Google SecOps Threat Detection feature allows for detection enrichment capabilities that enables security analysts and detection engineers to craft a detection on a basic pattern of event telemetry (an outbound network connection), creating numerous detections for their analysts to triage. The analysts attempt to stitch together an understanding of what happened to trigger the alert and how significant the threat is.
Actions
View Alerts and IOCs
Google SecOps features an Alerts and IOCs page, that displays all the alerts and indicators of compromise (IOC) currently impacting your enterprise. This provides multiple tools that enable you to filter and view your alerts and IOCs.
Show More
Steps
Users will navigate to the left-side Navigation Bar and then select Detection , which will display a dropdown menu.
Select Alerts & IOCs to display the Alerts & IOCs page.
Users will see two tabs:
Alerts
IOC Matches
Users will have options in the popout page, under the Alerts tab consisting of:
Manage Columns
Filter
Status
Clear All
Search Bar
Refresh Time
Showing (Date Range)
Refresh
Alerts List Options
Under the IOC Matches tab, users will see a Filters section consisting of:
Associations
Campaigns
Categories
GCTI Priority
Sources
Status
Type
At the top of the IOCs list popout, users will see Filter options consisting of:
Filter
Search Bar
Date Range
Refresh
Download as CSV
In the IOCs popout section, users will see a list of IOCs with multiple columns:
IOC
Type
Status
GCTI Priority
Categories
Sources
Assets
Severity
Associations
Campaigns
First/ Last Seen
VirusTotal Context
Additional Documentation Links
Steps
Users will navigate to the left-side Navigation Bar and then select Detection, which will display a dropdown menu.
Select Alerts & IOCs to display the Alerts & IOCs page.
Users will see two tabs:
Alerts
IOC Matches
Users will have options in the popout page, under the Alerts tab consisting of:
Manage Columns
Filter
Status
Clear All
Search Bar
Refresh Time
Showing (Date Range)
Refresh
Alerts List Options
Under the IOC Matches tab, users will see a Filters section consisting of:
Associations
Campaigns
Categories
GCTI Priority
Sources
Status
Type
At the top of the IOCs list popout, users will see Filter options consisting of:
Filter
Search Bar
Date Range
Refresh
Download as CSV
In the IOCs popout section, users will see a list of IOCs with multiple columns:
IOC
Type
Status
GCTI Priority
Categories
Sources
Assets
Severity
Associations
Campaigns
First/ Last Seen
VirusTotal Context
Additional Documentation Links
[All Steps] https://cloud.google.com/chronicle/docs/investigation/alerts-iocs
Create/ Monitor Events w/ Rules
Google SecOps features Rules feature, that are the backbone of ensuring data is actionable and aligned to your unique policies within Google SecOps. Rules allow your SecOps team to tailor information and alerting to the unique needs of your organization.
Show More
Steps
Users will navigate to the left-side Navigation Bar and then select Detection , which will display a dropdown menu.
Select Rules & Detections in the dropdown to display the Rules & Detections page.
The Rules & Detections page will display four tabs consisting of the following features:
Rules Dashboard
Rules Editor
Curtated Detections
Exclusions
In the Rules Dashboard , users will see the following features at the top of the page:
Search Rules
Data Freshness
Last Refreshed Time
Below in the Rules Dashboard users will be able to see a Rules List consisting of the Rules Search results.
The Rules Dashboard results list consists of the following columns:
Number of Detections Found Today
Rule Name
Detections Per Day
Last Detection
Author
Severity
Alerting
Retrohunt
Rule Type
Run Frequency
Live Status
The Rules Editor page will display the capability to:
Create New Rule
Filter
Reference List
When users select the New Rule button, a Rules Editor Terminal will appear in the Rules Editor page.
When a Rule is completed, user will have the option to Discard the Rule or Save New Rule .
At the bottom-right of the Rules Editor , users can run a test on their new Rule by selecting Run Test .
Users will have the capability to select from a Curated Detection list under the Curated Detections tab.
At the top of the page, users will see a display of the highlighted Rules, consisting of:
Enabled Rule Sets
Most Active Rules
Most Active Rule Sets
Users will also be able to see in the main section of Curated Detections :
Rules Sets
Rules Dashboard
In the Rule Sets section, users will see displayed, a list of Rule Sets , with the following columns:
Name
Last Updated
Enabled Rules
Alerting
Capacity
MITRE Tactics
MITRE Techniques
When a Rule Set is selected, user will see a display page of the Rule’s Settings and Sources .
In the Exclusions page, users will see a display of Exclusions , with the following columns:
Exclusion Name
Applied To
Activity
Created On
Last Updated
Status
Users can create an Exclusion by selecting Create Exclusion.
In the Create An Exclusion popup, users can filter out Detections that meet specific criteria, under the following entry fields:
Exclusion Name
Rule Set or Rule
UDM Field
Operator
Values
Add Conditional Statement
Users will have an option to test the Exclusion Rule by selecting Run Test .
To add the Exclusion Rule , users will select Add Rule Exclusion.
Additional Documentation Links
Steps
Users will navigate to the left-side Navigation Bar and then select Detection, which will display a dropdown menu.
Select Rules & Detections in the dropdown to display the Rules & Detections page.
The Rules & Detections page will display four tabs consisting of the following features:
Rules Dashboard
Rules Editor
Curtated Detections
Exclusions
In the Rules Dashboard, users will see the following features at the top of the page:
Search Rules
Data Freshness
Last Refreshed Time
Below in the Rules Dashboard users will be able to see a Rules List consisting of the Rules Search results.
The Rules Dashboard results list consists of the following columns:
Number of Detections Found Today
Rule Name
Detections Per Day
Last Detection
Author
Severity
Alerting
Retrohunt
Rule Type
Run Frequency
Live Status
The Rules Editor page will display the capability to:
Create New Rule
Filter
Reference List
When users select the New Rule button, a Rules Editor Terminal will appear in the Rules Editor page.
When a Rule is completed, user will have the option to Discard the Rule or Save New Rule.
At the bottom-right of the Rules Editor, users can run a test on their new Rule by selecting Run Test.
Users will have the capability to select from a Curated Detection list under the Curated Detections tab.
At the top of the page, users will see a display of the highlighted Rules, consisting of:
Enabled Rule Sets
Most Active Rules
Most Active Rule Sets
Users will also be able to see in the main section of Curated Detections:
Rules Sets
Rules Dashboard
In the Rule Sets section, users will see displayed, a list of Rule Sets, with the following columns:
Name
Last Updated
Enabled Rules
Alerting
Capacity
MITRE Tactics
MITRE Techniques
When a Rule Set is selected, user will see a display page of the Rule’s Settings and Sources.
In the Exclusions page, users will see a display of Exclusions, with the following columns:
Exclusion Name
Applied To
Activity
Created On
Last Updated
Status
Users can create an Exclusion by selecting Create Exclusion.
In the Create An Exclusion popup, users can filter out Detections that meet specific criteria, under the following entry fields:
Exclusion Name
Rule Set or Rule
UDM Field
Operator
Values
Add Conditional Statement
Users will have an option to test the Exclusion Rule by selecting Run Test.
To add the Exclusion Rule, users will select Add Rule Exclusion.
Additional Documentation Links
[All Steps] https://cloud.google.com/chronicle/docs/detection/view-all-rules
Risk Analytics
Google SecOps Risk Analytics dashboard lets you view your environment through a risk-based lens. Visualizing entity risk trends helps you identify unusual behavior and understand the potential risk that entities pose to your enterprise.
The Risk Analytics dashboard lists at-risk entities and risk factor details.
Show More
Steps
Users will navigate to the left-side Navigation Bar and then select Detection , which will display a dropdown menu.
Select Risk Analytics in the dropdown to display the Risk Analytics page.
The Risk Analytics page will display two tabs consisting of the following features:
Behavior Analytics
Watchlists
In the Behavior Analytics page, users will see the following sections:
Summary Metrics
Entities
The Summary Metrics section will display the Total Count of Entities and Risk Score Distribution metrics.
At the bottom of the Behavioral Analytics page, users will see the Entities section consisting of the following columns:
Entity Name
Entity Type
Normalized
Normalized Change
Normalized Trend
Base
Base Change
Base Trend
Findings Count
First Seen in Window
Last Seen in Window
Users will select a Risk Analytic Entity and see the Findings Timeline consisting of the Findings and the Entity Details .
Additional Documentation Links
Steps
Users will navigate to the left-side Navigation Bar and then select Detection, which will display a dropdown menu.
Select Risk Analytics in the dropdown to display the Risk Analytics page.
The Risk Analytics page will display two tabs consisting of the following features:
Behavior Analytics
Watchlists
In the Behavior Analytics page, users will see the following sections:
Summary Metrics
Entities
The Summary Metrics section will display the Total Count of Entities and Risk Score Distribution metrics.
At the bottom of the Behavioral Analytics page, users will see the Entities section consisting of the following columns:
Entity Name
Entity Type
Normalized
Normalized Change
Normalized Trend
Base
Base Change
Base Trend
Findings Count
First Seen in Window
Last Seen in Window
Users will select a Risk Analytic Entity and see the Findings Timeline consisting of the Findings and the Entity Details.
Additional Documentation Links
[All Steps] https://cloud.google.com/chronicle/docs/detection/risk-analytics-overview
List Manager
Google SecOps List Manager is a tool that allows users to manage reference lists and add custom lists. Users can add scopes to reference lists, open reference lists associated with rule sets, and add items to them.
Show More
Steps
Users will navigate to the left-side Navigation Bar and then select Detection , which will display a dropdown menu.
Select List in the dropdown to display the List Manager page.
The List Manager page will display a popout of the Lists available to the user, along with the List Details and who the List is Referenced By .
Users will be able to Create a List by selecting Create in the List Manger.
The List Manager will show a List Manager Details Terminal consisting of the following:
Syntax Type
Title
Description
Terminal
When complete users will select Save Edits .
Additional Documentation Links
Steps
Users will navigate to the left-side Navigation Bar and then select Detection, which will display a dropdown menu.
Select List in the dropdown to display the List Manager page.
The List Manager page will display a popout of the Lists available to the user, along with the List Details and who the List is Referenced By.
Users will be able to Create a List by selecting Create in the List Manger.
The List Manager will show a List Manager Details Terminal consisting of the following:
Syntax Type
Title
Description
Terminal
When complete users will select Save Edits.
Additional Documentation Links
[All Steps] https://cloud.google.com/chronicle/docs/detection/risk-analytics-overview
Next Step: Security Operations: Step 4 - Investigate
Previous Step: Security Operations: Step 3 - Detect