Product
IntegrationS
Check out our evergrowing list of integrations
Detect
Stateful cloud detection with no tradeoffs.
Investigate
See how the attack began, what the adversary did, and where it could go next.
Respond
Act precisely. Recover confidently.
Integrations
Customers
Book a Demo
Resources
All Resources
Learn about cloud detection and response
Blog
Datasheets
Reports
Webinars
Join our live event or watch on demand
Upcoming Events
Meet our team at upcoming expos and events
Company
About us
Get to know our story and team.
Press
News, articles and press resources.
Jobs
Join us, we're hiring!
Contact us
Book a Demo
Rules by Category
Threat Detection
More Categories
AWS Cost Optimization
Availability
Other
Security & Compliance
Cloud
Wiki
Rule Categories
High
AWS DynamoDB Table Export
No items found.
Medium
AWS EC2 VM Export Failure
No items found.
High
AWS IAM Activity Using S3 Browser Utility
No items found.
Medium
AWS IAM User Created Access Keys
No items found.
High
AWS RDS Snapshot Export to S3
No items found.
Low
Azure AD Privileged Role Changes
No items found.
High
Azure/EntraID: Reset password for Global Admin user
No items found.
High
Container Escape Detection
No items found.
Critical
Outbound Network Traffic to Known Tor Domains
No items found.
High
Suspicious IMDS Access from Kubernetes Pod
No items found.