Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Security Deck
    • Overview
    • Security Deck workspaces
    • Alerts in Security Deck
    • Data Security Posture Management (DSPM)
    • Kubernetes® Security Posture Management (KSPM)
    • Cloud Infrastructure Entitlement Management (CIEM)
    • Cloud Security Posture Management (CSPM)
    • Threat Detector (TD)
    • Vulnerability Management (VM)
    • Access Transparency
    • AI assistant
    • Quotas and limits
  • Pricing policy
  • Audit Trails events
  • Release notes

In this article:

  • Rules
  • Exceptions to rules
  1. Concepts
  2. Threat Detector (TD)

Threat Detector (TD)

Written by
Yandex Cloud
Updated at May 5, 2026
  • Rules
  • Exceptions to rules

The Threat Detector (TD) module is the first line of defense of the user's cloud infrastructure in Yandex Security Deck, which automatically detects suspicious activity and notifies the user about detected threats.

Threat Detector analyzes the audit events found in the client's infrastructure and registered using Yandex Audit Trails. The module does not require you to configure rules or involve security experts; it activates automatically when you set up your Security Deck workspace.

Each time a rule is triggered by a potential security threat, Security Deck generates an alert with detailed information about the event and recommendations for how to remove the threat. You can analyze the alert and find a solution with the help of the AI assistant, which will drill down on the problem and propose some remedies.

Note

For the Threat Detector module to function correctly, the service account linked to the workspace connector must be assigned the threat-detector.worker role or higher for the resources controlled in the workspace.

RulesRules

You can view information about the Threat Detector security control rules under Threat detection on the Security control rules page.

Exceptions to rulesExceptions to rules

Exceptions allow you to flexibly configure when and for which objects Threat Detector should ignore the results of a rule check. You can view the list of exceptions set for your workspace in the Security Deck interface under Rules and exceptions.

See alsoSee also

  • Security Deck workspaces
  • About Alerts
  • Viewing Threat Detector (TD) security control rules
  • Managing exceptions from Threat Detector (TD) security rules

Was the article helpful?

Previous
Cloud Security Posture Management (CSPM)
Next
Vulnerability Management (VM)
© 2026 Direct Cursus Technology L.L.C.