Pattern creation in enterprise threat detection
First Claim
Patent Images
1. A computer-implemented method, comprising:
- receiving search results from an initiated free text search of log data from one or more logs, the free text performed using search terms entered into a free text search graphical user interface;
selecting a set of at least one search result from the search results containing an event desired to be identified in a completed enterprise threat detection (ETD) pattern;
rendering a forensic lab application to complete an ETD pattern;
adding an event filter for an event type based on normalized log data to a path;
setting a relative ETD pattern time range; and
completing an ETD pattern based on the added event filter.
1 Assignment
0 Petitions
Accused Products
Abstract
Search results are received from an initiated free text search of log data from one or more logs, where the free text is performed using search terms entered into a free text search graphical user interface. A set of at least one search result is selected from the search results containing an event desired to be identified in a completed enterprise threat detection (ETD) pattern. A forensic lab application is rendered to complete an ETD pattern. An event filter is added for an event type based on normalized log data to a path. A relative ETD pattern time range is set and an ETD pattern is completed based on the added event filter.
183 Citations
21 Claims
-
1. A computer-implemented method, comprising:
-
receiving search results from an initiated free text search of log data from one or more logs, the free text performed using search terms entered into a free text search graphical user interface; selecting a set of at least one search result from the search results containing an event desired to be identified in a completed enterprise threat detection (ETD) pattern; rendering a forensic lab application to complete an ETD pattern; adding an event filter for an event type based on normalized log data to a path; setting a relative ETD pattern time range; and completing an ETD pattern based on the added event filter. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory, computer-readable medium storing one or more instructions executable by a computer system to perform operations comprising:
-
receiving search results from an initiated free text search of log data from one or more logs, the free text performed using search terms entered into a free text search graphical user interface; selecting a set of at least one search result from the search results containing an event desired to be identified in a completed enterprise threat detection (ETD) pattern; rendering a forensic lab application to complete an ETD pattern; adding an event filter for an event type based on normalized log data to a path; setting a relative ETD pattern time range; and completing an ETD pattern based on the added event filter. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented system, comprising:
-
a computer memory; and a hardware processor interoperably coupled with the computer memory and configured to perform operations comprising; receiving search results from an initiated free text search of log data from one or more logs, the free text performed using search terms entered into a free text search graphical user interface; selecting a set of at least one search result from the search results containing an event desired to be identified in a completed enterprise threat detection (ETD) pattern; rendering a forensic lab application to complete an ETD pattern; adding an event filter for an event type based on normalized log data to a path; setting a relative ETD pattern time range; and completing an ETD pattern based on the added event filter. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification