With the cloud, the collection and aggregation of accounts and network logs is simplified, but the security team's continuous analysis and inspection of event log data for potential threats can be difficult and time-consuming. AWS (Amazon Web Services) offers a service in the form of Amazon GuardDuty, which helps with automation and analysis of a vast amount of CloudTrail events and VPC, S3, and DNS Query logs. GuardDuty has evolved significantly with advanced AI and machine learning capabilities that now detect complex, multistage attacks across your entire AWS infrastructure
Amazon GuardDuty uses intelligent and continuous threat detection of your AWS accounts, data stored in Amazon S3, and workloads to reduce risk.
It's essentially a security service that keeps an eye on everything happening in your account at an infrastructure level, alerting you to any undesirable behavior.

GuardDuty uses machine learning to detect anomalies in the behavior of your account. So when you first set up GuardDuty it takes between seven and 14 days to set a baseline as it needs to establish what is normal behavior in your account. Once the baseline has been created GuardDuty can then actively begin monitoring your account. When active, you will only see findings if GuardDuty detects behavior that it considers a threat.
1. Set up and log into AWS account.
2. Open the GuardDuty console at https://console.aws.amazon.com/guardduty/
3. Click on the "Get Started" button.
4. You are able to use GuardDuty and its threat detection with a 30-day free trial.
Amazon GuardDuty integrates with AWS Security Hub for unified security monitoring. Learn more in our blog post: What is AWS Security Hub? Definition, Benefits & Pricing
GuardDuty now provides advanced features that enhance threat detection and response:
The GuardDuty findings represent potential security issues detected in your AWS environment. You can view and manage your GuardDuty results on the "Findings" page of the GuardDuty console or using the GuardDuty CLI or API operations.
Each GuardDuty finding has an assigned severity level (Low, Medium, High, and Critical) and value (0.1 to 10.0) that reflects the potential risk.
Use the following procedure to view and analyze your GuardDuty findings.
1. Open the GuardDuty console at https://console.aws.amazon.com/guardduty/
2. Choose Findings and then select a specific finding to view its details.

The details for each finding will depend on the Finding type, resources involved, and nature of the activity.
If you want to test Amazon GuardDuty, try the following and generate findings.
You can find the CloudFormation template for GuardDuty tester on AWS lab GitHub page with everything prepared: https://github.com/awslabs/amazon-guardduty-tester
Just follow the basic steps for creating an AWS environment with EC2 instances, VPC and everything will be set up for you. Then you will connect to one of the EC2 instances and start the script.
There are six tests provided that will be started by the guardduty_tester.sh script:
1. Internal port scanning
2. SSH Brute Force with Compromised Keys
3. RDP Brute Force with Password List
4. CryptoCurrency Mining Activity
5. DNS Exfiltration
6. Fake domain to prove that GuardDuty is working
After running this script a couple of times, you will see findings appear in the GuardDuty Findings console:

You can find the sample findings function in the GuardDuty console to help visualize the different Findings types that GuardDuty generates.

Sample findings can also be used to test notifications or automation that you have configured for findings.
After using this function, you will see these results in the GuardDuty findings.

No, it is not an Intrusion Prevention System (IPS) since it only alerts about an activity. You could build your actions on top of GuardDuty alerts with AWS Lambda, but it is not part of the service itself.
And it is not an Intrusion Detection System (IDS) either. IDS are usually aware of what is happening on the virtual instances and the better ones are even application-aware. GuardDuty acts on Cloudtrail logs, VPC flow logs, DNS query logs, and runtime telemetry. It has no idea what is running on your instances and has no understanding of what is normal behavior for you or your business. Extended Threat Detection uses AI/ML to correlate these signals into comprehensive attack sequences.
Amazon Inspector provides you with security assessments of your applications settings and configurations on your EC2 instances while Amazon GuardDuty helps with analyzing your entire AWS environment for potential threats.
Inspector only covers EC2 at the moment. GuardDuty, on the other hand, will continuously monitor your "AWS accounts, workloads, and data stored in Amazon S3" and alert you.
GuardDuty is different from Amazon Macie. Macie only looks into S3 buckets and intelligently classifies data to help you ensure the proper access controls are applied to those data.
GuardDuty provides comprehensive threat detection across your entire AWS environment, while Macie focuses on data classification and protection within S3.
You get the first 30 days for free so you can try out every function. After this period is up, you'll be charged based on the quantity of CloudTrail Events and also on the volume of DNS Logs and Flow Logs as well. You only have to pay for the detection capacity you use, when you use it.
Find more about GuardDuty pricing on the AWS official page.
You can find your current estimated total daily costs on the "Usage" page in the GuardDuty Console.

Pricing example per month in the EU Central (Frankfurt) region:

GuardDuty findings now integrate seamlessly with modern security operations through:
Amazon GuardDuty has evolved from a foundational threat detection service to an intelligent, ML-powered security platform. With Extended Threat Detection, GuardDuty now identifies sophisticated, multistage attacks that would be nearly impossible to detect through manual analysis.
Stormit team helps organizations protect their cloud infrastructure against modern threats by leveraging the full capabilities of AWS security services, including GuardDuty's advanced threat detection.
An AWS Solutions Architect with over 5 years of experience in designing, assessing, and optimizing AWS cloud architectures. At Stormit, he supports customers across the full cloud lifecycle — from pre-sales consulting and solution design to AWS funding programs such as AWS Activate, Proof of Concept (PoC), and the Migration Acceleration Program (MAP).