Skip to main content
All CollectionsIntegrations
How to integrate AWS GuardDuty
How to integrate AWS GuardDuty

This guide outlines how to integrate AWS GuardDuty with Defense.com's SIEM platform.

Alan Butcher avatar
Written by Alan Butcher
Updated over a week ago

To ingest AWS GuardDuty to Defense.com via CloudTrail you must first integrate CloudTrail into Defense.com.

  1. Log into the AWS Management Console - GuardDuty service

  2. If GuardDuty isn’t already enabled, click Get started.

  3. Click Enable GuardDuty to activate the service.

  4. A notification on the Summary page will show confirmation that you've successfully enabled GuardDuty.

Once enabled, GuardDuty automatically begins analysing data from supported sources, such as.

  • CloudTrail Events: GuardDuty uses CloudTrail management and data events (if configured) to detect suspicious activity.

  • VPC Flow Logs: It analyses network traffic logs if they’re available.

  • DNS Logs: It examines DNS request patterns for potential threats.

  • Other Data Sources: Depending on your AWS setup, it may also integrate with services like S3 data events if enabled.

That's it! 🎉 You've integrated AWS GuardDuty logs and alerts into Defense.com.

Did this answer your question?