[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-08-21。"],[[["\u003cp\u003eGoogle Cloud Threat Intelligence (GCTI) provides managed YARA-L rules for Google Security Operations customers, offering out-of-the-box threat analytics.\u003c/p\u003e\n"],["\u003cp\u003eThe curated detections page allows users to access GCTI-managed rule sets, which can be enabled or disabled, along with their associated alerts, within the Google Security Operations account.\u003c/p\u003e\n"],["\u003cp\u003eThe curated detection dashboard displays information on rule sets, including activity, last detection time, status, severity, and alerting status.\u003c/p\u003e\n"],["\u003cp\u003eUsers can modify settings for curated detections, including enabling/disabling precise or broad rules and their alerting, and adding exclusions or items to the reference list for each rule set.\u003c/p\u003e\n"],["\u003cp\u003eThe curated detection view enables users to examine detections and pivot to other views, such as the Asset view, for deeper investigation.\u003c/p\u003e\n"]]],[],null,["# Use the curated detections page\n===============================\n\nSupported in: \nGoogle secops [SIEM](/chronicle/docs/secops/google-secops-siem-toc)\n\nThis document describes how to use the curated detections pages.\n\nFor Google Security Operations customers, Google Cloud Threat Intelligence (GCTI) team is offering out-of-the-box threat analytics as part of Google Cloud Security Shared Fate model. As part of these curated detections, GCTI provides and manages a set of YARA-L rules to help customers identify threats to their enterprise.\nThese GCTI managed rules:\n\n- Provide customers with immediately actionable intelligence which can be used against their ingested data.\n\n- Leverages Google's threat intelligence by providing customers with a way to use it within Google SecOps.\n\nBefore you begin\n----------------\n\nFor information about predefined threat detection policies, see the following:\n\n- [Overview of Cloud Threats category](/chronicle/docs/detection/cloud-threats-category)\n- [Overview of Chrome Enterprise Threats category](/chronicle/docs/detection/chrome-enterprise-threats-category)\n- [Overview of Windows Threats category](/chronicle/docs/detection/windows-threats-category)\n- [Overview of Linux Threats category](/chronicle/docs/detection/linux-threats-category)\n- [Overview of macOS Threats category](/chronicle/docs/detection/macos-threats-category)\n- [Overview of Risk Analytics for UEBA category](/chronicle/docs/detection/risk-analytics-ueba-category)\n- [Overview of Applied Threat Intelligence category](/chronicle/docs/detection/ati-curated-detections)\n\nTo verify that data required for each policy is in the correct format, see [Verify log data ingestion using test rules](/chronicle/docs/detection/verify-data-ingestion).\n\nCurated detections features\n---------------------------\n\nThe following are some of the key curated detections features:\n\n- Curated Detection: curated detection created and managed by GCTI for Google SecOps customers.\n\n- Rule sets: Collection of rules managed by GCTI for Google SecOps customers. GCTI provides and maintains multiple rule sets. The customer has the option to enable or disable these rules within their Google SecOps account and to enable or disable alerts for these rules. New rules and rule sets will be periodically provided by GCTI as the threat landscape changes.\n\nOpen the curated detections page and rule sets\n----------------------------------------------\n\nTo open the curated detections page, complete the following steps:\n\n1. Select **Rules** from the main menu.\n\n2. Click **Curated Detections** to open the rule sets view.\n\nThe Curated Detection page provides information about each of the rule sets active for your Google SecOps account including the following:\n\n- Last updated: Time GCTI last updated the rule set.\n\n- Enabled Rules: Indicates which of the Precise and Broad rules are enabled for each rule set. Precise rules find malicious threats with a high degree of confidence. Broad rules search for suspicious behavior that may be more common and produce more false positives. Both Precise and Broad rules might be available for a rule set.\n\n- Alerting: Indicates which of the Precise and Broad rules have alerting enabled for each rule set.\n\n- Mitre Tactics: Identifier of the Mitre ATT\\&CK® tactics covered by each rule set. Mitre ATT\\&CK® tactics represent the intent behind malicious behavior.\n\n- Mitre Techniques: Identifier of the Mitre ATT\\&CK® techniques covered by each rule set. Mitre ATT\\&CK® techniques represent specific actions of malicious behavior\n\n | **Note:** For more information about Mitre Tactics and Techniques, see the official MITRE ATT\\&CK page at \u003chttps://attack.mitre.org/\u003e.\n\nFrom this page, you can also enable or disable the rule and alerting for the rule. You can do this for either the broad or the precise rules.\n\nOpen the curated detection dashboard\n------------------------------------\n\nThe curated detection dashboard displays information about each curated detection which has produced a detection against the log data in your Google SecOps account. Rules with detections are grouped by rule set.\n\nTo open the curated detection dashboard, complete the following steps:\n\n1. Select **Rules** from the main menu. The default tab is curated detections and the default view is rule sets.\n\n2. Click **Dashboard**.\n\n **Figure 2: Curated Detections dashboard**\n3. The Curated Detections dashboard displays each of the rule sets available to your Google SecOps account. Each display includes the following:\n\n - Chart tracking the current activity for each of the rules associated with a rule set.\n\n - Time of the last detection.\n\n - Status of each rule.\n\n - Severity of recent detections.\n\n - Whether alerting is enabled or disabled.\n\n4. You can edit the rule settings by clicking the menu icon more_vert or the rule set name.\n\n5. Click **Rule Sets** to switch back to the rule sets view. The rule sets view provides information about each rule set active for your Google SecOps account.\n\nView details about a rule set\n-----------------------------\n\nYou can modify the settings for any curated detection by clicking the menu icon more_vert for the rule set, and then selecting **View and edit rule settings**.\n\nYou enable or disable the rule set under the **Settings** section.\nThe **Status** and **Alerting** toggles let you enable or disable the precise and broad rules in the rule set. You can also turn on or turn off alerting.\n\nYou can also view all of the exclusions configured for the rule set. You can edit the exclusions by clicking **View** . See [Configure rule exclusions](/chronicle/docs/detection/rule-exclusions) for more information.\n\n**Figure 3: Rule Settings**\n\nModification of all the rules in a rule set\n-------------------------------------------\n\nThe **Settings** section displays the settings for all rules in a rule\nset. You can modify the settings to create curated detections specific to your\norganizational usage and needs.\n\n- **Precise rules**: Find malicious behavior with a higher degree of confidence with\n fewer false positives due to the more specific nature of the rule.\n\n- **Broad rules**: Find behavior that could potentially be malicious or anomalous,\n but with typically more false positives due to the more general nature of the rule.\n\n- **Status** : Activate a rule's status as precise or broad by setting the corresponding\n **Status** option to **Enabled**.\n\n- **Alerting** : Enable alerting to receive detections created by corresponding precise\n or broad rules by setting the **Alerting** option to **On**.\n\nConfigure rule exclusions\n-------------------------\n\nTo manage the volume of alerts from GCTI\ncurated detections, you can configure rule exclusions. For more information, see\n[Configure rule exclusions](/chronicle/docs/detection/rule-exclusions).\n\nView curated detections\n-----------------------\n\nYou can view any of the curated detections in the Curated Detection view. This view lets you examine any of the detections associated with the rule and pivot to other views such as [Asset view](/chronicle/docs/investigation/investigate-asset) from the Timeline.\n\nTo open the Curated Detection view, complete the following steps:\n\n1. Click **Dashboard**.\n\n2. Click the rule name link in the Rule column.\n\n| **Note:** Curated detections can only be edited by Google SecOps, so all of the normal rule editing options are missing.\n\nWhat's next\n-----------\n\n- [Investigate a GCTI alert](/chronicle/docs/investigation/investigate-uppercase-alert)\n- [Tune alerts returned by rule sets in this category](/chronicle/docs/detection/use-curated-detections#tune-detections)\n\n**Need more help?** [Get answers from Community members and Google SecOps professionals.](https://security.googlecloudcommunity.com/google-security-operations-2)"]]