About Anomaly Detection using Sigma rules

This functionality is available on computers running Windows 7 or later or Windows Server 2008 R2 or later, if there is an active Kaspersky Endpoint Agent license key with the EDR Optimum and ICS Telemetry licensed objects.

Sigma is a format for describing anomaly detection rules that Kaspersky Endpoint Agent uses to analyze data from internal events and event logs. Rules written in Sigma format are called Sigma rules. Each Sigma rule is stored in a separate YAML file.

Sigma rules are written in YAML and have a unified structure. This allows specially created converters to generate rules in the syntax of various SIEM systems based on Sigma rules.

Sigma rule structure

Example of a Sigma rule

A collection of Sigma rules is a set of Sigma rules that define similar events.

Kaspersky Endpoint Agent analyzes data from internal events and event logs to find anomalies using collections of Kaspersky-supplied Sigma rules and the application databases, and using collections of Sigma rules created by the user.

See also

Configuring Anomaly Detection using Sigma rules

Managing settings of Anomaly Detection using Sigma rules

Page top