[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["わかりにくい","hardToUnderstand","thumb-down"],["情報またはサンプルコードが不正確","incorrectInformationOrSampleCode","thumb-down"],["必要な情報 / サンプルがない","missingTheInformationSamplesINeed","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-01-14 UTC。"],[[["Applied Threat Intelligence (ATI) in Google SecOps uses YARA-L rules to contextualize IOC matches with Mandiant intelligence, enabling intelligence-driven alert prioritization."],["ATI's prioritization is based on Mandiant intelligence features, including Mandiant IC-Score, Active IR, Prevalence, Attribution, Scanner, Commodity, Blocked status, and Network Direction."],["ATI employs priority models like Active Breach, High priority, and Inbound IP Address Authentication, each using specific feature combinations to focus on actionable threat intelligence."],["The Active Breach model emphasizes indicators observed in Mandiant investigations with active or past compromises, while the high priority focuses on indicators identified by Mandiant as strongly associated with threat actors or malware."],["You can leverage the pre-built \"Applied Threat Intelligence - Curated Prioritization\" rule pack or build custom rules using Mandiant Fusion Intelligence with a Google SecOps license."]]],[]]