- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Supported OS
Picus Security - Inventory
Picus Security - Threats
Picus Security - Activity
Picus Security is a security validation platform that assesses and enhances an organization’s defenses. It simulates real-world cyberattacks (e.g, phishing, malware) to evaluate security controls like firewalls, intrusion prevention systems, and endpoint security solutions.
The Picus Security Datadog Integration allows you to collect and visualize Picus Security data as logs in Datadog. The data collected includes:
Inventory data: Picus Agents, Integrations, Integration Agents, Mitigation Devices, Simulations.
Threats data
Activity data
The integration includes following ready-to-use Datadog Cloud SIEM detection rules for enhanced monitoring and security:
1. Anomalous amount of failed login attempts detected in Picus Security
2. Detection of activity from a new or suspicious location in Picus Security
This integration includes three out-of-the-box dashboards:
interval_for_inventory
.min_collection_interval
.To enable or disable Picus Security detection rules:
tag:"source:crest-data-systems-picus-security"
to list all the rules for Picus Security.Run the Agent’s status subcommand and look for crest_data_systems_picus_security
under the Checks section.
Alternatively, use the following command to obtain detailed information about the integration:
sudo datadog-agent check crest_data_systems_picus_security --log-level debug
"%programfiles%\Datadog\Datadog Agent\bin\agent.exe" check crest_data_systems_picus_security --log-level debug
For support or feature requests, contact Crest Data through the following channels:
This application is made available through the Datadog Marketplace and is supported by a Datadog Technology Partner. To use it, purchase this application in the Marketplace.
Picus Security - Inventory
Picus Security - Threats
Picus Security - Activity