Difference between revisions of "Amazon GuardDuty"

From wikieduonline
Jump to navigation Jump to search
Line 30: Line 30:
 
* [[CrowdStrike]]
 
* [[CrowdStrike]]
 
* [[AWS CloudTrail Insights]]
 
* [[AWS CloudTrail Insights]]
* [[EC2 instance i-XXXXXXX is communicating with IP address 163.x.x.x.x on the Tor Anonymizing Proxy network marked as an Entry node. Jump to navigationJump to search]]
+
* <code>[[EC2 instance i-XXXXXXX is communicating with IP address 163.x.x.x.x on the Tor Anonymizing Proxy network marked as an Entry node. Jump to navigationJump to search]]</code>
  
 
== Activities ==  
 
== Activities ==  

Revision as of 08:54, 3 January 2022

wikipedia:Amazon GuardDuty (Nov 2017) [1] threat detection uses

Detection examples

  • Compromised EC2 instances mining bitcoin
  • An attacker scanning your web servers for known application vulnerabilities
  • GuardDuty does not process requests to objects that you have made publicly accessible, but it does alert you when a bucket is made publicly accessible

Cost


Formats

  • TXT
  • STIX
  • OTX_CSV
  • ALIEN_VAULT
  • PROOF_POINT
  • FIRE_EYE

Related

Activities

See also

  • https://aws.amazon.com/about-aws/whats-new/2017/11/announcing-amazon-guardduty-intelligent-threat-detection/
  • https://aws.amazon.com/blogs/aws/new-using-amazon-guardduty-to-protect-your-s3-buckets/
  • Advertising: