Skip to main content
Solved

Using GTI IOC Feeds to generate alerts in SecOps

  • March 10, 2026
  • 1 reply
  • 27 views

0xM4XDF1R
Forum|alt.badge.img+2

Hi!

So we have GTI and a IOC Stream set up, and afaik its being ingested into SecOps and the entity graph. 

I am trying to write detection rules that leverage the IOC stream to alerts. w

Take a malicious domain for example. If a UDM log in secops contains a hostname/domain that is a malicious IOC from GTI, i want to create an alert. 

I tried vibe-coding the detection rule with gemini, but im afraid I don’t know enough about how the entity graph works. 

How far off am I?

 

rule alert_on_gti_ioc_domain {

  meta:

    author = "Max"

    description = "Oppdager nettverkstrafikk eller DNS-oppslag mot domener som finnes i Threat Intel (Entity Graph)."

    severity = "High"



  events:



    (

      $event.target.hostname = $domain or

      $event.network.dns.questions.name = $domain

    )

   



    $domain != ""




    $entity.graph.entity.hostname = $domain




    $entity.graph.metadata.entity_type = "DOMAIN_NAME"

    $entity.graph.metadata.source_type = "ENTITY_CONTEXT"





    (

      $entity.graph.metadata.threat.severity = "HIGH" or

      $entity.graph.metadata.threat.severity = "CRITICAL"

    )



  match:



    $domain over 1h



  condition:

    $event and $entity

}

 

Best answer by 0xM4XDF1R

Solved. There was an issue with IOCs ingested age and testing. I was simply testing on a domain that we didnt have in the raw logs in secops. d

1 reply

0xM4XDF1R
Forum|alt.badge.img+2
  • Author
  • New Member
  • Answer
  • March 10, 2026

Solved. There was an issue with IOCs ingested age and testing. I was simply testing on a domain that we didnt have in the raw logs in secops. d