Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

Create an Incident Scoring Rule

 

You can create rules for incidents by defining the matching condition and corresponding actions to take when a condition is met.

To create a rule for scoring incidents:

  1. Select Configure > Insights > Incident Scoring Rules.

    The Incident Scoring Rules page appears.

  2. Click the plus icon (+).

    A page appears, on which you can define the rule’s condition and actions.

  3. In the Rule Description field, enter a unique name for the rule.
  4. In the Condition section:
    1. Select a matching condition from the list: Match Any or Match All.

    2. Select the type of incident from the list: File Hash, Threat Source IP, or URL.

    3. For the selected incident, select mitigated by another event as the condition.

    Note

    To add multiple conditions, click Add.

  5. In the Action(s) section:
    1. Select a required action from the list, such as Raise or Lower Severity (%), Set Severity (value), or Skip remaining rules.

    2. Based on the action you have selected, provide additional data.

    Note

    To add multiple actions, click Add.

  6. Click Confirm.

    A new rule is created and listed in the Incident Scoring Rules page.

Click Enable or Disable to either enable the incident scoring rule or disable it.