Monitoring
Query audit logs.
The Monitoring page allows you to build advanced queries for the audit logs that DataDefender ingests from your linked accounts. We ingest data from your audit logs every 5 minutes. Monitoring consists of 2 parts: Query Builder to pull data and Activity Data to show the data.
Query Builder
This tool allows you to pull information from audit logs. Query Builder offers the ability to slice by time, attribute, condition, and value.
Attributes
User Name: searches by IAM Role or other IAM Entity.
Event Name: searches by IAM action like GetObject, ListBucket, etc.
Resource Name: searches by resource ARN.
Resource Type: searches by type of resource like Blob.
Location: searches by region like us-east-1, ap-northeast-1, etc.
Account ID: searches by account id like 012345678901.
Conditions
Contains: matches if part of the value is in the log
Equals: matches if the value given matches the log attribute exactly
NotEquals: matches if the value given does not match the log attribute
Value
The value to search by. Keep in mind it is not case-sensitive
Filter Behavior
Multiple filters can be stacked and operates according to AND logic. For example, a query looking for CONTAINS 'Get' and CONTAINS 'Object' will pull all logs whose Event Name includes both 'Get' and 'Object'.

Export Data
We provide the results of the search in a CSV format. Select 'Export Data' and a menu will pop up with the option to download the report now or save the link for later. The link is valid for 12 hours.

Activity Data
After Query Builder is run, we return Activity Data by providing the relevant logs. Note that we'll group logs that show the same action. Information provided includes all of the Attributes as well as location of request origin and identity type.

Last updated
