Manage rules
Last updated on:
In this page
- Overview
- Accessing the Manage Rules page
- Fields in the manage rules table
- Actions column
- Enable/Disable rules
- Clone a rule
- Edit a rule
- Delete rule(s)
- Filter rule(s)
- Other configurations to manage rules
- Rule Name column
- Rule Details
- Prerequisites
- Mitigation
- Execution Details
- Rule tuning
- Severity
- MITRE Att&ck Mapping
- Tags
- Execution Mode & Status
- Alert Profiles
- Created By
- Rule Type
- Installed Time
- Last Modified Time
- Detections
Overview
This page explains how to use the Manage Rules module to oversee all detection rules in a centralized view. It covers actions such as enabling, disabling, cloning, editing, deleting, filtering, and importing/exporting rules. Each rule entry provides detailed information, including severity, MITRE ATT&CK mapping, tags, execution mode, alert profiles, and detection history. Additional features such as rule tuning, prerequisites, and mitigation steps help administrators refine detections, improve performance, and align rules with security frameworks.
Accessing the Manage Rules page
-
Navigate to the Security tab via the dashboard and click on
Manage Rule as highlighted
below.
Image 1: Manage rules in security dashboard -
You will be taken to the Manage Rules page with the complete list of
rules as shown in
the below image. It is the central hub for creating, editing, enabling, disabling, and
monitoring detection rules along with its alerts. It helps streamline rule management
with search, filters, and bulk actions.
Image 2: Manage rules module via the security dashboard
Fields in the manage rules table
A. Actions column
The actions column acts as a medium for you to take required actions on the rule(s) as per your needs. Below are the available rule actions in the Manage Rules module.
- Enable/disable rules
- Clone rule
- Edit rule
- Delete rule(s)
Enable/Disable rules
Enabling a rule
-
Click on the disabled icon
under the
Actions column to enable the rule.
-
As soon as you perform this action, the icon indicates that the rule is now enabled
and
the below pop-up message appears briefly.
Disabling a rule
-
Click on the enabled icon
under the
Actions column to disable the rule.
-
A confirm action pop-up will appear if an alert profile is associated with the said
rule. Click on Yes to proceed.
-
As soon as you perform this action, the icon indicates that the rule is now disabled
and
the below pop-up message appears briefly.
Enable/Disable multiple rules at once
- Click on the empty checkbox(es) in the first column in order to select the respective rules.
-
Click on the Enable/Disable icons in the ribbon above the rules list.
Image 4: Bulk actions in the manage rules module - Upon successful completion of the action, the below pop-up appears.
When enabled:
When disabled:
Clone a rule
- Click on the Clone icon
under the
Actions column to
clone the respective rule. - Depending upon the rule type—Standard, Anomaly, or Advanced—you will be taken to the specific configuration page of that particular rule.
- Make the necessary changes in the field values in order to customize the cloned rule and click on Create.
- Upon successful completion of the action, the below pop-up appears.
Edit a rule
- Click on the Edit icon
under the
Actions column to
edit the respective rule. - Depending upon the rule type—Standard, Anomaly, or Advanced—you will be taken to the specific configuration page of that particular rule.
- Make the necessary edits in the field values and click on Update.
- The rule will be updated instantly in the rules list.
Delete rule(s)
- Click on the empty checkbox(es) in the first column in order to select the respective rules.
- Then click on the Delete icon
in the ribbon above the
rules list. - A Confirm Action pop-up appears. Click on Delete.
- Upon successful completion of the action, the below pop-up appears.
Filter rule(s)
- Click on the Filter icon in the ribbon above the rules list.
Image 6: Filtering rules in the manage rules module - The following filter options appear.
- You can choose multiple filters at once. Click on a filter to select it. Click on it again if you want to deselect it. The rules get filtered instantly as you click on any filter option.
- Click on the Clear Filter option to undo all/any filtering that has been done to the rules.
Other configurations to manage rules
- Click on the empty checkbox(es) in the first column in order to select the respective rules you wish to configure.
- In the ribbon above the list of rules, an option to further Manage
rules is available.
Image 7: Managing rules in the manage rules module - Click on it for the Manage tab to expand the configurations.
-
Configurations:
- Import: Import the desired rules by uploading a file containing the rules.
- Export: Instantly download the selected rules along with the configuration details. This option is applicable only for custom created rules.
- Enable Alert Profile(s): Click on it to Enable Alert
Profile(s)
for the selected rule(s) and the configuration is instantly updated displaying
the below pop-up.
- Disable Alert Profile(s): Click on it to Disable Alert
Profile(s) for the selected rule(s) and the configuration is
instantly updated
displaying the below pop-up.
- Update Severity: Click/Hover on it to view the three severity
levels and choose the one you wish to apply.
The configuration is instantly
updated displaying the below pop-up.
B. Rule Name column
The Rule Name column lists the names of all the configured rules till date.
Clicking on any rule name prompts the Rule Summary box to slide open. It includes 4 sub-tabs:
- Rule Details
- Prerequisites
- Mitigation
- Execution Details
Rule Details
Provides a summary of the rule along with the respective details and options to add exceptions for that particular rule.
- Rule Name: Displays the unique rule name assigned by you for this rule.
- Rule Type: Displays which category of rules this rule comes under - Standard, Anomaly, or Advanced.
- Rule Description: Displays whatever description you have added for this rule, if any.
- Rule Status: Displays whether the rule is currently in an Active state or Inactive.
- Created By: Displays the user (identified by their role in this network) who has created this rule.
- Severity: Displays the Severity level set during the rule configuration - Critical, Trouble, or Attention.
- Log Format: Shows the log type associated with the rule.
- Execution Type: Displays the Execution Configuration mode set for this rule - Continuous; Schedule every 5 minutes, 10 minutes, 30 minutes, 1 hour; and Custom.
- Tags: Categorizes the rule based on industry or type.
- MITRE ATT&CK: Maps the rule to relevant MITRE tactics and techniques.
- Criteria: Displays the rule conditions in query format.
- Exception: The Exception defines the criteria
for
the
detection engine to rule out cases from the detections and reports. A detection
will
not
be created if the set conditions from the rule exception match.
- When you click on the Add Exception button, the Add Rule Exception box slides open.
- You can configure the exceptions you wish to rule out from detections and reports.
- Click on the Save button to save the rule exception.
- Upon successful completion of the action, the below pop-up appears.
- If you wish to reset and reconfigure that exception you can click on Clear Exception, and the configurations are reset.
- Click on Cancel if you wish to abort the process.
- Exception: The Exception defines the criteria
for
the
detection engine to rule out cases from the detections and reports. A detection
will
not
be created if the set conditions from the rule exception match.
Prerequisites
This sub-tab provides an interface for you to check and ensure that the required dependencies of the rule are met for proper detection.
Mitigation
This sub-tab provides an interface for you to take recommended actions to minimize risks and prevent future threats. Mitigations are pre-added for predefined rules, whereas for custom rules they must be manually added by the user.
Case 1: Mitigation steps existing in the rule configuration.
- Mitigation IDs: Lists the MITRE ATT&CK mitigation techniques associated with the detected rule or threat.
- Description: Provides actionable guidance on how to mitigate or reduce the impact of the threat, such as configuration changes, security policies, or best practices.
- False positives: Indicates the likelihood of false positives for the specific detection.
Case 2: No existing mitigation steps.
In such cases, it is implied that no mitigation is necessary for that particular rule.
Execution Details
Used to identify high-computation continuous rules in terms of memory usage. It also shows which of the currently collected logs fall under this rule’s actions.
Execution Mode:
- Execution Mode: Displays the Execution Configuration mode set for this rule—Continuous; Schedule every 5 minutes, 10 minutes, 30 minutes, 1 hour; and Custom.
-
Diagnostics: Provides insights into the resource usage and activity
generated by the rule. This helps you verify how the rule performs during execution.
- Action Name: Displays the event/action associated with this particular detection. For example, Successful logon.
- Memory Utilization: Track total memory used during action execution in near real time.
- Hits: Track the total number of hits for the action in near real time.
- Execution History: Displays a timeline of the rule’s past executions, including event counts and memory consumption recorded during each run. This helps you review the rule’s performance over time and troubleshoot any anomalies.
- Refer to the understanding rules page to learn more about the differences in the execution mode for continuous and scheduled modes.
Rule tuning
The Rule Tuning option in helps administrators refine detection rules by optimizing query execution. It analyzes the way rules are processed and provides actionable insights to improve performance. By applying these recommendations, you can reduce execution load, improve query speed, and eliminate unnecessary noise. Below are the enhancements rule tuning can help administrators with:
- Enhances rule performance by reducing unnecessary execution overhead.
- Prevents timeouts and delays during query runs.
- Minimizes false positives by excluding known or repetitive patterns.
- Helps scale detection efficiency as log volume grows.
- Click the icon in the top-right corner of the Rule Summary box to view the rule tuning configurations box.
- The Rule Tuning panel opens, displaying:
- Rule conditions and actions.
- Tuning insights and recommendations.
- A preview of rule execution with graphical output.
Available actions:
-
Tuning insights
- Provides action-based suggestions, such as:
- Adding grouping fields to reduce the number of query executions.
- Using the Limit operator to control cardinality.
- Excluding specific usernames, devices, or fields to minimize load.
- You can:
- Apply individual tunings.
- Use Apply All Tunings for bulk optimization.
- Provides action-based suggestions, such as:
-
Rule preview
- Generates a sample output graph showing query execution trends.
- Displays execution time and data results (e.g., usernames, devices).
- Helps validate whether tuning improves efficiency without losing accuracy.
-
Handling query timeouts
- If a scheduled task fails due to query timeout, you can:
- Adjust the query timeout value.
- Apply recommended tunings.
- Configure exceptions manually to filter out known patterns.
- If a scheduled task fails due to query timeout, you can:
Example use case: Brute Force detection
Consider the Brute Force rule, which detects failed and successful Windows logins within a specific timeframe.
- Without tuning, this rule may return large datasets causing execution delays.
- With tuning, you can:
- Add grouping by username/device.
- Limit the number of results analyzed.
- Exclude repeated usernames or devices to reduce execution load.
Result: Faster query response, reduced noise, and more efficient detection of brute-force attempts.
Rule tuning best practices
- Always preview the rule before applying tunings.
- Avoid over-filtering, as it may suppress genuine alerts.
- Use manual exceptions for repetitive patterns instead of disabling rules.
- Periodically revisit tuning recommendations as log volume and attack patterns evolve.
C. Severity
Displays the severity level set for the rules- Critical, Trouble or Attention.
D. Mitre Att&ck Mapping
Tactic and technique classification aligned with the MITRE ATT&CK framework that are associated with the rules.
E. Tags
Additional contextual tags, such as threat actor, software, industry verticals that are associated with the rules.
F. Execution Mode & Status
Displays the Execution Configuration mode set for each rule.
G. Alert Profiles
- Provides the option to create an alert profile for all the rules listed here.
- When you click on the Create Alert Profile option, an alert profile for
the corresponding rule is created instantly and the below pop-up appears.
- When you click on the Click Here option provided in the pop-up as shown above, you will be taken to the Edit Alert Profile module. Read the Alert Profile help page to learn more about editing and assigning alert profiles.
H. Created By
Displays the user (identified by their role in this network) who has created this rule.
I. Rule Type
Displays the rule category- Standard, Anomaly, or Advanced.
J. Installed Time
Displays the time of rule installation from the Rule Library.
K. Last Modified Time
Displays the time of the most recent modification done to the rule.
L. Detections
Click on the View Detections link to view all the detections that were triggered by that particular rule. A periodic graph of the detections will be shown to you for that particular rule as given below.
The details displayed in the detection are as follows:
- Detection graph:
- A visual depiction showing the event count over time that triggered the respective rule for quick anomaly spotting. Upon clicking the drop-down arrow available beside the graph, you will be shown the different types of graphs to choose from.
- Event Log Table: Displays details of each detected event that triggered
the rule such as End Time, Event IDs, Log Source, Time, User Name, Domain, Message, etc.
Clicking on the icon on the top-right corner of the data table allows you to
select/deselect and Add what fields you wish to view
separated by columns. You can choose fields from the many options provided.
Image 14: Rule detection details columns in the manage rules module
Available actions in the detections module:
- Clicking on the button allows you to choose a format to export the said data either in a PDF format or a CSV file.
- Clicking on the Report export history icon
allows you to view the
complete history of the past data exports that have taken place for that particular
report.
- You can also customize the time range for the detection by clicking on
You can:
- Select the start date and end date for your desired time range.
- Click on any of the predefined time ranges available that suits your requirements.
- Click on Custom range and then proceed to enter a number in the box provided below that will represent the past number of days worth of data you wish to view.
- Click on Apply.
Scheduled Reports
-
Click on the Scheduled Reports option as highlighted below.
Image 15: Rule scheduled reports in the manage rules module - The available schedules for those rule reports (if any) will be shown on the screen.
-
You can create a schedule for a particular rule by following the steps below:
-
Click on Create Schedule as highlighted below.
Image 16: Create scheduled reports in the manage rules module - Upon clicking, the pop-up will display the fields to Create
Schedule.
- Fill the necessary fields:
- Schedule Details
- Schedule Name: Assign a unique name to the schedule.
- Schedule Frequency: Define how often the schedule should run (hourly, daily, weekly, or monthly).
- Export Time Range: Specify the time range of data to include (e.g., last 24 hours, last 7 days, or custom).
- Report Format: Choose the preferred format for the exported report (PDF, CSV, XLS).
- Notification
- Select Template: Pick a predefined report template or customize one.
- Schedule Details
- After configuring the schedule, click on Save. Upon
successful
completion, the schedule is updated in the pop-up box, along with a
confirmation
message.
- You can also edit the schedule by clicking on the edit
icon in
the pop-up box. The same
fields appear for editing. - Edit and click on Update. Upon successful completion, the
schedule is
updated in the pop-up box, along with a confirmation message.
-
Click on Create Schedule as highlighted below.
Read also
This document explained how to navigate the Manage Rules page, perform key actions on rules, view detailed rule summaries, tune performance, and generate detection reports for deeper analysis.