Skip to content

Update IOC Explorer docs for GA#36265

Open
janine-c wants to merge 2 commits intomasterfrom
janine/ioc-explorer-ga
Open

Update IOC Explorer docs for GA#36265
janine-c wants to merge 2 commits intomasterfrom
janine/ioc-explorer-ga

Conversation

@janine-c
Copy link
Copy Markdown
Contributor

What does this PR do? What is the motivation?

Updates the existing IOC Explorer docs for GA release 🎉

Merge instructions

I'll check this box when I have PM approval 🫡

Merge readiness:

  • Ready for merge

For Datadog employees:

Your branch name MUST follow the <name>/<description> convention and include the forward slash (/). Without this format, your pull request will not pass CI, the GitLab pipeline will not run, and you won't get a branch preview. Getting a branch preview makes it easier for us to check any issues with your PR, such as broken links.

If your branch doesn't follow this format, rename it or create a new branch and PR.

[6/5/2025] Merge queue has been disabled on the documentation repo. If you have write access to the repo, the PR has been reviewed by a Documentation team member, and all of the required checks have passed, you can use the Squash and Merge button to merge the PR. If you don't have write access, or you need help, reach out in the #documentation channel in Slack.

AI assistance

Additional notes

@janine-c janine-c requested a review from a team as a code owner April 24, 2026 16:44
@github-actions github-actions Bot added the Images Images are added/removed with this PR label Apr 24, 2026
@github-actions
Copy link
Copy Markdown
Contributor

Preview links (active after the build_preview check completes)

Modified Files

Copy link
Copy Markdown
Contributor

@datamarmot datamarmot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added some updates for @janine-c , thank you

## Overview

Indicators of Compromise (IOC) are evidence that your systems have experienced a security breach. With the [IOC Explorer][1], you can view more details about compromises, and see related signals and logs.
Indicators of Compromise (IOC) are evidence that your systems have experienced a security breach. The [IOC Explorer][1] is a searchable, filterable investigation surface where you can investigate, sort, and prioritize compromises. You can also view related matches in Signals Explorer and Logs Explorer, so you can investigate potential compromises in more detail.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

replace the leading sentence: Indicators of Compromise (IOC) are evidence that your systems have experienced a security breach.

with

Indicators of Compromise (IOCs) are reputation data associated with entities such as IP addresses, file hashes, and domains that help responders make informed decisions about attacks and potential compromises.

@@ -25,7 +25,7 @@ To view data in the IOC Explorer, all of the following must be true:
- The indicator of compromise must be in a threat feed that was available to Datadog at the time of the log acquisition.
- For more information on the threat intelligence feeds the IOC Explorer displays content from, see [Threat intelligence sources][2].
- A log that has a matching entity in threat intelligence must be acquired.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This line can be removed. I think line 25, The indicator of compromise must be in a threat feed that was available to Datadog at the time of the log acquisition. covers this.

- Turn the toggle **off** if you want **broader threat hunting** across the full event payload:
- When the toggle is off, IOC matches appear in the Explorer if IOCs appear anywhere in the event, including unstructured text like a message body, or other freeform fields.

#### Example
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Update for the example:

Alice sends Bob an email whose message body mentions 192.0.2.100, an IP address that is an IOC.

If the OCSF Matching toggle is on, Datadog only matches IOCs found in relevant mapped OCSF fields, such as normalized source or destination IP address fields in the email event. Because 192.0.2.100 appears only in the message body and not in a mapped OCSF field, it does not appear in the IOC Explorer.

If the OCSF Matching toggle is off, Datadog matches 192.0.2.100 because it searches the full event payload, including unstructured text such as the message body. The IOC appears in the IOC Explorer.

@janine-c
Copy link
Copy Markdown
Contributor Author

@datamarmot Applied all your suggestions, thank you!

Copy link
Copy Markdown
Contributor

@joepeeples joepeeples left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added a few non-blocking edit suggestions, thanks!

## Overview

Indicators of Compromise (IOC) are evidence that your systems have experienced a security breach. With the [IOC Explorer][1], you can view more details about compromises, and see related signals and logs.
Indicators of Compromise (IOCs) are reputation data associated with entities such as IP addresses, file hashes, and domains that help responders make informed decisions about attacks and potential compromises. The [IOC Explorer][1] is a searchable, filterable investigation surface where you can investigate, sort, and prioritize compromises. You can also view related matches in Signals Explorer and Logs Explorer, so you can investigate potential compromises in more detail.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"Investigation/investigate" appears 3 times, maybe change one to mix it up:

Suggested change
Indicators of Compromise (IOCs) are reputation data associated with entities such as IP addresses, file hashes, and domains that help responders make informed decisions about attacks and potential compromises. The [IOC Explorer][1] is a searchable, filterable investigation surface where you can investigate, sort, and prioritize compromises. You can also view related matches in Signals Explorer and Logs Explorer, so you can investigate potential compromises in more detail.
Indicators of Compromise (IOCs) are reputation data associated with entities such as IP addresses, file hashes, and domains that help responders make informed decisions about attacks and potential compromises. The [IOC Explorer][1] is a searchable, filterable investigation surface where you can examine, sort, and prioritize compromises. You can also view related matches in Signals Explorer and Logs Explorer, so you can investigate potential compromises in more detail.

"Analyze" could be a good replacement too.

- Indicator
- [Indicator type][3]
- [Threat intelligence category][4]
- AS type
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Spell out or explain acronym AS

Comment on lines +51 to +54
- Turn the toggle **on** if you want **higher-confidence matches** tied to normalized security attributes:
- When the toggle is on, IOC matches only appear in the Explorer if values appear in mapped OCSF fields, such as the source IP, destination IP, or client IP. This helps ensure the match reflects the structured meaning of the data, rather than just the presence of the IOC somewhere in the raw log.
- Turn the toggle **off** if you want **broader threat hunting** across the full event payload:
- When the toggle is off, IOC matches appear in the Explorer if IOCs appear anywhere in the event, including unstructured text like a message body, or other freeform fields.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A sub-bullet isn't necessary if there's only one sub-item for each main bullet. Would regular line breaks work instead?

Suggested change
- Turn the toggle **on** if you want **higher-confidence matches** tied to normalized security attributes:
- When the toggle is on, IOC matches only appear in the Explorer if values appear in mapped OCSF fields, such as the source IP, destination IP, or client IP. This helps ensure the match reflects the structured meaning of the data, rather than just the presence of the IOC somewhere in the raw log.
- Turn the toggle **off** if you want **broader threat hunting** across the full event payload:
- When the toggle is off, IOC matches appear in the Explorer if IOCs appear anywhere in the event, including unstructured text like a message body, or other freeform fields.
- Turn the toggle **on** if you want **higher-confidence matches** tied to normalized security attributes.
When the toggle is on, IOC matches only appear in the Explorer if values appear in mapped OCSF fields, such as the source IP, destination IP, or client IP. This helps ensure the match reflects the structured meaning of the data, rather than just the presence of the IOC somewhere in the raw log.
- Turn the toggle **off** if you want **broader threat hunting** across the full event payload.
When the toggle is off, IOC matches appear in the Explorer if IOCs appear anywhere in the event, including unstructured text like a message body, or other freeform fields.

Comment on lines +71 to +72
- Signal matches, which you can view in Signals Explorer
- Related logs, which you can view in Log Explorer
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Add links to docs/app for these Explorers?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Images Images are added/removed with this PR

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants