Threat Detection Rule Expert

Created by Venkat Pothamsetty, Modified on Mon, 8 Apr, 2024 at 2:14 PM by Venkat Pothamsetty

What is it ?


For a security engineer, it is hard to keep learn and keep track of mulrple SIEM and firewall DSLs for writing detection rules.    In your workflow, you just want 'ask' about specific threats and advisories and let someone write detection rules for that threat 


Threat Detection Rule expert does exactly that.  We maintain knowledge of vendor DSLs and best practice rule writing guides from multiple SIEM and Firewall vendors, make it available to you at your finger tips.


Where to Access ?


Here is the link to Transilience Threat Intelligence Expert, Custom GPT


Any questions on the GPT, fee free to join our community and ask.


Features


The following vendors are supported

  1. SIEMs
    1. Splunk SPL detection rules
    2. IBM QRadar and AQL rules
  2. Firewalls
    1. Palo Alto Networks Firewall
    2. Cisco ASA
    3. Fortinet FortiOS
  3. Cloud
    1. AWS 


Use Cases


Use CasePrompt ExampleScreenshotDemo
Splunk: Write a detection rule in Splunk SPL
write a detection rule to detect inbound traffic from 34.4.22.456 in SPL detection language
Demo
QRadar : Detection rules in QRadar AQLwrite a detection rule to detect inbound traffic from 34.4.22.456 in qradar detection language
Demo
Palo Alto:  Blocking rules in Palo Alto Firewallwrite a detection rule to detect inbound traffic from 34.4.22.456 in Palo Alto Networks Firewall

Demo
Cisco ASA: Blocking rules in Cisco ASA Firewall
Demo



Release notes

Version 0.2


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article