☁️
CTHFM: AWS
search
⌘Ctrlk
☁️
CTHFM: AWS
  • hand-waveWelcome
  • Getting Started
    • Account Setup
  • AWS CLI
    • AWS CLI Overview
    • Installation
  • AWS Fundamentals
    • AWS Documentation
    • AWS Shared Responsibility Model
    • Organizational Hierarchy
    • AWS Principals
    • IAM Fundamentals
    • AWS Security Services Overview
    • AWS Core Services
    • AWS Frameworks
    • Regions and Availability Zones
  • SQL
    • SQL Refresher for Threat Hunting
  • Logging Reference
    • Cloudtrail
    • VPCFlow Logs
    • GuardDuty
      • Multi-Account Setup
      • GuardDuty Concepts
      • GuardDuty Finding References
      • S3 Protection
      • Malware Protection
        • EC2 Malware Protection
        • S3 Malware Protection
      • RDS Protection Enablement
      • Lambda Protection Enablement
      • Trusted IP Lists and Threat Lists in Amazon GuardDuty
      • Remediation Recommendations
      • GuardDuty API Reference
      • GuardDuty Quotas
    • Access Analyzer
    • AWS Network Firewall
    • AWS Config
  • CloudWatch
    • Amazon CloudWatch
  • Athena For Threat Hunting
    • Introduction to Athena
    • Setting Up Athena
    • SQL For Threat Hunters
    • Automated Response
    • Query Best Practices
  • AWS Security Research and Resources
    • AWS Security Blog
    • AWS Goat
    • Cloud Goat
    • Pacu
    • Prowler
    • Scout Suite
  • Threat Hunting in AWS
    • Threat Hunting in AWS
    • Threat Hunting Introduction
    • Threat Hunting Process
    • Pyramid of Pain
    • MITRE Att&ck
    • MITRE Att&ck: AWS
    • AWS Threat Hunting Ideas
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Logging Referencechevron-right
  2. GuardDuty

Malware Protection

EC2 Malware Protectionchevron-rightS3 Malware Protectionchevron-right
PreviousS3 Protectionchevron-leftNextEC2 Malware Protectionchevron-right