Skip to content

Commit 3c1ef2b

Browse files
committed
move custom detection rules
1 parent 666280b commit 3c1ef2b

File tree

12 files changed

+17
-16
lines changed

12 files changed

+17
-16
lines changed

config/_default/menus/main.en.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6053,7 +6053,7 @@ menu:
60536053
identifier: cloud_siem_detect_and_monitor
60546054
weight: 2
60556055
- name: Custom Detection Rules
6056-
url: security/cloud_siem/detect_and_monitor/detection_rules
6056+
url: security/cloud_siem/detect_and_monitor/custom_detection_rules
60576057
parent: cloud_siem_detect_and_monitor
60586058
identifier: cloud_siem_custom_detection_rules
60596059
weight: 201

content/en/getting_started/security/cloud_siem.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ Contact [support][26] to disable Cloud SIEM.
140140
[20]: /security/cloud_siem/investigator
141141
[21]: https://app.datadoghq.com/dashboard/lists/preset/100
142142
[22]: /dashboards/#overview
143-
[23]: /security/cloud_siem/detection_rules/?tab=threshold#advanced-options
144-
[24]: /security/cloud_siem/detection_rules/
143+
[23]: /security/cloud_siem/detect_and_monitor/custom_detection_rules/?tab=threshold#advanced-options
144+
[24]: /security/cloud_siem/detect_and_monitor/custom_detection_rules/
145145
[25]: https://www.datadoghq.com/blog/writing-datadog-security-detection-rules/
146146
[26]: /help/

content/en/integrations/guide/amazon-eks-audit-logs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -76,10 +76,10 @@ To create a rule, navigate to the in-app [Rule Setup and Configuration][13] page
7676
[5]: /logs/guide/send-aws-services-logs-with-the-datadog-lambda-function/?tab=awsconsole#set-up-triggers
7777
[6]: https://console.aws.amazon.com/lambda/home#/functions
7878
[7]: https://app.datadoghq.com/logs
79-
[8]: /security/cloud_siem/detection_rules/
79+
[8]: /security/cloud_siem/detect_and_monitor/custom_detection_rules/
8080
[9]: /getting_started/cloud_siem/#phase-2-signal-exploration
8181
[10]: https://app.datadoghq.com/security
8282
[11]: /security/default_rules/#cat-cloud-siem
8383
[12]: /security/detection_rules/#creating-and-managing-detection-rules
8484
[13]: https://app.datadoghq.com/security/configuration/rules/new?product=siem
85-
[14]: /security/cloud_siem/detection_rules/?tab=threshold#choose-a-detection-method
85+
[14]: /security/cloud_siem/detect_and_monitor/custom_detection_rules/?tab=threshold#choose-a-detection-method

content/en/security/cloud_siem/detection_rules/_index.md renamed to content/en/security/cloud_siem/detect_and_monitor/custom_detection_rules/_index.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Detection Rules
2+
title: Custom Detection Rules
33
type: documentation
44
aliases:
55
- /security_platform/detection_rules/cloud_siem
@@ -11,6 +11,7 @@ aliases:
1111
- /security/detection_rules/security_monitoring
1212
- /security/detection_rules/create_a_new_rule
1313
- /security/cloud_siem/log_detection_rules/
14+
- /security/cloud_siem/detection_rules/
1415
further_reading:
1516
- link: "/cloud_siem/default_rules/"
1617
tag: "Documentation"

content/en/security/cloud_siem/detection_rules/mitre_attack_map.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ disable_toc: false
44
aliases:
55
- /security/cloud_siem/detection_rules/attack_map
66
further_reading:
7-
- link: "/security/cloud_siem/detection_rules/"
7+
- link: "/security/cloud_siem/detect_and_monitor/custom_detection_rules/"
88
tag: "Documentation"
99
text: "Create custom detection rules"
1010
- link: "https://www.datadoghq.com/blog/cloud-siem-mitre-attack-map/"
@@ -63,4 +63,4 @@ This is an example of the format you need to use for tagging custom rules and th
6363
[1]: https://app.datadoghq.com/security/rules
6464
[2]: https://docs.datadoghq.com/security/cloud_siem/guide/how-to-setup-security-filters-using-cloud-siem-api/
6565
[3]: https://app.datadoghq.com/security/rules?query=product=siem&sort=date&viz=attck-map
66-
[4]: https://docs.datadoghq.com/security/cloud_siem/detection_rules/?tab=threshold
66+
[4]: https://docs.datadoghq.com/security/cloud_siem/detect_and_monitor/custom_detection_rules/?tab=threshold

content/en/security/cloud_siem/guide/automate-the-remediation-of-detected-threats.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,6 +94,6 @@ Datadog generates the Security Signal, which details the offense as well as the
9494
[2]: https://app.datadoghq.com/account/settings#integrations/webhooks
9595
[3]: /security/detection_rules/
9696
[4]: https://www.datadoghq.com/blog/new-term-detection-method-datadog/
97-
[5]: /security/cloud_siem/detection_rules/?tab=threshold#new-value
97+
[5]: /security/cloud_siem/detect_and_monitor/custom_detection_rules/?tab=threshold#new-value
9898
[6]: https://www.datadoghq.com/blog/detect-abuse-of-functionality-with-datadog/
99-
[7]: /security/cloud_siem/detection_rules/?tab=threshold#define-a-search-query
99+
[7]: /security/cloud_siem/detect_and_monitor/custom_detection_rules/?tab=threshold#define-a-search-query

content/en/security/cloud_siem/guide/aws-config-guide-for-cloud-siem.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ further_reading:
77
- link: "/security/cloud_siem/investigate_security_signals"
88
tag: "Documentation"
99
text: "Learn about the Security Signals Explorer"
10-
- link: "/security/cloud_siem/detection_rules/"
10+
- link: "/security/cloud_siem/detect_and_monitor/custom_detection_rules/"
1111
tag: "Documentation"
1212
text: "Create new detection rules"
1313
- link: "/getting_started/integrations/aws/"

content/en/security/cloud_siem/guide/azure-config-guide-for-cloud-siem.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ further_reading:
77
- link: "/security/cloud_siem/investigate_security_signals"
88
tag: "Documentation"
99
text: "Learn about the Security Signals Explorer"
10-
- link: "/security/cloud_siem/detection_rules/"
10+
- link: "/security/cloud_siem/detect_and_monitor/custom_detection_rules/"
1111
tag: "Documentation"
1212
text: "Create new detection rules"
1313
---

content/en/security/cloud_siem/guide/google-cloud-config-guide-for-cloud-siem.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ further_reading:
77
- link: "/security/cloud_siem/investigate_security_signals"
88
tag: "Documentation"
99
text: "Learn about the Security Signals Explorer"
10-
- link: "/security/cloud_siem/detection_rules/"
10+
- link: "/security/cloud_siem/detect_and_monitor/custom_detection_rules/"
1111
tag: "Documentation"
1212
text: "Create new detection rules"
1313
- link: "/integrations/google_cloud_platform/#log-collection"

content/en/security/detection_rules/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@ The rule deprecation process is as follows:
170170
[8]: /tracing/
171171
[9]: /agent/
172172
[10]: https://app.datadoghq.com/security/configuration/
173-
[11]: /security/cloud_siem/detection_rules/
173+
[11]: /security/cloud_siem/detect_and_monitor/custom_detection_rules/
174174
[12]: /security/application_security/policies/custom_rules/
175175
[13]: /security/cloud_security_management/misconfigurations/custom_rules
176176
[14]: /security/workload_protection/workload_security_rules?tab=host#create-custom-rules

0 commit comments

Comments
 (0)