Create a detection rule from a feed
Link a feed to a CTI detection rule to automatically monitor your environment for specific threats. This feature requires a Defend subscription.
Prerequisites
You must have a Defend subscription and the necessary permissions to manage detection rules.
Procedure
- Navigate to Rules catalog.
- Click to create a new rule.
- In the detection pattern, select CTI.
- Select your custom feed from the list.
- Configure the rule logic and status.
- Click Save.
The rule is now active. It checks both incoming telemetry and historical events for matches against the feed indicators.
Related articles
- Feeds: Understand what feeds are, how they work, available formats, and the default feed.
- Create a feed: Configure and activate a new feed by selecting object types, sources, TLP levels, and output format.
- Manage feeds: Consume, edit, duplicate, or delete an existing feed.