Anomaly Detection using Sigma rules

This functionality is available on computers running Windows 7 or later or Windows Server 2008 R2 or later, if there is an active Kaspersky Industrial CyberSecurity for Nodes license key with the EDR Optimum and ICS Telemetry licensed objects.

For anomaly detection using Sigma rules, you must enable the following components: Real-Time File Protection, Exploit Prevention, Remediation Engine.

Sigma is a format for describing anomaly detection rules that Kaspersky Industrial CyberSecurity for Nodes uses to analyze data from internal events and event logs. Rules written in Sigma format are called Sigma rules. Each Sigma rule is stored in a separate YAML file.

Sigma rules are written in YAML and have a unified structure. This allows specially created converters to generate rules in the syntax of various SIEM systems based on Sigma rules.

Sigma rule structure

Example of a Sigma rule

A collection of Sigma rules is a set of Sigma rules that define similar events.

Kaspersky Industrial CyberSecurity for Nodes analyzes data from internal events and event logs to find anomalies using collections of Kaspersky-supplied Sigma rules and the application databases, and using collections of Sigma rules created by the user.

When using some Sigma rules, the application can make changes to the security audit policy of the protected computer - part of the local Windows security policy.

In this Help section

Special considerations and limitations of Anomaly Detection using Sigma Rules

Enabling Anomaly Detection using Sigma Rules

Adding a collection of Sigma rules

Changing the state of a collection of Sigma rules

Adding Sigma rules to a custom collection

User Account Control

Exporting and importing Sigma rules of a custom collection

Changing a Sigma rule

Exclusions in a Sigma rule

Filtering Sigma rules within a collection of rules

Configuring Anomaly Detection using Sigma rules in the command line

Page top