@@ -7,4 +7,52 @@ disable_toc: true
77{{< whatsnext desc="General Guides:" >}}
88 {{< nextlink href="/security/guide/aws_fargate_config_guide" >}}AWS Fargate Configuration Guide for Datadog Security{{< /nextlink >}}
99 {{< nextlink href="/security/guide/byoti_guide" >}}Bring Your Own Threat Intelligence{{< /nextlink >}}
10- {{< /whatsnext >}}
10+ {{< /whatsnext >}}
11+
12+ {{< whatsnext desc="Cloud SIEM Guides:" >}}
13+ {{< nextlink href="/getting_started/cloud_siem" >}}Getting Started with Cloud SIEM{{< /nextlink >}}
14+ {{< nextlink href="/security/cloud_siem/guide/automate-the-remediation-of-detected-threats" >}}Automate the remediation of detected threats with Cloud SIEM{{< /nextlink >}}
15+ {{< nextlink href="/security/cloud_siem/guide/aws-config-guide-for-cloud-siem" >}}AWS Configuration Guide for Cloud SIEM{{< /nextlink >}}
16+ {{< nextlink href="/security/cloud_siem/guide/google-cloud-config-guide-for-cloud-siem/" >}}Google Cloud Configuration Guide for Cloud SIEM{{< /nextlink >}}
17+ {{< nextlink href="/security/cloud_siem/guide/azure-config-guide-for-cloud-siem/" >}}Azure Configuration Guide for Cloud SIEM{{< /nextlink >}}
18+ {{< nextlink href="security/cloud_siem/guide/monitor-authentication-logs-for-security-threats" >}}Monitor Authentication Logs for Security Threats{{< /nextlink >}}
19+ {{< nextlink href="/security/cloud_siem/guide/how-to-setup-security-filters-using-cloud-siem-api" >}}Security Filters with the Cloud SIEM API{{< /nextlink >}}
20+ {{< /whatsnext >}}
21+
22+ {{< whatsnext desc="Code Security Guides:" >}}
23+ {{< nextlink href="/security/code_security/guides/automate_risk_reduction_sca/" >}}Automate open source risk reduction with Datadog SCA{{< /nextlink >}}
24+ {{< /whatsnext >}}
25+
26+ {{< whatsnext desc="Cloud Security Guides:" >}}
27+ {{< nextlink href="/getting_started/cloud_security_management" >}}First Steps for Cloud Security{{< /nextlink >}}
28+ {{< nextlink href="/security/cloud_security_management/guide/agent_variables" >}}Cloud Security Agent Variables{{< /nextlink >}}
29+ {{< /whatsnext >}}
30+
31+ {{< whatsnext desc="Cloud Security Misconfigurations Guides:" >}}
32+ {{< nextlink href="/security/cloud_security_management/guide/writing_rego_rules" >}}Writing Custom Cloud Security Misconfigurations Rules with Rego{{< /nextlink >}}
33+ {{< nextlink href="/security/cloud_security_management/guide/public-accessibility-logic" >}}How Datadog Determines if Resources are Publicly Accessible{{< /nextlink >}}
34+ {{< nextlink href="/security/cloud_security_management/guide/resource_evaluation_filters" >}}Use Filters to Exclude Resources from Evaluation{{< /nextlink >}}
35+ {{< nextlink href="/security/cloud_security_management/guide/related-logs" >}}View a Misconfiguration's Related Logs{{< /nextlink >}}
36+ {{< /whatsnext >}}
37+
38+ {{< whatsnext desc="App and API Protection Guides:" >}}
39+ {{< nextlink href="/getting_started/application_security/" >}}First steps with App and API Protection{{< /nextlink >}}
40+ {{< nextlink href="/security/application_security/guide/standalone_application_security/" >}}Standalone App and API Protection{{< /nextlink >}}
41+ {{< nextlink href="/security/application_security/guide/manage_account_theft_appsec/" >}}Managing account theft with AAP{{< /nextlink >}}
42+ {{< /whatsnext >}}
43+
44+ {{< whatsnext desc="Workload Protection Guides:" >}}
45+ {{< nextlink href="/security/workload_protection/guide/active-protection" >}}Proactively block crypto mining threats with Active Protection{{< /nextlink >}}
46+ {{< nextlink href="/security/workload_protection/guide/tuning-rules" >}}Best Practices for Fine-Tuning Workload Protection Security Signals{{< /nextlink >}}
47+ {{< nextlink href="/security/workload_protection/secl_auth_guide" >}}Writing custom rule expressions{{< /nextlink >}}
48+ {{< nextlink href="/security/workload_protection/guide/ebpf-free-agent" >}}Threat Detection for Linux Without eBPF Support{{< /nextlink >}}
49+ {{< /whatsnext >}}
50+
51+ {{< whatsnext desc="Sensitive Data Scanner Guides:" >}}
52+ {{< nextlink href="security/sensitive_data_scanner/guide/investigate_sensitive_data_findings" >}}Investigate Sensitive Data Findings{{< /nextlink >}}
53+ {{< nextlink href="security/sensitive_data_scanner/guide/best_practices_for_creating_custom_rules" >}}Best Practices for Creating Custom Rules{{< /nextlink >}}
54+ {{< nextlink href="security/sensitive_data_scanner/guide/redact_all_emails_except_from_specific_domain_logs" >}}Redact all emails except ones from a specific domain in your logs{{< /nextlink >}}
55+ {{< nextlink href="security/sensitive_data_scanner/guide/redact_uuids_in_logs" >}}Redact Universal Unique IDs (UUIDs) in your logs{{< /nextlink >}}
56+ {{< /whatsnext >}}
57+
58+
0 commit comments