Skip to content

Commit

Permalink
add rule version
Browse files Browse the repository at this point in the history
  • Loading branch information
maycmlee committed Feb 7, 2025
1 parent 4a4d22b commit 0727397
Show file tree
Hide file tree
Showing 3 changed files with 45 additions and 1 deletion.
20 changes: 20 additions & 0 deletions content/en/security/cloud_siem/detection_rules/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -333,6 +333,26 @@ Optionally, add a suppression rule to prevent a signal from getting generated. F

Additionally, in the suppression rule, you can add a log exclusion query to exclude logs from being analyzed. These queries are based on **log attributes**. **Note**: The legacy suppression was based on log exclusion queries, but it is now included in the suppression rule's **Add a suppression query** step.

## Rule Version History

{{< img src="/security/security_monitoring/detection_rules/rule_version_history_20250207.png" alt="The version history for a Github OAuth access token compromise showing" style="width:80%;" >}}

Use Rule Version History to:
- See past versions of a detection rule and understand the changes over time.
- See who made the changes for improved collaboration.
- Compare versions with diffs to analyze the modifications and impact of the changes.

To see the version history of a rule:
1. Navigate to Detection Rules.
1. Click on the rule you are interested in.
1. In the rule editor, click **Version History** to see past changes.
1. Click a specific version to see what changes were made.
1. Click **Open Version Comparison** to see what changed between versions.
1. Select the two versions you want to compare.
- Data highlighted in red indicates data that was modified or dropped.
- Data highlighted in green indicates data that was added.
1. Click **Unified** if you want to see the comparison in the same panel.

## Rule deprecation

Regular audits of all out-of-the-box detection rules are performed to maintain high fidelity signal quality. Deprecated rules are replaced with an improved rule.
Expand Down
26 changes: 25 additions & 1 deletion content/en/security/detection_rules/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -108,6 +108,29 @@ To delete a custom rule, click the vertical three-dot menu for the rule and sele

**Note**: You can only delete custom rules. To remove a default rule, you must [disable it](#enable-or-disable-rules).

### Rule Version History

{{< img src="/security/security_monitoring/detection_rules/rule_version_history_20250207.png" alt="The version history for a Github OAuth access token compromise showing" style="width:80%;" >}}

Use Rule Version History to:
- See past versions of a detection rule and understand the changes over time.
- See who made the changes for improved collaboration.
- Compare versions with diffs to analyze the modifications and impact of the changes.

To see the version history of a rule:
1. Navigate to the [Security Settings][15] page. In the left navigation panel:
- For ASM: Click **Application Security** and then click **Detection Rules**.
- For CSM: Click **Cloud Security Management** and then click **Threat Detection Rules**.
- For Cloud SIEM: Click **Cloud SIEM** and then click **Detection Rules**.
1. Click on the rule you are interested in.
1. In the rule editor, click **Version History** to see past changes.
1. Click a specific version to see what changes were made.
1. Click **Open Version Comparison** to see what changed between versions.
1. Select the two versions you want to compare.
- Data highlighted in red indicates data that was modified or dropped.
- Data highlighted in green indicates data that was added.
1. Click **Unified** if you want to see the comparison in the same panel.

### Restrict edit permissions

{{% security-products/detection-rules-granular-access %}}
Expand Down Expand Up @@ -150,4 +173,5 @@ The rule deprecation process is as follows:
[11]: /security/cloud_siem/detection_rules/
[12]: /security/application_security/threats/custom_rules/
[13]: /security/cloud_security_management/misconfigurations/custom_rules
[14]: /security/threats/workload_security_rules?tab=host#create-custom-rules
[14]: /security/threats/workload_security_rules?tab=host#create-custom-rules
[15]: https://app.datadoghq.com/security/configuration/
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit 0727397

Please sign in to comment.