Hi everyone,
I’m exploring the capabilities of Google SecOps SIEM and its YARA-L language. My question is:
Is it possible to use YARA-L to detect spikes or deviations in event counts across an entire log source?
For instance, can I create a detection rule that triggers when there’s a sudden increase in the number of events from a particular log source, indicating an anomaly or unusual activity?
If so, could you share an example or documentation that explains how to set up such a rule?
Thanks in advance!

