- Print
- DarkLight
Config Hive: Detection & Response Rules
Article summary
Did you find this summary helpful?
Thank you for your feedback
Format
Permissions
There are three "sub-categories" within detection and response rules contained in Hive.
dr-general
pertains to rules that your Organization has created and/or controls.dr-managed
pertains to rules that you can use for detection, however are managed or curated by another party (i.e. Soteria rules).dr-service
is a protected namespace, and users will only ever have metadata permissions.
dr-general
dr.list
dr.set
dr.del
dr-managed
dr.list.managed
dr.set.managed
dr.del.managed
dr-service
dr.list
ordr.list.managed
(metadata only)dr.set
ordr.set.managed
(metadata only)
Command-Line Usage
usage: limacharlie hive [-h] [-k KEY] [-d DATA] [-pk PARTITIONKEY] [--etag ETAG] [--expiry EXPIRY] [--enabled ENABLED] [--tags TAGS] action hive_name
positional arguments:
action the action to take, one of: list, list_mtd, get, get_mtd, set, update, remove
hive_name the hive name
options:
-h, --help show this help message and exit
-k KEY, --key KEY the name of the key.
-d DATA, --data DATA file containing the JSON data for the record, or "-" for stdin.
-pk PARTITIONKEY, --partition-key PARTITIONKEY
the partition key to use instead of the default OID.
--etag ETAG the optional previous etag expected for transactions.
--expiry EXPIRY a millisecond epoch timestamp when the record should expire.
--enabled ENABLED whether the record is enabled or disabled.
--tags TAGS comma separated list of tags.
Usage
Example
{
"detect": {
"event": "WEL",
"op": "and",
"rules": [
{
"op": "is",
"path": "event/EVENT/System/Channel",
"value": "Microsoft-Windows-Windows Defender/Operational"
},
{
"op": "is",
"path": "event/EVENT/System/EventID",
"value": "1006"
}
]
},
"respond": [
{
"action": "report",
"name": "windows-defender-malware-detected"
}
]
}
Was this article helpful?