Rules that have tests against both event and flow data in QRadar are typically known as "Anomaly rules." These rules are designed to detect unusual or unexpected patterns of activity that deviate from the norm, which can be indicative of security threats. By analyzing both event data (which could include log entries, system alerts, etc.) and flow data (which represents network traffic), anomaly rules can provide a comprehensive view of potential security incidents, identifying anomalies that might not be evident when looking at event or flow data in isolation.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit