Security teams face the challenge of sifting through massive amounts of security data to identify and respond to potential threats, prioritize alerts, and assess the severity of events. Lacking context in place, analysts spend valuable time sorting through the noise, switching between tools, and risking overlooking important information, which leads to delayed responses and inefficiencies in security operations.
The Dynatrace platform addresses this issue by providing security contextualization capabilities, such as threat intelligence enrichment. Various security findings in the Dynatrace platform contain observables, such as IP addresses. Those observables can now be enriched with reputation and other threat contexts, enabling you to
This article is intended for incident response teams that want to automate the triage of new detections supported by threat intelligence.
A new security detection finding from Amazon GuardDuty is ingested into the Dynatrace platform.
The security team wants to be notified in Slack only about new critical detections from an actor whose IP address is classified as malicious by an external threat‑intelligence source.
security-intelligence:enrichments:run permission to run enrichments.Import the sample workflow provided for this use case.
In Dynatrace, open
Workflows and select Create workflow.
Select the Security Enrichment action and configure it using your enrichment connection.
To run the enrichment workflow action, you need to enable the security-intelligence:enrichments:run permission.
Workflows and select Authorization settings.security-intelligence:enrichments:run permission.Customize the DQL query action or the Slack notification message to your needs.

Run the workflow to test it.
Example notification:

Schedule and save the workflow to be triggered automatically.