Managing user-defined rules

You can configure additional security for the IT infrastructure of the company using TAA, IDS, IOC, and YARA rules.

Users with the Senior security officer role can work with custom TAA, IDS, IOC, and YARA rules: load and delete rule files, view lists of rules, and edit the selected rules.

Users with the Security auditor role can view the lists of custom TAA, IDS, IOC, and YARA rules and properties of selected rules without the possibility of editing.

Users with the Security officer role can view the lists of custom TAA, IOC, and YARA rules and properties of selected rules without the possibility of editing.

In this section

Using indicators of compromise (IOC) and attack (IOA) for Threat Hunting

Managing user-defined IOC rules

Managing user-defined TAA (IOA) rules

Managing user-defined IDS rules

Managing YARA rules

Page top