Skip to content

Security product names changed only #28715

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 14 commits into from
Apr 15, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 4 additions & 4 deletions config/_default/menus/main.en.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -155,7 +155,7 @@ menu:
url: getting_started/security/
parent: getting_started
weight: 17
- name: Application Security Management
- name: App and API Protection
identifier: getting_started_application_security
url: getting_started/security/application_security
parent: getting_started_security
Expand Down Expand Up @@ -2034,7 +2034,7 @@ menu:
parent: software_catalog_use_cases
identifier: software_catalog_use_cases_cloud_cost_management
weight: 402
- name: Application Security Management
- name: App and API Protection
url: software_catalog/use_cases/appsec_management
parent: software_catalog_use_cases
identifier: software_catalog_use_cases_appsec_management
Expand Down Expand Up @@ -6203,7 +6203,7 @@ menu:
parent: csm_setup
identifier: csm_setup_cloud_integrations
weight: 107
- name: Threats
- name: Workload Protection
url: security/threats/
parent: csm
identifier: cloud_workload_security
Expand Down Expand Up @@ -6358,7 +6358,7 @@ menu:
parent: csm_troubleshooting
identifier: csm_troubleshooting_vulnerabilities
weight: 1202
- name: Application Security Management
- name: App and API Protection
url: security/application_security/
parent: security_platform_heading
pre: app-sec
Expand Down
4 changes: 2 additions & 2 deletions content/en/account_management/audit_trail/events.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ further_reading:
#### Product-Specific Events
- [App Builder](#app-builder-events)
- [Application Performance Monitoring (APM)](#application-performance-monitoring-apm-events)
- [Application Security Management (ASM)](#application-security-management)
- [App and API Protection (AAP)](#app-and-api-protection)
- [Audit Trail](#audit-trail-events)
- [CI Visibility](#ci-visibility-events)
- [Quality Gates](#quality-gates-events)
Expand Down Expand Up @@ -111,7 +111,7 @@ See the [Audit Trail documentation][2] for more information on setting up and co
| [Sampling rates remotely configured][27] | A user remotely configured the APM sampling rates. | `@evt.name:APM @asset.type:samplerconfig` |
| [Saved view][112] | A user created, modified, or deleted a saved view. | `@evt.name:APM @action:(created OR modified OR deleted) @asset.type:saved_view` |

### Application Security Management
### App and API Protection

{{% audit-trail-asm %}}

Expand Down
4 changes: 2 additions & 2 deletions content/en/account_management/billing/usage_metrics.md
Original file line number Diff line number Diff line change
Expand Up @@ -56,8 +56,8 @@ Estimated usage metrics are generally available for the following usage types:
| CWS Hosts | `datadog.estimated_usage.cws.hosts`, `datadog.estimated_usage.cws.hosts.by_tag` | Unique CWS hosts seen in the last hour. |
| CWS Containers | `datadog.estimated_usage.cws.containers`, `datadog.estimated_usage.cws.containers.by_tag` | Unique CWS containers seen in the last 5 minutes. |
| Database Hosts | `datadog.estimated_usage.dbm.hosts`, `datadog.estimated_usage.dbm.hosts.by_tag` | Unique DBM hosts seen in the last hour. |
| ASM Hosts | `datadog.estimated_usage.asm.hosts`, `datadog.estimated_usage.asm.hosts.by_tag` | Unique ASM hosts seen in the last hour. |
| ASM Tasks | `datadog.estimated_usage.asm.tasks`, `datadog.estimated_usage.asm.tasks.by_tag` | Unique ASM Fargate Tasks seen in the last 5 minutes. |
| AAP Hosts | `datadog.estimated_usage.asm.hosts`, `datadog.estimated_usage.asm.hosts.by_tag` | Unique AAP hosts seen in the last hour. |
| AAP Tasks | `datadog.estimated_usage.asm.tasks`, `datadog.estimated_usage.asm.tasks.by_tag` | Unique AAP Fargate Tasks seen in the last 5 minutes. |
| CI Visibility Pipeline Committers | `datadog.estimated_usage.ci_visibility.pipeline.committers` | Pipeline committers seen from (calendar) month-to-date. |
| CI Visibility Test Committers | `datadog.estimated_usage.ci_visibility.test.committers` | Test committers seen from (calendar) month-to-date. |
| IOT devices | `datadog.estimated_usage.iot.devices`, `datadog.estimated_usage.iot.devices.by_tag` | Unique IoT devices seen in the last hour. |
Expand Down
2 changes: 1 addition & 1 deletion content/en/agent/configuration/dual-shipping.md
Original file line number Diff line number Diff line change
Expand Up @@ -386,7 +386,7 @@ DD_COMPLIANCE_CONFIG_ENDPOINTS_ADDITIONAL_ENDPOINTS="[{\"api_key\": \"apiKey2\",

{{% agent-dual-shipping %}}

## Cloud Security Management Threats
## Workload Protection

### YAML configuration
In `datadog.yaml`:
Expand Down
20 changes: 10 additions & 10 deletions content/en/agent/remote_config/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ further_reading:
text: "Dynamic Instrumentation"
- link: "/security/threats/setup"
tag: "Documentation"
text: "Setting Up CSM Threats"
text: "Setting Up Workload Protection"
- link: "https://www.datadoghq.com/blog/compliance-governance-transparency-with-datadog-audit-trail/"
tag: "Blog"
text: "Using Datadog Audit Trail"
Expand All @@ -30,7 +30,7 @@ algolia:
## Overview
Remote Configuration is a Datadog capability that allows you to remotely configure and change the behavior of Datadog components (for example, Agents, tracing libraries, and Observability Pipelines Worker) deployed in your infrastructure, for select product features. Use Remote Configuration to apply configurations to Datadog components in your environment on demand, decreasing management costs, reducing friction between teams, and accelerating issue resolution times.

For Datadog security products, Application Security Management and Cloud Security Management Threats (CSM Threats), Remote Configuration-enabled Agents and compatible tracing libraries provide real-time security updates and responses, enhancing security posture for your applications and cloud infrastructure.
For Datadog security products, App and API Protection and Workload Protection, Remote Configuration-enabled Agents and compatible tracing libraries provide real-time security updates and responses, enhancing security posture for your applications and cloud infrastructure.

## How it works
When Remote Configuration is enabled on the Datadog Agent, it periodically polls the configured [Datadog site][1], to determine whether there are configuration changes to apply to your Remote Configuration-enabled Agents or tracing libraries.
Expand Down Expand Up @@ -68,11 +68,11 @@ The following products and features are supported with Remote Configuration:
### Fleet Automation
**[Send flares][27] directly from the Datadog site**. Seamlessly troubleshoot the Datadog Agent without directly accessing the host.

### Application Security Management (ASM)
### App and API Protection (AAP)

- **1-click ASM activation**: Enable ASM in 1-click from the Datadog UI.
- **1-click AAP activation**: Enable AAP in 1-click from the Datadog UI.
- **In-App attack patterns updates**: Receive the newest Web Application Firewall (WAF) attack patterns automatically as Datadog releases them, following newly disclosed vulnerabilities or attack vectors.
- **Protect**: Block attackers' IPs, authenticated users, and suspicious requests that are flagged in ASM Security Signals and Traces temporarily or permanently through the Datadog UI.
- **Protect**: Block attackers' IPs, authenticated users, and suspicious requests that are flagged in AAP Security Signals and Traces temporarily or permanently through the Datadog UI.

### Application Performance Monitoring (APM)

Expand All @@ -84,9 +84,9 @@ The following products and features are supported with Remote Configuration:

- Send critical metrics, traces, and logs from your live applications with no code changes.

### CSM Threats
### Workload Protection

- **Automatic default Agent rule updates**: Automatically receive and update the default Agent rules maintained by Datadog as new Agent detections and enhancements are released. See [Setting Up CSM Threats][3] for more information.
- **Automatic default Agent rule updates**: Automatically receive and update the default Agent rules maintained by Datadog as new Agent detections and enhancements are released. See [Setting Up Workload Protection][3] for more information.
- **Automatic deployment of custom Agent rules**: Automatically deploy your custom Agent rules to designated hosts (all hosts or a defined subset of hosts).

### Observability Pipelines
Expand All @@ -113,7 +113,7 @@ Datadog implements the following safeguards to protect the confidentiality, inte
### Prerequisites

- Datadog Agent version `7.41.1` (`7.42.0` for APM sampling rate, `7.43.0` for APM Remote Instrumentation) or higher installed on your hosts or containers.
- For Datadog products that use tracing libraries, you also need to upgrade your tracing libraries to a Remote Configuration-compatible version. For ASM Protection capabilities and ASM 1-click activation, see [ASM compatibility requirements][6]. For Dynamic Instrumentation, see [Dynamic Instrumentation prerequisites][20].
- For Datadog products that use tracing libraries, you also need to upgrade your tracing libraries to a Remote Configuration-compatible version. For AAP Protection capabilities and AAP 1-click activation, see [AAP compatibility requirements][6]. For Dynamic Instrumentation, see [Dynamic Instrumentation prerequisites][20].

### Setup

Expand Down Expand Up @@ -174,10 +174,10 @@ To enable Remote Configuration:
6. Restart your Agent for the changes to take effect.

After you perform these steps, your Agent requests its configuration from Datadog, and the features that use remote configuration are enabled:
- [CSM Threats default agent rules][9] update automatically as released.
- [Workload Protection default Agent rules][9] update automatically as released.
- [APM Agent-level sampling rates][10] are applied.
- [Dynamic Instrumentation][11] is enabled.
- [ASM 1-Click enablement, IP blocking, and attack pattern updates][12] are enabled.
- [AAP 1-Click enablement, IP blocking, and attack pattern updates][12] are enabled.

## Best practices

Expand Down
2 changes: 1 addition & 1 deletion content/en/all_guides.md
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@ Guides in the Datadog documentation are pages that provide background knowledge,
{{< whatsnext desc="Security:">}}
{{< nextlink href="/security/cloud_siem/guide" >}}<i class="icon-siem" style="font-size:25px;color:#7c3eb9;vertical-align:middle"></i>&nbsp;&nbsp;&nbsp;&nbsp;Cloud SIEM{{< /nextlink >}}
{{< nextlink href="/security/cloud_security_management/guide" >}}<i class="icon-cloud-security-management" style="font-size:25px;color:#7c3eb9;vertical-align:middle"></i>&nbsp;&nbsp;&nbsp;&nbsp;Cloud Security Management{{< /nextlink >}}
{{< nextlink href="/security/application_security/guide" >}}<i class="icon-app-sec" style="font-size:25px;color:#7c3eb9;vertical-align:middle"></i>&nbsp;&nbsp;&nbsp;&nbsp;Application Security Management{{< /nextlink >}}
{{< nextlink href="/security/application_security/guide" >}}<i class="icon-app-sec" style="font-size:25px;color:#7c3eb9;vertical-align:middle"></i>&nbsp;&nbsp;&nbsp;&nbsp;App and API Protection{{< /nextlink >}}
{{< /whatsnext >}}

{{< whatsnext desc="Digital Experience:">}}
Expand Down
2 changes: 1 addition & 1 deletion content/en/data_security/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -86,7 +86,7 @@ The Datadog tracing libraries are used to instrument your applications, services
- Application Performance Monitoring (APM)
- Continuous Profiler
- CI Visibility
- Application Security Management
- App and API Protection

For detailed information about how tracing-library sourced data is managed, default basic security settings, and custom obfuscating, scrubbing, excluding, and modifying of trace-related elements, read [Configuring Agent and Tracer for trace data security][18].

Expand Down
4 changes: 2 additions & 2 deletions content/en/data_security/data_retention_periods.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ attributes:
- **Indexed spans**: 15 or 30 days, determined by customer plan
- **Services/resources statistics**: 30 days
- **Viewed traces**: 15 months
- product: Application Security Management
- product: App and API Protection
data_type: |
- **Security signals**: 15 months
- **Spans**: 90 days
Expand Down Expand Up @@ -47,7 +47,7 @@ attributes:
data_type: |
- **Signals**: 15 months
- **Detections, notifications, suppressions**: Retained for the duration of the account
- product: Cloud Workload Security
- product: Workload Protection
data_type: |
- **Events**: 90 days
- **Security signals**: 15 months
Expand Down
Loading
Loading