Skip to content

Commit bdeaf65

Browse files
[DOCS-6843] Update Getting Started with Cloud SIEM for new SKU (DataDog#20886)
* add instructions * fix links and small edits * Update content/en/getting_started/cloud_siem/_index.md Co-authored-by: May Lee <may.lee@datadoghq.com> --------- Co-authored-by: Partha-Naidu <91908719+Partha-Naidu@users.noreply.github.com>
1 parent 83fd0e9 commit bdeaf65

File tree

1 file changed

+29
-20
lines changed
  • content/en/getting_started/cloud_siem

1 file changed

+29
-20
lines changed

content/en/getting_started/cloud_siem/_index.md

Lines changed: 29 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -60,24 +60,29 @@ This guide walks you through best practices for getting started with Cloud SIEM.
6060
- Third-party security integrations (for example, Amazon GuardDuty)
6161

6262
2. Enable [Cloud SIEM][8].
63+
3. Select and configure [Content Packs][9], which provide out-of-the-box content for critical security log sources.
64+
4. Select and configure [additional log sources][10] you want Cloud SIEM to analyze.
65+
5. Click **Activate**. A custom Cloud SIEM log index (`cloud-siem-xxxx`) is created.
66+
6. Navigate to the [Logs Indexes configuration][11] page.
67+
7. Move the Cloud SIEM index to the top of the index list. Cloud SIEM analyzes all logs going into the Cloud SIEM index. You can configure the index to filter for specific log events. See the [Log Index documentation][12] for more information.
6368

6469
## Phase 2: Signal exploration
6570

66-
1. Review the [out-of-the-box detection rules][9] that begin detecting threats in your environment immediately. Detection rules apply to all processed logs to maximize detection coverage. See the [detection rules][10] documentation for more information.
71+
1. Review the [out-of-the-box detection rules][13] that begin detecting threats in your environment immediately. Detection rules apply to all processed logs to maximize detection coverage. See the [detection rules][14] documentation for more information.
6772

68-
2. Explore [security signals][11]. When a threat is detected with a detection rule, a security signal is generated. See the [security signals][12] documentation for more information.
73+
2. Explore [security signals][15]. When a threat is detected with a detection rule, a security signal is generated. See the [security signals][16] documentation for more information.
6974

70-
- [Set up notification rules][13] to alert when signals are generated. You can alert using Slack, Jira, email, webhooks, and other integrations. See the [notification rules][14] documentation for more information.
75+
- [Set up notification rules][17] to alert when signals are generated. You can alert using Slack, Jira, email, webhooks, and other integrations. See the [notification rules][18] documentation for more information.
7176

7277
## Phase 3: Investigation
7378

74-
1. Explore the [Investigator][15] for faster remediation. See the [Investigator][16] documentation for more information.
75-
2. Use [out-of-the-box-dashboards][17] or [create your own dashboards][18] for investigations, reporting, and monitoring.
79+
1. Explore the [Investigator][19] for faster remediation. See the [Investigator][20] documentation for more information.
80+
2. Use [out-of-the-box-dashboards][21] or [create your own dashboards][22] for investigations, reporting, and monitoring.
7681

7782
## Phase 4: Customization
7883

79-
1. Set up [suppression rules][19] to reduce noise.
80-
2. Create [custom detection rules][20]. Review [Best Practices for Creating Detection Rules][21].
84+
1. Set up [suppression rules][23] to reduce noise.
85+
2. Create [custom detection rules][24]. Review [Best Practices for Creating Detection Rules][25].
8186

8287
## Further Reading
8388

@@ -91,16 +96,20 @@ This guide walks you through best practices for getting started with Cloud SIEM.
9196
[6]: https://www.datadoghq.com/blog/monitoring-cloudtrail-logs/
9297
[7]: https://www.datadoghq.com/blog/how-to-monitor-authentication-logs/
9398
[8]: https://app.datadoghq.com/security/landing
94-
[9]: /security/default_rules/#cat-cloud-siem-log-detection
95-
[10]: /security/detection_rules/
96-
[11]: https://app.datadoghq.com/security?query=%40workflow.rule.type%3A%28%22Log%20Detection%22%20OR%20%22Signal%20Correlation%22%29&column=time&order=desc&product=siem&view=signal&viz=stream&start=1676321431953&end=1676407831953&paused=false
97-
[12]: /security/explorer
98-
[13]: https://app.datadoghq.com/security/configuration/notification-rules
99-
[14]: /security/notifications/rules/
100-
[15]: https://app.datadoghq.com/security/investigator/
101-
[16]: /security/cloud_siem/investigator
102-
[17]: https://app.datadoghq.com/dashboard/lists/preset/100
103-
[18]: /dashboards/#overview
104-
[19]: /security/cloud_siem/log_detection_rules/?tab=threshold#advanced-options
105-
[20]: /security/cloud_siem/log_detection_rules/
106-
[21]: https://www.datadoghq.com/blog/writing-datadog-security-detection-rules/
99+
[9]: https://app.datadoghq.com/security/content-packs
100+
[10]: https://app.datadoghq.com/security/onboarding?contentPacks=&logSources=&step=1
101+
[11]: https://app.datadoghq.com/logs/pipelines/indexes
102+
[12]: /logs/log_configuration/indexes/
103+
[13]: /security/default_rules/#cat-cloud-siem-log-detection
104+
[14]: /security/detection_rules/
105+
[15]: https://app.datadoghq.com/security?query=%40workflow.rule.type%3A%28%22Log%20Detection%22%20OR%20%22Signal%20Correlation%22%29&column=time&order=desc&product=siem&view=signal&viz=stream&start=1676321431953&end=1676407831953&paused=false
106+
[16]: /security/explorer
107+
[17]: https://app.datadoghq.com/security/configuration/notification-rules
108+
[18]: /security/notifications/rules/
109+
[19]: https://app.datadoghq.com/security/investigator/
110+
[20]: /security/cloud_siem/investigator
111+
[21]: https://app.datadoghq.com/dashboard/lists/preset/100
112+
[22]: /dashboards/#overview
113+
[23]: /security/cloud_siem/log_detection_rules/?tab=threshold#advanced-options
114+
[24]: /security/cloud_siem/log_detection_rules/
115+
[25]: https://www.datadoghq.com/blog/writing-datadog-security-detection-rules/

0 commit comments

Comments
 (0)