You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[DOCS-6843] Update Getting Started with Cloud SIEM for new SKU (DataDog#20886)
* add instructions
* fix links and small edits
* Update content/en/getting_started/cloud_siem/_index.md
Co-authored-by: May Lee <may.lee@datadoghq.com>
---------
Co-authored-by: Partha-Naidu <91908719+Partha-Naidu@users.noreply.github.com>
Copy file name to clipboardExpand all lines: content/en/getting_started/cloud_siem/_index.md
+29-20Lines changed: 29 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,24 +60,29 @@ This guide walks you through best practices for getting started with Cloud SIEM.
60
60
- Third-party security integrations (for example, Amazon GuardDuty)
61
61
62
62
2. Enable [Cloud SIEM][8].
63
+
3. Select and configure [Content Packs][9], which provide out-of-the-box content for critical security log sources.
64
+
4. Select and configure [additional log sources][10] you want Cloud SIEM to analyze.
65
+
5. Click **Activate**. A custom Cloud SIEM log index (`cloud-siem-xxxx`) is created.
66
+
6. Navigate to the [Logs Indexes configuration][11] page.
67
+
7. Move the Cloud SIEM index to the top of the index list. Cloud SIEM analyzes all logs going into the Cloud SIEM index. You can configure the index to filter for specific log events. See the [Log Index documentation][12] for more information.
63
68
64
69
## Phase 2: Signal exploration
65
70
66
-
1. Review the [out-of-the-box detection rules][9] that begin detecting threats in your environment immediately. Detection rules apply to all processed logs to maximize detection coverage. See the [detection rules][10] documentation for more information.
71
+
1. Review the [out-of-the-box detection rules][13] that begin detecting threats in your environment immediately. Detection rules apply to all processed logs to maximize detection coverage. See the [detection rules][14] documentation for more information.
67
72
68
-
2. Explore [security signals][11]. When a threat is detected with a detection rule, a security signal is generated. See the [security signals][12] documentation for more information.
73
+
2. Explore [security signals][15]. When a threat is detected with a detection rule, a security signal is generated. See the [security signals][16] documentation for more information.
69
74
70
-
-[Set up notification rules][13] to alert when signals are generated. You can alert using Slack, Jira, email, webhooks, and other integrations. See the [notification rules][14] documentation for more information.
75
+
-[Set up notification rules][17] to alert when signals are generated. You can alert using Slack, Jira, email, webhooks, and other integrations. See the [notification rules][18] documentation for more information.
71
76
72
77
## Phase 3: Investigation
73
78
74
-
1. Explore the [Investigator][15] for faster remediation. See the [Investigator][16] documentation for more information.
75
-
2. Use [out-of-the-box-dashboards][17] or [create your own dashboards][18] for investigations, reporting, and monitoring.
79
+
1. Explore the [Investigator][19] for faster remediation. See the [Investigator][20] documentation for more information.
80
+
2. Use [out-of-the-box-dashboards][21] or [create your own dashboards][22] for investigations, reporting, and monitoring.
76
81
77
82
## Phase 4: Customization
78
83
79
-
1. Set up [suppression rules][19] to reduce noise.
0 commit comments