Saat Anda membuat dan mengaktifkan aturan baru, aturan tersebut akan mulai menelusuri deteksi berdasarkan peristiwa yang diterima oleh akun Google Security Operations Anda secara real time. Retrohunt memungkinkan Anda menggunakan aturan yang dipilih untuk menelusuri deteksi di seluruh data yang ada di Google SecOps. Retrohunt dijadwalkan saat ada resource yang tersedia untuk dijalankan. Perkirakan varians dalam waktu proses retrohunt.
Untuk memulai retrohunt, selesaikan langkah-langkah berikut:
Buka Dasbor Aturan.
Klik ikon opsi Aturan untuk suatu aturan, lalu pilih Yara-L Retrohunt.
Opsi Retrohunt YARA-L
Di jendela dialog YARA-L Retrohunt, pilih waktu mulai dan waktu berakhir untuk penelusuran Anda. Defaultnya adalah satu minggu. Jendela ini menampilkan rentang tanggal dan waktu yang tersedia. Klik JALANKAN jika sudah siap.
Jendela dialog Retrohunt Yara-L
Anda dapat melihat progres retrohunt yang dijalankan dari tampilan deteksi aturan untuk aturan tersebut. Jika membatalkan retrohunt yang sedang berlangsung, Anda tetap dapat melihat deteksi yang berhasil dilakukan saat dijalankan.
Jika Anda telah menyelesaikan beberapa retrohunt, Anda dapat melihat hasil retrohunt sebelumnya dengan mengklik link rentang tanggal seperti yang ditunjukkan pada gambar berikut. Hasil setiap proses ditampilkan dalam grafik Linimasa dan Deteksi di tampilan Deteksi Aturan.
Retrohunt Yara-L berjalan
Jika Anda menggunakan daftar referensi dalam aturan, jalankan retrohunt,
lalu hapus item dari daftar tersebut, Anda harus merevisi
aturan tersebut ke versi baru untuk melihat hasil baru. Google SecOps tidak menghapus deteksi dari daftar referensi, sehingga memperbarui aturan tidak akan memperbarui hasilnya.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-08-21 UTC."],[[["\u003cp\u003eRetrohunts allow you to apply a selected rule to search for detections within existing historical data in Google Security Operations.\u003c/p\u003e\n"],["\u003cp\u003eRetrohunts are scheduled based on resource availability, which results in variable run times.\u003c/p\u003e\n"],["\u003cp\u003eAlerting for detections found via retrohunt is disabled if the rule's alerting status is disabled; you need to create a new version of the rule with alerting enabled and rerun the retrohunt to enable it.\u003c/p\u003e\n"],["\u003cp\u003eYou can initiate a retrohunt from the Rules Dashboard by selecting "Yara-L Retrohunt" for a specific rule, and then specifying the desired start and end time for the search.\u003c/p\u003e\n"],["\u003cp\u003ePast retrohunt results can be viewed in the Rule Detections view via a date range link, which displays the information in the Timeline and Detections graph.\u003c/p\u003e\n"]]],[],null,["# Running a rule against historical data\n======================================\n\nSupported in: \nGoogle secops [SIEM](/chronicle/docs/secops/google-secops-siem-toc)\n\nWhen you create and enable a new rule, the rule begins searching for detections\nbased on the events received by your Google Security Operations account in real\ntime. A retrohunt lets you use the selected rule to\nsearch for detections throughout existing data in\nGoogle SecOps. Retrohunts are scheduled when there are\navailable resources to run. Expect variance in retrohunt run times.\n| **Note:** When you create detections using retrohunt on a rule with alerting status disabled, alerting on these detections is disabled as well. To enable alerting, create a new version of the rule with alerting status enabled and re-run the retrohunt.\n\nTo start a retrohunt, complete the following steps:\n\n1. Navigate to the Rules Dashboard.\n\n2. Click the Rules option icon for a rule and select **Yara-L Retrohunt**.\n\n\n **YARA-L Retrohunt option**\n3. In the YARA-L Retrohunt dialog window, select the start time and end time for your search. The default is one week. The window provides the available date and time range. Click **RUN** when ready.\n\n **Yara-L Retrohunt dialog window**\n4. You can view the progress of the retrohunt run from the rule detections view for the rule. If you cancel a retrohunt in progress, you can still view any detections it was able to make while running.\n\n5. If you have completed multiple retrohunts, you can view the results of past retrohunt runs by clicking the date range link as shown in the following figure. The results of each run are displayed in the Timeline and Detections graph in Rule Detections view.\n\n **Yara-L retrohunt runs**\n6. If you use a reference list in a rule, run a retrohunt,\n and then remove items from that list, then you need to revise\n that rule to a new version to see the new results. Google SecOps doesn't delete detections from\n reference lists, so refreshing the rule won't update the results.\n\n**Need more help?** [Get answers from Community members and Google SecOps professionals.](https://security.googlecloudcommunity.com/google-security-operations-2)"]]