Splunk Inc.
User interface for defining custom threat rules in a network security system

Last updated:

Abstract:

The disclosed embodiments include a method performed by a computer system. The method includes causing display of one or more graphical controls enabling a user to define attributes of a threat rule, the attributes including a type of computer network entity and an anomaly pattern associated with the type of computer network entity. The method further includes generating the threat rule based on interaction by a user with the one or more graphical controls, wherein the threat rule identifies a security threat to the computer network that satisfies the attributes of the threat rule based on one or more detected anomalies on the computer network.

Status:
Grant
Type:

Utility

Filling date:

30 Apr 2017

Issue date:

8 Jun 2021