Skip to content

Commit ddca8ce

Browse files
authored
Update _index.md (#31054)
1 parent 97f9fd6 commit ddca8ce

File tree

1 file changed

+2
-2
lines changed
  • content/en/security/cloud_siem/detection_rules

1 file changed

+2
-2
lines changed

content/en/security/cloud_siem/detection_rules/_index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ further_reading:
4040

4141
## Overview
4242

43-
Cloud SIEM detection rules analyze logs, Audit Trail events, and events from Event Management to generate security signals when threats are detected. You can use [out-of-the-box detections rules](#out-of-the-box-detection-rules) or [create custom detection rules](#custom-detection-rules). This document walks you through how to create a custom detection rule.
43+
Cloud SIEM detection rules analyze logs, Audit Trail events, and events from Event Management to generate security signals when threats are detected. You can use [out-of-the-box detection rules](#out-of-the-box-detection-rules) or [create custom detection rules](#custom-detection-rules). This document walks you through how to create a custom detection rule.
4444

4545
### Out-of-the-box detection rules
4646

@@ -440,4 +440,4 @@ The rule deprecation process is as follows:
440440
[3]: https://app.datadoghq.com/logs/
441441
[4]: https://app.datadoghq.com/security/rules
442442
[5]: /security/cloud_siem/historical_jobs/
443-
[6]: /security/default_rules/?category=cat-cloud-siem-log-detection#all
443+
[6]: /security/default_rules/?category=cat-cloud-siem-log-detection#all

0 commit comments

Comments
 (0)