Also available as:
loading table of contents...

Performing Threat Triage Using the Management Module

To create a threat triage rule configuration, you must first define your rules. These rules identify the conditions in the data source data flow and associate alert scores with those conditions.

Before you can prioritize a threat intelligence enrichment, you must ensure that the enrichment is working properly.

Following are some example rules with example values:

Rule 1

If a threat intelligence enrichment type is alerted, you receive an alert score of 5.

Rule 2

If the URL does not end in .com or .net, you receive an alert score of 10.

To create similar rules, complete the following steps:

  1. On the sensor panel, in the Threat Triage field, click

    Figure 3.10. Threat Triage Rules Panel

  2. To add a rule, click +.

    Figure 3.11. Edit Rule Panel

  3. Assign a name to the new rule in the NAME field.

  4. In the TEXT field, enter the syntax for the new rule:

  5. Use the SCORE ADJUSTMENT slider to choose the threat score for the rule.

  6. Click SAVE

    The new rule is listed in the Threat Triage Rules panel.

  7. Choose how you want to aggregate your rules by choosing a value from the Aggregator menu.

    You can choose among the following:


    The maximum of all of the associated values for matching queries.


    The minimum of all of the associated values for matching queries.


    The mean of all of the associated values for matching queries.


    The mean of the positive associated values for the matching queries.

  8. If you want to filter the threat triage display, use the Rules section and the Sort by menu below it.

    For example, to display only high-levels alerts, click the box containing the red indicator. To sort the high-level alerts from highest to lowest, select Highest Score from the Sort by menu.

  9. Click SAVE.