Skip to main content

Detections Reference

Lacework leverages several detections to swiftly identify security incidents, enabling you to mitigate risks and protect sensitive data. These detections are generated by security tools and systems that monitor network traffic, system logs, user behavior, and other data sources to identify signs of cyber threats and attacks.

The table below lists common detection names and descriptions that you may see when navigating the Events tab: