Managing Amazon GuardDuty findings
GuardDuty offers several important features to help you sort, store, and manage your findings. These features will help you tailor findings to your specific environment, reduce noise from low value findings, and help you focus on threats to your unique AWS environment. Review the topics on this page to understand how you can use these features to increase the value of security findings in your environment.
Topics:
- Summary dashboard in Amazon GuardDuty
-
Learn about the components of the summary dashboard available in the GuardDuty console.
- Viewing filtered findings in GuardDuty
-
Learn how to filter GuardDuty findings based on the criteria you specify.
- Suppression rules in GuardDuty
-
Learn how to automatically filter the findings GuardDuty alerts you to through suppression rules. Suppression rules automatically archive findings based on filters.
- Working with trusted IP lists and threat lists
-
Customize the GuardDuty monitoring scope using IP Lists and Threat Lists based on publicly-routable IP addresses. Trusted IP lists prevent non-DNS findings from being generated from IP's you consider trusted, while Threat Intel Lists will cause GuardDuty to alert you of activity from user-defined IPs.
- Exporting generated findings to Amazon S3
-
Export the generated findings to an Amazon S3 bucket so that you can maintain records past the 90-day findings retention period in GuardDuty. Use this historical data to track potential suspicious activities in your account and evaluate whether the recommended remediation steps were successful.
- Creating custom responses to GuardDuty findings with Amazon CloudWatch Events
-
Set up automatic notifications for GuardDuty findings through Amazon CloudWatch events. You can also automate other tasks through CloudWatch Events to help you respond to findings.
- Understanding CloudWatch Logs and reasons for skipping resources during Malware Protection for EC2 scan
-
Learn how you can audit the CloudWatch Logs for GuardDuty Malware Protection for EC2 and what are the reasons because of which your impacted Amazon EC2 instance or Amazon EBS volumes may have been skipped during the scanning process.
- Reporting false positives in Malware Protection for EC2
-
Learn how you can report potential false positive threat detections in Malware Protection for S3.
- Reporting S3 object scan result as false positive in Malware Protection for S3
-
Learn how you can report potential false positive threat detections in Malware Protection for S3.