Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Memfilter data dalam tampilan Deteksi Aturan
Tampilan Deteksi Aturan menampilkan metadata yang disertakan ke aturan dan grafik yang menunjukkan jumlah deteksi yang ditemukan oleh aturan selama beberapa hari terakhir.
Untuk mengakses tampilan Deteksi Aturan di Google Security Operations, selesaikan langkah-langkah berikut:
Di menu navigasi pada bagian Deteksi, pilih Aturan & Deteksi untuk menampilkan dasbor Aturan.
Klik nama aturan. Tampilan Deteksi Aturan akan ditampilkan.
Klik panah kanan di kolom Deteksi di panel navigasi sebelah kiri.
Klik ikon di sudut kanan atas antarmuka pengguna Google SecOps untuk membuka menu Pemfilteran Terstruktur.
Opsi Pemfilteran Terprogram berikut ditampilkan di tampilan Deteksi Aturan (daftar ini tidak menyertakan semua opsi pemfilteran):
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-09-04 UTC."],[[["\u003cp\u003eThe Rule Detections view displays rule metadata and a graph of recent detections.\u003c/p\u003e\n"],["\u003cp\u003eAccess the Rule Detections view by navigating to \u003cstrong\u003eRules & Detections\u003c/strong\u003e and selecting a rule name, then click the right arrow in the Detections column.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003cstrong\u003eProcedural Filtering\u003c/strong\u003e menu, accessed via an icon in the top right corner, allows users to filter detection data.\u003c/p\u003e\n"],["\u003cp\u003eAvailable filtering options in Rule Detections view include \u003ccode\u003eMETADATA.EVENT_TYPE\u003c/code\u003e, \u003ccode\u003eMETADATA.PRODUCT_NAME\u003c/code\u003e, and various network-related parameters like \u003ccode\u003eNETWORK.APPLICATION_PROTOCOL\u003c/code\u003e and DNS details.\u003c/p\u003e\n"],["\u003cp\u003eThe fields available for Procedural Filtering are determined by the specific events returned for a detection.\u003c/p\u003e\n"]]],[],null,["# Filter data in Rule Detections view\n===================================\n\nRule Detections view displays the metadata attached to the rule and a graph showing the number of detections found by the rule over recent days.\n\nTo access the Rule Detection view in Google Security Operations, complete the following steps:\n\n1. In the navigation bar under Detections, select **Rules \\& Detections** to display the Rules dashboard.\n\n2. Click a rule name. The Rule Detections view is displayed.\n\n3. Click the right arrow in the Detections column in the left navigation panel.\n\n4. Click the icon\n in the top right corner of the Google SecOps\n user interface to open the **Procedural Filtering** menu.\n\n The following Procedural Filtering options are displayed in the Rule Detection view (this list does not include all the filtering options):\n - METADATA.EVENT_TYPE\n - METADATA.PRODUCT_NAME\n - NETWORK.APPLICATION_PROTOCOL\n - NETWORK.DNS.QUESTIONS.CLASS\n - NETWORK.DNS.ANSWERS.DATA\n - NETWORK.DNS.ANSWERS.NAME\n - NETWORK.DNS.ANSWERS.TTL\n - NETWORK.DNS.ANSWERS.TYPE\n - NETWORK.DNS.QUESTIONS.CLASS\n - NETWORK.DNS.QUESTIONS.NAME\n - NETWORK.DNS.QUESTIONS.TYPE\n\n| **Note:** The fields available for Procedural Filtering are dependent on the events returned for this detection."]]