-access](https://attack.mitre.org/tactics/TA0001)Technique:[T1078-valid-accounts](https://attack.mitre.org/techniques/T1078) 
## Goal{% #goal %}

Detect when Salesforce Shield generates an anomaly- or security-related alert.

## Strategy{% #strategy %}

Using logs generated by Salesforce Shield, this rule monitors for the following events:

- `ApiAnomalyEventStore`
- `CredentialStuffingEventStore`
- `GuestUserAnomalyEventStore`
- `LoginAnomalyEventStore`
- `ReportAnomalyEventStore`
- `SessionHijackingEventStore`

To learn more, see the [Salesforce Shield](https://help.salesforce.com/s/articleView?id=xcloud.shield_learning_map.htm) documentation.

## Triage and response{% #triage-and-response %}

- Examine the associated user id and triggering security event within the Salesforce audit logs.
- Determine if the type of anomaly event and pivot to related logs.
- If alert detected suspicious or malicious behavior, revoke permissions and review audit logs for access events. If external access events occurred, initiate your incident response plan.
