Untuk membuka Dasbor Aturan di Google Security Operations, pilih Aturan dari ikon menu apps.
Dasbor Aturan menampilkan semua aturan yang telah Anda simpan dalam akun Google SecOps Anda. Pada sistem yang menggunakan RBAC data, Anda hanya dapat melihat dan mengelola aturan yang terikat ke cakupan data yang dapat Anda akses.
Dasbor aturan mencakup fitur berikut:
Grafik tren menampilkan aturan dengan jumlah deteksi terbanyak selama 3 minggu terakhir.
Menampilkan grafik aktivitas yang terkait dengan aturan. Mengarahkan kursor ke batang dalam diagram
akan menampilkan tanggal dan jumlah deteksi.
Frekuensi eksekusi menunjukkan perkiraan frekuensi eksekusi aturan.
Status Langsung (Diaktifkan atau Dinonaktifkan).
Tingkat keseriusan aturan seperti dalam metadata Aturan.
Jika mengarahkan kursor ke aturan dan mengklik ikon menu di sebelah kanan, Anda dapat membuka menu Setelan Aturan dan memanipulasi opsi Aturan Aktif, Frekuensi Menjalankan, dan Notifikasi.
Aturan Aktif memantau log masuk Anda untuk mendeteksi ancaman hingga dihapus atau dinonaktifkan.
Pemberitahuan menunjukkan anomali dalam alur kerja traffic normal dalam perusahaan. Anda harus menyelidiki pemberitahuan sebagai kemungkinan pelanggaran keamanan.
Frekuensi Eksekusi menunjukkan perkiraan frekuensi eksekusi aturan dan memengaruhi latensi dengan
deteksi yang ditemukan untuk setiap aturan.
Retrohunt YARA-L memungkinkan Anda menggunakan aturan yang dipilih untuk menelusuri deteksi di seluruh data yang ada di {google_secops_name_short}}.
Edit Aturan memungkinkan Anda mengedit aturan yang ada dan membuat aturan baru.
Lihat Deteksi Aturan memungkinkan Anda melihat deteksi yang dihasilkan oleh aturan aktif.
Mengarsipkan menyembunyikan aturan dan data keamanan yang terkait dengan aturan tersebut (dan semua versinya) tanpa
benar-benar menghapus aturan.
Mengklik nama aturan akan membuka tampilan Deteksi Aturan.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-08-21 UTC."],[[["\u003cp\u003eThe Rules Dashboard in Google Security Operations displays all stored rules, with data RBAC systems restricting access to rules bound to accessible data scopes.\u003c/p\u003e\n"],["\u003cp\u003eThe dashboard features a trend chart showing the rule with the most detections in the past three weeks, alongside a graph of rule-related activity, including rule execution frequency and live status.\u003c/p\u003e\n"],["\u003cp\u003eHovering over a rule allows access to the Rule Settings menu, where options like Live Rule, Run Frequency, and Notifications can be adjusted, and the selected rule can be used for YARA-L Retrohunt.\u003c/p\u003e\n"],["\u003cp\u003eUsers can view detections, edit rules, and archive rules, while also having access to more resources through the provided link.\u003c/p\u003e\n"]]],[],null,["# Viewing rules in Rules Dashboard\n================================\n\nSupported in: \nGoogle secops [SIEM](/chronicle/docs/secops/google-secops-siem-toc)\n\nTo open the Rules Dashboard in Google Security Operations, select **Rules** from\nthe menu icon apps.\nThe Rules Dashboard displays all of the rules you\nhave stored within your Google SecOps account. On systems that use\ndata RBAC, you can view and manage only those rules that are bound to a data\nscope that you have access to.\n\nThe rules dashboard includes the following features:\n\n- Trend chart displays the rule with the greatest number of detections over the past 3 weeks.\n- Displays a graph of the activity associated with the rules. Hovering over a bar in the chart displays the date and number of detections.\n- Run frequency indicates the approximate frequency the rule will execute.\n- Live Status (Enabled or Disabled).\n- Rule severity as in the Rule metadata.\n\nIf you hover over a rule and click the menu icon to the right, you can open\nthe **Rule Settings**\nmenu and manipulate the **Live Rule** , **Run Frequency** , and **Notifications** options.\n\n- **Live Rule** monitors your incoming logs for threats until it is deleted or disabled.\n- Alerting indicates an anomaly in the normal workflow of traffic within the enterprise. You should investigate alerts as a possible breach of security.\n- **Run Frequency** indicates the approximate frequency the rule will execute and impacts the latency with which detections are discovered for each rule.\n- **YARA-L Retrohunt** enables you to use the selected rule to search for detections throughout existing data in {google_secops_name_short}}.\n- **Edit Rule** enables you to edit existing rules and create new rules.\n- **View Rule Detections** enables you to view detections generated by a live rule.\n- **Archive** hides the rule and the security data related to that rule (and all of its versions) without actually deleting the rule.\n\nClicking a rule name opens the **Rule Detections** view.\n\n**Need more help?** [Get answers from Community members and Google SecOps professionals.](https://security.googlecloudcommunity.com/google-security-operations-2)"]]