Skip to main content

Responses are generated using AI and may contain mistakes.

Threat Detection ManagementThreat Detection Management Guide

Group by Field in Correlation Rules

In a correlation rule sequence, consolidate query results by specific fields into subsets of events.

When you create a correlation rule, you can toggle Group by Field on for a sequence. The Group by Field functionality groups the query results by the fields you select and creates subsets of events. The rule evaluates its conditions against each subset, and you can also suppress the rule based on a subset of events.

Each subset represents a unique combination of the fields you select. For example, let's say you select src_ip and email_address as the fields you're using for the Group by Field functionality, and the rule is evaluating the following events:

Event

src_ip

email_address

Event 1

1.1.1.1

[email protected]

Event 2

1.1.1.1

[email protected]

Event 3

1.1.1.1

[email protected]

Event 4

2.2.2.2

[email protected]

Event 5

2.2.2.2

[email protected]

Event 6

2.2.2.2

[email protected]

Event 7

3.3.3.3

[email protected]

Event 8

3.3.3.3

[email protected]

Event 9

3.3.3.3

[email protected]

Using the Group by Field functionality with the src_ip and emaiL_address fields, the rule groups the events into the following subsets:

Subset

src_ip

email_address

Number of Events

Subset 1

1.1.1.1

[email protected]

3

Subset 2

2.2.2.2

[email protected]

3

Subset 3

3.3.3.3

[email protected]

3

To successfully group correlation rule detections in Threat Center, the correlation rule Group by Field functionality must use the same fields by which you want to group detections in Threat Center. For example, to group correlation rule detections with the same User and Src Ip into the same alert, the correlation rule that created the detections must also group events by User and Src Ip.