Implementing a Modern Detection Engineering Workflow (Part 1)
Level up your Detection Engineering capability by implementing a modern workflow that uses free tools to automate the management of detection rules in Chronicle.
Level up your Detection Engineering capability by implementing a modern workflow that uses free tools to automate the management of detection rules in Chronicle.
The “New to Chronicle” blog found on chronicle.security has moved to the Community Blog. This blog was originally published on December 14th, 2022 and introduces the network function net.ip_in_range_cidr for use in YARA-L rules to focus our rules on specific CIDR netblocks and then applies this to CIDR reference lists.
Organizations can now uncover more threats with less effort with Applied Threat Intelligence in Google Chronicle Security Operations. Our intelligence-driven security operations takes on the burden of operationalizing Google’s threat intelligence to unlock deeper threat hunting and investigation workflows, helping teams become more efficient.
The “New to Chronicle” blog found on chronicle.security has moved to the Community Blog. This blog was originally published on December 1st, 2022 and builds on our base64 and regular expression functions by adding reference lists to our rule.
The “New to Chronicle” blog found on chronicle.security has moved to the Community Blog. This blog was originally published on November 16th, 2022 and introduces the UDM search interface.
You give us two minutes, we'll give you the world of SecOps. In Part Two of our "threat hunting" episode, Google Cloud Principal Security Strategist John Stoner offers three approaches you can consider when jumping into a hunt and why having a strategy — including the day you start the hunt — matters.
You give us two minutes, we'll give you the world of SecOps. In this episode, Google Cloud Principal Security Strategist John Stoner breaks down the merits of threat hunting and shares why, depending on the maturity of your detection and response capabilities, the practice may not be right for everybody.
Building on our introduction of metrics and their functions, we look at various aggregation options and apply these to a sample detection rule to identify outlier network traffic.
The “New to Chronicle” blog found on chronicle.security has moved to the Community Blog. This blog was originally published on November 7th, 2022 and introduces the re.replace function for use in YARA-L rules and demonstrates its use with other regex and base64 decode functions.
You give us two minutes, we'll give you the world of security operations. This episode of "Fastest Two Minutes in SecOps" boils down a very big conversation -- cloud security -- into something digestible. Google Cloud Head of Adoption Engineering Dave Herrald explains how the changing security boundaries of the cloud prompt the need for new security controls, shares how your team needs to be built, and discusses why IAM is so critical.
You give us two minutes, we'll give you the world of SecOps. In this episode, Google Cloud Principal Consultant Rishalin Pillay distills the practice of incident response and zeroes in on the security operations team's role, specifically around the detection and analysis phase. SOC practitioners are called on to help comb through multitudes of data and logs that may be relevant to an incident, yet many teams struggle here because of the scale of the effort required.
If you are an Entra ID user who is using Google SecOps, the Graph API Activity logs provide a way to generate greater insight into activities happening beneath the waves in your Microsoft cloud environment. Learn how Google SecOps can work with this data set to better protect your organization!
David Nehoda reveals the capabilities of Artificial Intelligence by showcasing how to effectively utilize the AI console within Chronicle SIEM for crafting detection rules.
Use Security Command Center Premium to detect workloads in unauthorized regions
The “New to Chronicle” blog found on chronicle.security has moved to the Community Blog. This blog was originally published on October 20th, 2022 and demonstrates how users can capture portions of UDM fields and use them for additional detection logic.
The “New to Chronicle” blog found on chronicle.security has moved to the Community Blog. This blog was originally published on October 10th, 2022 and introduces the regex function re.regex for use in YARA-L rules.
You give us two minutes, we'll give you the world of security operations. The first in a new short-and-sweet video series from Google Cloud Security covering essential SecOps topics brings us Anton Chuvakin, who shares the top challenges facing SOC teams and dispenses advice for overcoming them.
Google SecOps provides greater flexibility for organizations writing detections based on statistical measures over time. This post introduces the concepts of metric functions and how they can be used in YARA-L rules!
The “New to Chronicle” blog found on chronicle.security has moved to the Community Blog. This blog was originally published on September 22nd, 2022 and adds the outcome section and its usage to YARA-L rules to provide additional context around the detection.
The “New to Chronicle” blog found on chronicle.security has moved to the Community Blog. This blog was originally published on September 6th, 2022 and extends the concepts of single event YARA-L rules to add additional capabilities for multi-event rules.
Not everyone has time to create and maintain detections. We recognize that customers require the ability to easily access and tune detection rules across various use cases to their own unique needs. And Google Security Operations and Okta have been collaborating to bring these use case-based detections to an even wider audience.
Ready to streamline your incident response and supercharge your security team? This 3-part blog series by David Nehoda will show you how to get the most out of your SOAR platform.
The “New to Chronicle” blog found on chronicle.security has moved to the Community Blog. This blog was originally published on August 18th, 2022 and introduces the concepts found in single event YARA-L rules.
A clear roadmap is essential for success with any new technology. In this blog post, david-nehoda will outline the ideal path to adopting Mandiant Security Validation, maximizing your investment and achieving a stronger security posture.
The “New to Chronicle” blog found on chronicle.security has moved to the Community Blog. This blog was originally published on August 1st, 2022. Learn the basics of unified data model, UDM, in Google SecOps using searches to see how querying this data extracts a good deal of value very easily
UDM Lookup provides users of Google SecOps the ability to quickly and easily identify fields of interest and append these to searches while assisting users to better understand where their data is parsed and stored.
Enhance the capabilities of Chronicle's REST API using Python. Add and remove entries to and from existing Reference Lists with client-side logic. Your list updates can be automated!
Building on top of our previous post, this blog will use the alert graph in an investigation of suspicious activity within a GCP environment.
Interested in detections that you can leverage in Chronicle with your Azure Active Directory (Entra ID)? We’ve built a set that can help you to develop your own use cases.
Cloud threats are getting more complex. Learn how to boost your AWS security posture with Chronicle SIEM. It includes expertly crafted detection rules to easily identify threats. Get hands-on with examples!