AWS ArchiveFindings
Archives GuardDuty findings to suppress active security alerts from SOC visibility.
Adversaries may modify and/or disable security tools to avoid possible detection of their malware/tools and activities. This may take many forms, such as killing security software processes or services, modifying / deleting Registry keys or configuration files so that tools do not operate properl...
View on MITRE ATT&CK →Archives GuardDuty findings to suppress active security alerts from SOC visibility.
Creates a GuardDuty IP set — a list of trusted or known malicious IP addresses used in threat intelligence.
Removes member accounts from a GuardDuty administrator account, ending the delegated monitoring relationship.
Disassociates the current account from its GuardDuty administrator account, ending the delegated monitoring relationship.
Disassociates specified member accounts from a GuardDuty administrator account.
Mutes Security Command Center findings, suppressing security alerts from visibility.
Removes an extension from an Azure Arc-enabled server.
Deletes an activity log alert rule, disabling security detection and notification capabilities.
Modifies auto-provisioning settings, potentially disabling automatic deployment of security monitoring agents.
Updates the feedback status on GuardDuty findings, marking them as useful or not useful.
Modifies the IP addresses or CIDR ranges in a GuardDuty IP set used for threat intelligence.