_
_
Back to Blog

Threat Hunting with Datadog Using Authentication Logs

3 methods of identifying suspicious login behavior using Datadog features
3
min read
|
by
Scott Leyden
&
Zayn Moselhy
January 27, 2026

Effective threat hunting is about clarity — not guesswork. When authentication data is messy or incomplete, identifying real threats becomes slow and unreliable. With Datadog’s advanced log management and Cloud SIEM capabilities, teams can turn raw authentication logs into high-confidence security signals that actually drive action. Before diving into detection, it's essential to outline the best practices for generating authentication logs.

  • Log all authentication events across every login flow
  • Include consistent, meaningful attributes in each log
  • Use a standardized, easily parsed format

1. Using Cloud SIEM for Login Threat Detection

Datadog Cloud SIEM continuously scans 100% of ingested logs using built-in detection rules aligned to common attacker techniques. When suspicious activity is detected, Datadog generates a Security Signal with contextual details, severity, and response guidance. Pre-built dashboards—like the IP investigation dashboard and User investigation dashboard - simplify identifying trends. These trends include things such as spikes in failed login attempts or unusual access patterns, which are shown in the screenshot below.

Datadog IP investigation dashboard

Datadog offers out-of-the-box runbooks, such as the one for credential-stuffing investigations, as illustrated in the screen shot below. 

Datadog credential stuffing runbook

2. Log Processing Pipelines for Context

Datadog’s log processing pipelines enrich authentication data in real time. For example, the GeoIP parser extracts geographic details from IP addresses, enabling detections like unexpected login locations or impossible travel detections rules. This feature is shown in the screenshot below.

Datadog impossible travel detection rule

Similar to Datadog's standard threat detection rules, the impossible travel detection rules leverage Datadog's log search syntax. This allows you to specify the logs you wish to monitor easily. This added context (user, IP, country, city) significantly improves detection accuracy and reduces false positives, helping security teams focus on real threats faster. The results are presented as a Security Signal, enabling teams to rapidly identify and investigate potential authentication attacks, as illustrated in the screenshot below.

Datadog authentication monitoring dashboard

A security signal includes crucial event data, such as the type of attack detected and suggested response strategies. You can effectively triage and prioritize your focus by easily viewing, filtering, and sorting all Security Signals within the explorer.

Datadog Security Signal for credential stuffing

3. Structured Logs with Grok Parsing

Unstructured string logs slow down investigations. By logging authentication events in key-value format and using Datadog’s Grok Parser, teams can extract consistent fields such as user IDs, outcomes, and IP addresses.

Essential Authentication Attributes

  • usr.id – Unique username or email
  • evt.category – Set to authentication
  • evt.name – Login method (SAML, OAuth, etc.)
  • evt.outcome – success or failure
  • network.client.ip – Source IP address

With these fields in place, detecting common authentication attacks like brute force attempts or credential stuffing becomes straightforward and reliable. The image below displays a defined search query. This query is designed to correlate failed and successful login events, allowing for the detection of credential stuffing and the prioritization of authentication threats with a high degree of confidence.

Datadog Cloud SIEM detection rule

From Authentication Logs to Confident Threat Detection

Effective threat hunting relies on clean authentication logs, enriched context, and detections you can trust. By using Datadog Cloud SIEM, log pipelines, and structured fields, teams can quickly identify suspicious login activity and focus on real risk. If authentication threat hunting is still noisy or unreliable in your Datadog environment, contact RapDev.

Written by
Scott Leyden
Boston, MA
My career has been shaped by extensive involvement in DevOps and Site Reliability Engineering, where I find joy in tackling complex technological problems. In my leisure time, I am often engaged in activities such as boating, fishing, or playing ice hockey.
Written by
Scott Leyden
Boston, MA
My career has been shaped by extensive involvement in DevOps and Site Reliability Engineering, where I find joy in tackling complex technological problems. In my leisure time, I am often engaged in activities such as boating, fishing, or playing ice hockey.
More by
Scott
No items found.
Resources

We don’t believe in hoarding knowledge

We go further and faster when we collaborate. Geek out with our team of engineers on our learnings, insights, and best practices to unlock maximum value and begin your business transformation today.

Blogresources
Explore Resources