Monitor Carbon Black Defense Logs With Datadog | Datadog

Monitor Carbon Black Defense Logs with Datadog

Track endpoint activity in real time, malicious software running on an endpoint, and compromised devices.

Request a Demo

Loved & Trusted by Thousands

Washington Post logo 21st Century Fox Home Entertainment logo Peloton logo Samsung logo Comcast logo Nginx logo

Product Features

Monitor Endpoint Activity in Real Time

Pinpoint trends in Carbon Black logs, including common threats outlined by the MITRE ATT&CK® framework.
  • Rapidly analyze and respond to the most common threats to your systems with out-of-the-box, customizable dashboards
  • Quickly identify the machines that need to be isolated and repaired using Carbon Black logs
dg/210212_APM_TracesDashboard_Screenshots.png

Receive Alerts On the Most Critical Threats

Rapidly analyze the most urgent threats first with custom threat detection rules based on their severity score.
  • Easily create signals grouped by the endpoint’s internal IP address, unwanted programs, or any other relevant attribute
  • Pinpoint the most vulnerable devices on your network with granular Carbon Black logs stored for 15 months

Detect Compromised or Vulnerable Endpoints

Prioritize repairing the most vulnerable systems using tables to review compromised devices and the level of severity for each associated threat.
  • Revoke access from your network to compromised devices with granular device log data
  • Prevent future threats by pushing any necessary software or virus definition updates based on specific threat instances

Logging without Limits™

Send and process every log produced by your applications and infrastructure.
  • Ingest everything and decide what to index dynamically with filters
  • Observe everything in real time with Live Tail, without the need to index
  • Archive everything—all history centrally stored with nothing left behind on servers

Simplify Complexity with End-To-End, Unified Visibility

  • Analyze all layers of your cloud environment in just a few clicks; pivot seamlessly from one visualization to the next, from one telemetry to another
  • Align DevOps and Security together with full observability data and an easy-to-use, intuitive, unified platform
  • Easily access detailed observability data: workload events, application logs, infrastructure metrics, audits, and more
  • Enrich security signals with Datadog-managed threat intelligence feeds
See how you can start detecting threats across your applications, network, and infrastructure in minutes.