Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
Overview
Indicators of Compromise (IOCs) are reputation data associated with entities such as IP addresses, file hashes, and domains that help responders make informed decisions about attacks and potential compromises. The IOC Explorer is a searchable, filterable investigation surface where you can analyze, sort, and prioritize compromises. You can also view related matches in Signals Explorer and Logs Explorer, so you can investigate potential compromises in more detail.
Prerequisites
To view data in the IOC Explorer, all of the following must be true:
- Your organization must subscribe to Cloud SIEM.
- The indicator of compromise must be in a threat feed that was available to Datadog at the time of the log acquisition.
- The time frame for the Explorer is fixed to the last 30 days. The log must be from within that time frame. If your organization has recently onboarded, the Explorer shows data from when you onboarded.
Use the IOC Explorer
To access the IOC Explorer in Datadog, go to Security > Cloud SIEM > Investigate > IOC Explorer.
Query and filter indicators of compromise
You can write custom queries or apply filters to determine which indicators of compromise you can see in the explorer. You can query or filter by:
Additionally, you can click a column heading in the Explorer to sort by that column’s values.
Understand OCSF matching
You can turn the OCSF Matching toggle on or off to have more control over how Datadog identifies IOC matches.
Turn the toggle on if you want higher-confidence matches tied to normalized security attributes.
When the toggle is on, IOC matches only appear in the Explorer if values appear in mapped OCSF fields, such as the source IP, destination IP, or client IP. This helps ensure the match reflects the structured meaning of the data, rather than just the presence of the IOC somewhere in the raw log.
Turn the toggle off if you want broader threat hunting across the full event payload.
When the toggle is off, IOC matches appear in the Explorer if IOCs appear anywhere in the event, including unstructured text like a message body, or other freeform fields.
Example
Alice sends Bob an email whose message body mentions 192.0.2.100, an IP address that is an IOC.
- If the OCSF Matching toggle is on, Datadog only matches IOCs found in relevant mapped OCSF fields, such as normalized source or destination IP address fields in the email event. Because
192.0.2.100 appears only in the message body and not in a mapped OCSF field, it does not appear in the IOC Explorer. - If the OCSF Matching toggle is off, Datadog matches
192.0.2.100 because it searches the full event payload, including unstructured text such as the message body. The IOC appears in the IOC Explorer.
Get more context on an indicator of compromise
In the IOC Explorer, click an indicator of compromise to view additional information you can use to prioritize your remediation efforts:
- Any categories assigned to the indicator, and the threat intelligence feeds it appeared in
- Any ratings assigned to the indicator, and the threat intelligence feeds associated with those ratings
- A breakdown of the indicator’s severity score
- The environment associated with the indicator, including related sources and services
- Related items the indicator can have an impact on
- Links to related investigation surfaces:
Understand severity scoring
It’s important to have proper context for the severity score for an indicator, so you can properly prioritize investigations. For example, IP addresses can be volatile and require frequent reassessments as a result.
In the IOC Explorer side panel, you can see the factors that contribute to the severity score. Severity score starts from a base score based on classification, and increases or decreases based on additional factors:
- Classification: The base score associated with the indicator’s category and intent
- Corroboration: Whether the indicator appears on multiple threat intelligent feeds
- Persistence: How long threat intelligence feeds have been reporting on the indicator
- Hosting Type: Used for IP and domain entity types; evaluates whether the hosting infrastructure type is commonly used for attacks
- Signal Activity: Whether the indicator has been observed in Signals
Further reading
Documentation, liens et articles supplémentaires utiles: