- Get Started with Threat Detection Management
- Analytics Rules
- Analytics Rule Classifications
- Create an Analytics Rule
- 1. Define the analytics rule
- 2. Import the analytics rule
- 3. Enable the analytics rule
- 4. Apply the analytics rule to your environment
- factFeature Analytics Rule JSON Configuration
- profiledFeature Analytics Rule JSON Configurationh
- contextFeature Analytics Rule JSON Configuration
- numericCountProfiledFeature Analytics Rule JSON Configuration
- numericDistinctCountProfiledFeature Analytics Rule JSON Configuration
- numericSumProfiledFeature Analytics Rule JSON Configuration
- Manage Analytics Rules
- Tune Analytics Rules
- Share Analytics Rules
- Troubleshoot Analytics Rules
- Analytics Rules Syntax
- Advanced Analytics Rule Syntax vs. Analytics Rule Syntax
- Logical Expressions in Analytics Rule Syntax
- String Operations Using Analytics Rule Syntax
- Integer Operations Using Analytics Rule Syntax
- Time Operations Using Analytics Rule Syntax
- Network Operations Using Analytics Rule Syntax
- Context Operations Using Analytics Rule Syntax
- Entity Operations Using Analytics Rule Syntax
- Correlation Rule Operations Using Analytics Rule Syntax
- Monitor the Analytics Engine
- Correlation Rules
- Threat Scoring
Threat Detection Management Permissions
Review the permissions that determine what you're permitted to see and do in Threat Detection Management.
There are four permissions specific to Threat Detection Management:
If you have universal role-based access, the pre-configured roles are assigned specific Threat Detection Management permissions. To see and do the things you need in Threat Detection Management, ensure you're assigned the appropriate role and your role has the relevant permissions.
Analytics Rules: Read
The read permission for analytics rules allows you to:
View analytics rules
View analytics rule details
Analytics Rules: Read, Write, and Delete
The read, write, and delete permission for analytics rules allows you to do everything you can do with the read permission and also:
Correlation Rules: Read
The read permission for correlation rules allows you to:
View correlation rules
View correlation rule details
Correlation Rules: Read, Write, and Delete
The read, write, and delete permission for correlation rules allows you to do everything you can do with the read permission and also:
Create correlation rules
Edit correlation rules
Clone correlation rules
Delete correlation rules
Share correlation rules