Security Logs | Datadog

Investigate Security Threats with Audit and Event Logs

Uncover the root cause of attacks and threats using real-time, detailed audit and event logs.

Request a Demo

Loved & Trusted by Thousands

Washington Post logo 21st Century Fox Home Entertainment logo Peloton logo Samsung logo Comcast logo Nginx logo

Product Features

Pinpoint the Root Cause of Security Threats Using Logs

  • Easily filter and search logs to find the most important logs pertaining to a threat and eliminate the need to learn a complex, custom query language
  • Detect and investigate threats across your entire environment by automatically scanning 100 percent of your ingested logs
  • Pivot from logs to the corresponding APM traces with a single click
logs-investigate-and-troubleshoot-2018.png

Receive Real-Time Alerts on Malicious Activity from Logs

  • Create Security Signal alerts based on MITRE ATT&CK® attack techniques by applying detection rules to your logs as they are ingested
  • Detect malicious behavior specific to your environment with custom Security Signal rules
  • Get a quick, top-down perspective of your incoming logs with high-level dashboards and customizable data visualizations
  • Triage threats with logs in the Security Signals explorer, where each signal contains information on the incident and how to best remediate it
dg/logs-filtering.png

Automatically Detect and Prioritize Cloud Security Risks

  • Strengthen your security posture by identifying risky misconfigurations
  • Improve threat hunting and investigations with real-time detection and in-depth context
  • Prioritize and fix vulnerabilities based on potential business impact
  • Mitigate identity risks, enforce least privilege, and trace attacks across your entire environment
dg/securityinbox.png

Get Set Up in Minutes with 900+ Detection Rules and 850+ Integrations

  • Improve your security and compliance posture with 900+ default detection rules mapped to the MITRE ATT&CK® and compliance frameworks
  • Discover in-depth insights into where issues are originating with 850+ vendor-backed integrations, including 100+ fully-supported AWS services
  • Create custom threat rules with an intuitive, easy-to-use query language
  • Get full visibility into your network, identity providers, and SaaS applications with minimal configuration

Simplify Complexity with End-To-End, Unified Visibility

  • Analyze all layers of your cloud environment in just a few clicks; pivot seamlessly from one visualization to the next, from one telemetry to another
  • Align DevOps and Security together with full observability data and an easy-to-use, intuitive, unified platform
  • Easily access detailed observability data: workload events, application logs, infrastructure metrics, audits, and more
  • Enrich security signals with Datadog-managed threat intelligence feeds
See how you can start detecting threats across your applications, network, and infrastructure in minutes.