1. Panoramica
. Generatore di regole in Seqrite XDR allows you to define custom detection logic that evaluates
all events generated across the platform. Every incoming event—including process activity, file events,
network communications, registry operations, and system events—is analyzed against the rules you create.
If an event matches the defined rule conditions, an alert is automatically generated and displayed on the
Avvisi page. Within the alert details, you can view the Nome regola that triggered it.
Rules help you:
- Generate actionable alerts for specific behaviors
- Increase visibility across your infrastructure
- Forecast and mitigate attacks
- Maintain a forensic trail for investigations
- Distinguish normal events from malicious activity
Once created, rules are immediately applied in real-time and influence alert generation across your environment.
2. How Rules Work
- Rules evaluate all event types.
- You can build rules using process, file, network, registry, and system indicators.
- Rules may be simple (single condition) or complex (multi-condition with AND/OR logic).
Alert Flow
- An event is generated.
- event is evaluated against all active rules.
- If matched → alert generated.
- alert appears on the Alerts page with the triggering rule name.
- Admins/IR can assign alerts and investigate further.
3. Types of Rules
3.1 System Rules
- Predefined by Seqrite Labs.
- Automatically loaded for every new tenant.
- Generate alerts like custom rules.
restrizioni:
- Cannot be edited
- Cannot be copied
- Cannot be deleted
Permesso: Activation / deactivation only.
3.2 Custom Rules
Created by users based on their environment-specific requirements.
È possibile
- Crea
- Modifica
- Copia
- Elimina
- Activate / Deactivate
Deactivation is useful for rules generating false positives or noise.
Autorizzazioni di accesso
| Ruolo | Can Create/Edit Rules? |
|---|---|
| Super Admin | Si |
| Responsabile SOC | Si |
| Security Analyst | Non |
| Admin | Non |
| Read-Only User | Non |
4. Whitelisted Rules
Whitelisting allows you to suppress alerts for known safe behaviors while keeping the original detection rule active.
When to Whitelist?
- Repeated alerts for validated internal processes
- Marchi IPs or domains used internally
- Legitimate command-line patterns
You can whitelist based on:
- Nome processo
- Percorso del processo
- Riga di comando del processo
- Network Protocol, Port, IP
- Altri indicatori
Create a Whitelist Rule
Method 1 — From Rule Builder
- Seleziona Regole della Whitelist from the Rule Builder menu.
- Clicchi Crea regola.
- Specify desired indicators and conditions.
- Save the whitelist rule.
Method 2 — From Alerts Page
- Open the alert.
- Clicchi Aggiungi alla lista bianca nel riquadro di destra.
- Configure whitelist fields.
- Salva.
5. Rule Builder Interface & Filters
Filtri disponibili
- Tutti
- Nome regola
- Timestamp
- Creato da
Selezione della piattaforma
You can specify the target OS:
- Windows
- macOS
- Linux
MITRE Mapping
Each rule can be mapped to related MITRE Tactics e tecniche. se details appear in
generated alerts.
6. Indicators Supported
Process Indicators
Process Name, Process Path, Command Line, Parent Name, Command Line Length, Is Browser Process,
Is Process Signed, User Name, SHA2, MD5, Parent/Grandparent hashes & paths, Access permissions, cp_event_type, etc.
File Indicators
File Name, File Path, SHA2, MD5, File Type, File Attributes, New Path, Modified Hashes, etc.
Indicatori di rete
Protocol, Port, IP, URL, Domain Name, DNS IPs, Method, Connection Type.
Registry Indicators
Registry Key, Registry Value, Registry Value Data.
System Fields
Windows Event ID, Field of Interest.
7. Supported Operators
Operatori logici
- E
- OR
Operatori di confronto
- =
- contiene
8. Migliori Pratiche
- Always use the dropdown suggestions for indicators and operators.
- Add a space after each indicator, operator, value, and bracket.
- Use parentheses for complex rule structures.
- Avoid manually typing entire expressions to prevent formatting errors.
9. Creating a Detection Rule
- Clicchi Crea regola.
- Invio:
- Nome regola
- Gravità
- Description
- MITRE Tactic & Technique
- Platform (Windows/macOS/Linux)
- Select indicators, operators, and values from dropdowns.
- Add AND/OR logic as required.
- Preview the rule.
- Salva la regola.
10. Example Rules
Example 1: Suspicious External Communication
IP = 4.4.4.4 AND Port = 80
Example 2: Process Using Network Port
Process Name = teams.exe AND Port = 80
Example 3: Suspicious PowerShell Activity
( Parent Name = svchost.exe AND Process Name = powershell.exe ) AND ( Process Command Line contains start OR Process Command Line contains add )
Example 4: MSI → CMD → Suspicious Child Process + Persistence
( Grand Parent Name = msiexec.exe AND Parent Name = cmd.exe ) AND ( Process Name = iexplorer.exe OR Process Name = reg.exe ) AND ( Registry Value contains REGISTRYSOFTWAREMicrosoftWindowsCurrentVersionRun OR Registry Value contains REGISTRYSOFTWAREWow6432NodeMicrosoftWindowsCurrentVersionRun )