-
Notifications
You must be signed in to change notification settings - Fork 1.2k
[DOCS-11464] doc for new Users explorer #30842
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
michaelcretzman
merged 11 commits into
master
from
mcretzman/DOCS-11464-aap-users-explorer
Aug 7, 2025
Merged
Changes from all commits
Commits
Show all changes
11 commits
Select commit
Hold shift + click to select a range
ec8ce28
draft
michaelcretzman 8b2fda2
Merge branch 'master' into mcretzman/DOCS-11464-aap-users-explorer
michaelcretzman 0b31fed
draft of Users explorer topic
michaelcretzman abbd52a
Merge branch 'master' into mcretzman/DOCS-11464-aap-users-explorer
michaelcretzman 5aca03b
updating table heading
michaelcretzman c8ad93b
clarifying a tip
michaelcretzman 5fb4138
Merge branch 'master' into mcretzman/DOCS-11464-aap-users-explorer
michaelcretzman d207999
incorporated tech review comments
michaelcretzman 0673ec7
minor edits
michaelcretzman 11c612f
Apply suggestions from code review
michaelcretzman 176cfa5
Merge branch 'master' into mcretzman/DOCS-11464-aap-users-explorer
michaelcretzman File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
178 changes: 178 additions & 0 deletions
178
content/en/security/application_security/security_signals/users_explorer.md
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,178 @@ | ||
--- | ||
title: Users Explorer | ||
disable_toc: false | ||
--- | ||
|
||
This topic describes how to use the App and API Protection [Users explorer][1] to investigate the risks associated with the users tracked by security [traces][3]. | ||
|
||
## Overview | ||
|
||
Datadog populates the Users explorer by associating users with security traces from events like login attempts. This makes the Users explorer an inventory of tracked users. Users are identified by user ID (`@usr.id`) and, when available, user name and email address. See [Adding authenticated user information to traces and enabling user blocking capability][8]. | ||
|
||
Typically, users in the Users explorer are not a risk. However, the explorer helps you identify user accounts that are at risk or are actively being attacked (for example, through attempts to compromise an account). | ||
|
||
With the Users explorer, you can investigate and take action on the user accounts flagged as risks using **risk categories**. | ||
|
||
### Risk categories | ||
|
||
The Users explorer assigns one or more of the following risk categories to a user identified as a risk: | ||
|
||
- **New Geolocation:** User activity from an unfamiliar location might indicate unauthorized access or legitimate travel requiring verification. | ||
- **Impossible Travel:** Occurs when a user logs in from two distant locations in an unrealistically short time, indicating possible credential compromise. A caveat with this category is it can falsely identify users on the same VPN as impossible travel. | ||
- **Compromised User:** A user's credentials are stolen or hacked, allowing attackers to perform malicious activities with their identity. | ||
- **Disposable Email:** A disposable email is an email address that is temporary. | ||
|
||
<div class="alert alert-info">When a user ID, email, or name is associated with a trace, but does not match a risk category, it still appears in the Users explorer.</div> | ||
|
||
### How the Users explorer differs from other explorers | ||
|
||
To understand the difference between the different explorers, review these security approaches they support: | ||
|
||
- **Protect:** Automatically block attackers (IPs and authenticated users) using App and API Protection [Policies][2]. Customers should block attack tools as their first automated blocking action. Blocking attack tools reduces common vulnerability discovery for OWASP threats such as SQLi, command injection, and SSRF. | ||
- **React:** Blocking attackers in response to observed threats using the [Signals][9], [Traces][3], Users, [Attackers][4] explorers. | ||
|
||
Each explorer focuses on a specific use case: | ||
|
||
- **Signals explorer**: Provides a list of actionable alerts such as `Credential Stuffing Attack` or `Command Injection`. Signals have workflow capabilities, a description, severity, and correlated Traces. Interactions include user assignment workflows, automated protection, analytics, search, and pivoting to Traces Explorer. | ||
- **Traces explorer**: Lists evidence for business logic events, such as logins, or attack payloads. Interactions include analytics and search. | ||
- **Attackers explorer**: Identifies attackers as `suspicious` (IP addresses that have attacked in the last 24 hours up to a threshold) and `flagged` (IP addresses that have exceeded that threshold). | ||
- **Users explorer**: Lists authenticated users associated with one or more traces. Interactions include: | ||
- Bulk actions for user analytics and blocking | ||
- Drill-down into the history of any user | ||
- Search | ||
- Pivoting to other explorers | ||
|
||
## Explore and filter users | ||
|
||
To start reviewing users, go to the [Users explorer][1]. | ||
|
||
The main sections in the Users explorer are: | ||
|
||
- Facets and search. These enable you to filter users by multiple user attributes. | ||
- The list of users with security metrics. | ||
- Click a user to examine their risks, IPs, locations, endpoints, and signals. | ||
- You can block an individual user from the list or its details drawer. | ||
- To block multiple users, select one or more users and click **Compare and Block**. | ||
|
||
## Block a user | ||
|
||
To block an individual user, do the following: | ||
|
||
1. Click **Block** in the user's row, and choose a blocking duration. | ||
2. In **Select Security Responses**, select **Block with Datadog's Library**. | ||
|
||
Permanently or temporarily blocked authenticated users are added to the [Denylist][6]. Manage the list on the Datadog [Denylist][7] page. | ||
|
||
|
||
## Compare and block multiple users | ||
|
||
When you select two or more users, you can use the **Compare and Block** button to compare datapoints across potentially compromised users. | ||
|
||
When you click **Compare and Block**, several metrics are displayed in **Block selected users**. These metrics help you detect whether you are dealing with **a single attacker**, **a larger coordinated campaign**, or **widespread credential exposure**. | ||
|
||
Here's a breakdown of the benefits of comparing each datapoint across two (or more) compromised users. | ||
|
||
### Users per ASN | ||
|
||
**Benefit:** Identifies if compromised accounts are accessed from the same internet service provider (ISP) or network operator. | ||
|
||
If multiple users are compromised from the same ASN (Autonomous System Number), it could suggest: | ||
* A botnet operating from that network. | ||
* A VPN or proxy exit node. | ||
* A targeted attack from a specific ISP region (for example, a university or corporate network). | ||
|
||
### Users per User Agent | ||
michaelcretzman marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
**Benefit:** Reveals if the attacker is using automated tools or a specific browser configuration. | ||
|
||
Matching user agents could mean: | ||
* Same malware toolkit (for example, info-stealer like RedLine or Raccoon). | ||
* Use of headless browsers or scripts. | ||
* Credential stuffing using a shared toolset. | ||
|
||
### Users per Location (Geo-IP) | ||
michaelcretzman marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
**Benefit:** Exposes if access attempts are coming from the same country or region. | ||
|
||
If multiple users are being accessed from the same location (especially foreign or unexpected ones), it: | ||
* Points to targeted regional attacks. | ||
* Helps detect suspicious login anomalies (for example, impossible travel). | ||
* May indicate TOR exit nodes or VPN clusters. | ||
|
||
### Users per Domain | ||
michaelcretzman marked this conversation as resolved.
Show resolved
Hide resolved
michaelcretzman marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
**Benefit:** Groups affected users by IP domain, which typically represents their organization. | ||
|
||
Benefits include: | ||
* Identifying organization-wide breaches. | ||
* Highlighting phishing campaigns targeting a specific company or domain. | ||
* Supporting incident response and alert prioritization. | ||
|
||
### Threat Intel Category | ||
michaelcretzman marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
**Benefit:** Shows the associated [Threat Intelligence Category][5]. | ||
|
||
Comparing helps you: | ||
* Understand the vector of compromise. | ||
* Prioritize responses (for example, `corp_vpn`, which are IPs used by businesses, and `hosting_proxy`, which is largely malicious). | ||
|
||
### Threat Intel Intention | ||
michaelcretzman marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
**Benefit:** Provides insights about the attacker reputation based on IP. Flagged IPs aren't necessarily malicious, but they are known to be misused. Misuse is often without the user knowing, for example, in the case of `residential_proxy`. These users are worth closer attention. | ||
|
||
Matching intentions reveal: | ||
* Common attacker **goals**. | ||
* Whether your users were part of a **targeted vs opportunistic** campaign. | ||
* Whether you should expect **further action**, like BEC (business email compromise) or internal movement. | ||
|
||
### IPs per User | ||
michaelcretzman marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
**Benefit:** Highlights whether multiple (especially **anomalous or malicious**) IPs were used to access one user. | ||
|
||
Overlap between users might indicate: | ||
|
||
* Use of the **same attacker infrastructure**. | ||
michaelcretzman marked this conversation as resolved.
Show resolved
Hide resolved
|
||
* Office buildings shared by a group of users. | ||
* Centralized control (for example, with a **command-and-control server**). | ||
* Account access from **known malicious IPs** (check threat feeds). | ||
|
||
### Summary of comparison details | ||
|
||
| Detail | Value of Comparison | | ||
| ---------------------- | -------------------------------------------------- | | ||
| Users per ASN | Identify shared attacker infrastructure or VPN use | | ||
| Users per User Agent | Spot common tooling or automation | | ||
| Users per Location | Detect geolocation-based threat patterns | | ||
| Users per Domain | Pinpoint org-wide targeting or breaches | | ||
| Threat Intel Category | Understand attack type (phishing, malware, etc.) | | ||
| Threat Intel Intention | Determine attacker's objective | | ||
| IPs per User | Trace attacker network behavior and connections | | ||
|
||
|
||
## Tracking compromised credentials | ||
|
||
Here are some investigation tips for comparing each datapoint across two (or more) compromised users: | ||
|
||
1. Breaches are only the beginning. | ||
A leaked credential is the entry point into a wider investigation. | ||
2. Look for patterns. | ||
Compare ASN, IP, user agent, geo, domain. If multiple users share infrastructure, it's likely one actor or campaign. | ||
3. Geo anomalies matter more than location. | ||
The country of origin isn't as important as asking whether the location is normal for the user. | ||
4. Domains reveal the scope. | ||
The same attack across multiple users or domains can mean coordinated targeting, not random hits. | ||
5. IP/User Agent overlap equals attacker fingerprint. | ||
Toolkits reuse browser strings, scripts, and proxies. Overlap shows the attacker infrastructure. | ||
6. Threat intel context guides response. | ||
To triage effectively, combine the category with the intention. This combination tells you if it's phishing, malware, or fraud. | ||
|
||
|
||
[1]: https://app.datadoghq.com/security/appsec/users | ||
[2]: /security/application_security/policies/ | ||
[3]: https://app.datadoghq.com/security/appsec/traces | ||
[4]: /security/application_security/security_signals/attacker-explorer/ | ||
[5]: /security/threat_intelligence/#threat-intelligence-categories | ||
[6]: /security/application_security/policies/#denylist | ||
[7]: https://app.datadoghq.com/security/appsec/denylist | ||
[8]: /security/application_security/how-it-works/add-user-info/?tab=java#adding-authenticated-user-information-to-traces-and-enabling-user-blocking-capability | ||
[9]: https://app.datadoghq.com/security |
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just a general note that there is inconsistent capitalization for these explorers. For example, Attackers Explorer is all uppercase on its dedicated page.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I checked and they should all be titlecase: https://datadoghq.atlassian.net/wiki/spaces/WRITING/pages/5369593857/Datadog+products+and+features#T