Hey guys, do any of you know of a way to efficiently identify which log sources you need ingested in order for the curated detections or even custom rules to work as intended? Google secops currently doesn’t tell you which logs are needed and/or missing for a rule to be accurate.
Detection gaps
Best answer by AymanC
Hi
Typically the ‘overview’ documentations within detection lists the compatible log sources for Curated Detections. If you’re an Enterprise+ customer, from memory you can also see the rule logic behind these rules to see see more specifics.
https://docs.cloud.google.com/chronicle/docs/detection/cloud-threats-category
https://docs.cloud.google.com/chronicle/docs/detection/composite-rules-category
https://docs.cloud.google.com/chronicle/docs/detection/chrome-enterprise-threats-category
https://docs.cloud.google.com/chronicle/docs/detection/linux-threats-category
https://docs.cloud.google.com/chronicle/docs/detection/macos-threats-category
https://docs.cloud.google.com/chronicle/docs/detection/mandiant-hunt-category
https://docs.cloud.google.com/chronicle/docs/detection/risk-analytics-ueba-category
https://docs.cloud.google.com/chronicle/docs/detection/windows-threats-category
https://docs.cloud.google.com/chronicle/docs/detection/ati-curated-detections
Kind Regards,
Ayman
Login to the community
Login with SSO
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.
