This topic explains how to use the Agent Events explorer to query and review the Datadog Agent threat detection events generated by the out-of-the-box (OOTB) detection rules.

The Datadog Agent evaluates system activity on the Agent host. When activity matches an Agent rule expression, the Agent generates a detection event and passes it to the Datadog backend.

If an event matches an Agent detection rule and a backend Threat detection rule, a signal is created and displayed in Signals (Agent detection rule + backend Threat detection rule = Signal).

With the Agent Events explorer, you can investigate Agent Events separately from signals. You can review the host path where the event happened, and view the event’s attributes, metrics, and processes. You can also review the Agent rule that generated the event and view triage and response instructions.

Proactively block threats with Active Protection

By default, all OOTB Agent crypto mining threat detection rules are enabled and actively monitoring for threats.

Active Protection enables you to proactively block and terminate crypto mining threats identified by the Datadog Agent threat detection rules.

View Agent events

To view Agent events, go to the Agent Events explorer.

Agent events are queried and displayed using the standard explorer controls in the Datadog Events explorer.

Investigate Agent events

To investigate why an event is listed on the Agent Events explorer, select an event.

The event details include the attributes, metrics, and processes. Metrics links to the host dashboard and Processes links to the host process dashboard and process agent installation steps.

In Path, the latest process tree is displayed. This gives you the best overview of what occurred by showing you all of the commands that led to the command that initiated the event.

Your image description

Path is often the best place to start your investigation of an event.

Triage Agent events

To triage an event:

  1. Select the event in the AGENT RULE column in the Agent Events explorer.
  2. Select Click to copy.
  3. Open the OOTB rules documention.
  4. In the search field, paste the copied rule name.
  5. Select the rule from the results.
  6. Review the rule Goal, Strategy, and follow the steps in Triage and response.

Further Reading

PREVIEWING: mervebolat/span-id-preprocessing