Security Signals Explorer
From the Security Signals Explorer, correlate and triage security signals. You can also access Cloud SIEM, Posture Management, Workload Security, and Application Security Monitoring dashboards from this page.
In this view, you can:
Explore your Security Signals
The Security Signals search results are displayed in the Security Signals Table.
Filter the contents of the table with the list of available facets. Configure the content of your Security Signals Table according to your needs and preferences with the Options button in the upper right.
Inspect a Security Signal
Click on any Security Signal to open the Security Signal Panel and see more details about it.
The details and actions you need first when triaging an issue can be found in the top portion of the Security Signal Panel. From here, you can determine the severity of the signal, when it was generated, access the rule settings, change the state of the signal and quickly share or assign this signal to a teammate.
The first seen and last seen date are updated, if new data is made available from the past or the attack continues. For Cloud SIEM and Cloud Workload Security signals, a “What Happened” section is displayed in the Overview tab and any configured group bys or rule customizations related to the detection rule is displayed. This example detection rule is configured with a group by of
usr.name. Finally, any tags which are set on the detection rule are displayed below the group bys in the header for CSPM findings and in the Context section for Cloud SIEM and Cloud Workload Security signals.
To better understand activity, the Security Signal Panel summarizes tags and attributes from all logs that trigger a signal so you can troubleshoot without having to pivot to Log Explorer. For example, in the Context section, you can determine at a glance the list of IPs attempting to log into a user account, or the AWS accounts and availability zones running the authentication service.
Below the header of Cloud SIEM and Cloud Workload Security signals are tabs with detailed information related to the signal:
Overview displays why the rule generated a security signal in the What Happened section, including group by tag and customization based on rule type. In addition, context information and JSON associated to the signal is displayed.
Rule Details displays rule details, such as the text configured in the detection rule to help the person reviewing the signal understand the purpose of the signal and how to respond. The users can also pivot into rule modification, such as modifying suppression queries for the rule.
Logs includes a visualization and list of log samples to provide context on why the signal triggered. Click on any of the samples in the table to see the full log.
Related Signals are displayed as a timeline of other signals which contain the same group by values to assist with triaging the signal.
Suggested Actions (beta) provides investigation queries, related dashboards, and links to cloud provider consoles based on Security Signal characteristics that guide investigations and provide insights to a resolution.
Below the header of Cloud Security Posture Management signals are tabs with detailed information related to the signal:
Message displays the text configured in the detection rule to help the person reviewing the signal understand the purpose of the signal and how to respond.
Findings includes a list of each resource that has been evaluated by the rule.
Related Issues includes a list of other signals which contain the same group by values to assist with triaging the signal.
Datadog Cloud SIEM offers threat intelligence feeds curated by threat intelligence partners. These feeds are constantly updated to include data about known suspicious activity (for example, indicators of compromise or IOCs), so you can quickly identify which potential threats to address.
Datadog automatically implements threat intelligence by analyzing all ingested logs that have relevant attributes. If a log contains a compromise indication, such as an anonymized IP tied to a VPN, proxy, or Tor exit node, a
threat_intel attribute is append to the log event to provide additional insights based on available intelligence.
The query to see all threat intelligence matches in the Security Signals Explorer is
@threat_intel.indicators_matched:*. The following are additional attributes to query for threat intelligence:
@threat_intel.results.category “anonymizer”, “scanner”
@threat_intel.results.intention “malicious”, “unknown”
@threat_intel.results.subcategory options "proxy", "tor", "vpn"
Note: Proxy, Tor, and VPN subcategory attributes are provided only by threat intelligence partner IPinfo.
Search by network IP attributes
When Datadog Cloud SIEM detects suspicious activity from your logs, determine whether the suspicious actor has interacted with your systems by searching for its network IP. Use the following query to search by IP attributes in the Log Explorer:
@network.ip.list:<IP address>. The query searches IPs anywhere within the logs, including the tags, attributes, error, and message fields.
If the Security Signal you are reviewing is generated by the Anomaly Detection method, a graph visualizes the anomaly. A bounding box on the right hand side of the graph shows where the anomaly is detected.
Visualize your security signals analytics
Switch between the Security Signals Table and the Security Signals Analytics modes by clicking on the Signal Mode button in the upper left corner of the page:
After Security Signals are generated by the Security Rules Engine, you can graph Security Signal queries and see maximums, minimums, percentiles, unique counts, and more.
Follow the log graphing guide to learn more about all the graphing options.
Additional helpful documentation, links, and articles: