Skip to content

Commit 876b044

Browse files
added all sec guides to Security Guides topic (#33416)
DOCS-11105
1 parent 73a9b11 commit 876b044

File tree

1 file changed

+49
-1
lines changed

1 file changed

+49
-1
lines changed

content/en/security/guide/_index.md

Lines changed: 49 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,4 +7,52 @@ disable_toc: true
77
{{< whatsnext desc="General Guides:" >}}
88
{{< nextlink href="/security/guide/aws_fargate_config_guide" >}}AWS Fargate Configuration Guide for Datadog Security{{< /nextlink >}}
99
{{< nextlink href="/security/guide/byoti_guide" >}}Bring Your Own Threat Intelligence{{< /nextlink >}}
10-
{{< /whatsnext >}}
10+
{{< /whatsnext >}}
11+
12+
{{< whatsnext desc="Cloud SIEM Guides:" >}}
13+
{{< nextlink href="/getting_started/cloud_siem" >}}Getting Started with Cloud SIEM{{< /nextlink >}}
14+
{{< nextlink href="/security/cloud_siem/guide/automate-the-remediation-of-detected-threats" >}}Automate the remediation of detected threats with Cloud SIEM{{< /nextlink >}}
15+
{{< nextlink href="/security/cloud_siem/guide/aws-config-guide-for-cloud-siem" >}}AWS Configuration Guide for Cloud SIEM{{< /nextlink >}}
16+
{{< nextlink href="/security/cloud_siem/guide/google-cloud-config-guide-for-cloud-siem/" >}}Google Cloud Configuration Guide for Cloud SIEM{{< /nextlink >}}
17+
{{< nextlink href="/security/cloud_siem/guide/azure-config-guide-for-cloud-siem/" >}}Azure Configuration Guide for Cloud SIEM{{< /nextlink >}}
18+
{{< nextlink href="security/cloud_siem/guide/monitor-authentication-logs-for-security-threats" >}}Monitor Authentication Logs for Security Threats{{< /nextlink >}}
19+
{{< nextlink href="/security/cloud_siem/guide/how-to-setup-security-filters-using-cloud-siem-api" >}}Security Filters with the Cloud SIEM API{{< /nextlink >}}
20+
{{< /whatsnext >}}
21+
22+
{{< whatsnext desc="Code Security Guides:" >}}
23+
{{< nextlink href="/security/code_security/guides/automate_risk_reduction_sca/" >}}Automate open source risk reduction with Datadog SCA{{< /nextlink >}}
24+
{{< /whatsnext >}}
25+
26+
{{< whatsnext desc="Cloud Security Guides:" >}}
27+
{{< nextlink href="/getting_started/cloud_security_management" >}}First Steps for Cloud Security{{< /nextlink >}}
28+
{{< nextlink href="/security/cloud_security_management/guide/agent_variables" >}}Cloud Security Agent Variables{{< /nextlink >}}
29+
{{< /whatsnext >}}
30+
31+
{{< whatsnext desc="Cloud Security Misconfigurations Guides:" >}}
32+
{{< nextlink href="/security/cloud_security_management/guide/writing_rego_rules" >}}Writing Custom Cloud Security Misconfigurations Rules with Rego{{< /nextlink >}}
33+
{{< nextlink href="/security/cloud_security_management/guide/public-accessibility-logic" >}}How Datadog Determines if Resources are Publicly Accessible{{< /nextlink >}}
34+
{{< nextlink href="/security/cloud_security_management/guide/resource_evaluation_filters" >}}Use Filters to Exclude Resources from Evaluation{{< /nextlink >}}
35+
{{< nextlink href="/security/cloud_security_management/guide/related-logs" >}}View a Misconfiguration's Related Logs{{< /nextlink >}}
36+
{{< /whatsnext >}}
37+
38+
{{< whatsnext desc="App and API Protection Guides:" >}}
39+
{{< nextlink href="/getting_started/application_security/" >}}First steps with App and API Protection{{< /nextlink >}}
40+
{{< nextlink href="/security/application_security/guide/standalone_application_security/" >}}Standalone App and API Protection{{< /nextlink >}}
41+
{{< nextlink href="/security/application_security/guide/manage_account_theft_appsec/" >}}Managing account theft with AAP{{< /nextlink >}}
42+
{{< /whatsnext >}}
43+
44+
{{< whatsnext desc="Workload Protection Guides:" >}}
45+
{{< nextlink href="/security/workload_protection/guide/active-protection" >}}Proactively block crypto mining threats with Active Protection{{< /nextlink >}}
46+
{{< nextlink href="/security/workload_protection/guide/tuning-rules" >}}Best Practices for Fine-Tuning Workload Protection Security Signals{{< /nextlink >}}
47+
{{< nextlink href="/security/workload_protection/secl_auth_guide" >}}Writing custom rule expressions{{< /nextlink >}}
48+
{{< nextlink href="/security/workload_protection/guide/ebpf-free-agent" >}}Threat Detection for Linux Without eBPF Support{{< /nextlink >}}
49+
{{< /whatsnext >}}
50+
51+
{{< whatsnext desc="Sensitive Data Scanner Guides:" >}}
52+
{{< nextlink href="security/sensitive_data_scanner/guide/investigate_sensitive_data_findings" >}}Investigate Sensitive Data Findings{{< /nextlink >}}
53+
{{< nextlink href="security/sensitive_data_scanner/guide/best_practices_for_creating_custom_rules" >}}Best Practices for Creating Custom Rules{{< /nextlink >}}
54+
{{< nextlink href="security/sensitive_data_scanner/guide/redact_all_emails_except_from_specific_domain_logs" >}}Redact all emails except ones from a specific domain in your logs{{< /nextlink >}}
55+
{{< nextlink href="security/sensitive_data_scanner/guide/redact_uuids_in_logs" >}}Redact Universal Unique IDs (UUIDs) in your logs{{< /nextlink >}}
56+
{{< /whatsnext >}}
57+
58+

0 commit comments

Comments
 (0)