단순 규칙
단순/YAML 규칙에 대한 REST API 작업
개요
이 API 작업을 사용하여 상호작용하세요 규칙 다음으로 생성됨 CLI 워크플로우의 간단한 탐지 또는 Panther 콘솔의 간단한 탐지 빌더.
API를 호출하려면 다음을 참조하세요 Panther REST API 사용 방법 지침—포함하여 이 문서 페이지에서 직접 호출하는 방법에 대한 안내.
필수 권한
다음을 위해
GET작업을 수행하려면 API 토큰에 다음 권한이 있어야 합니다규칙 보기권한이 있어야 합니다.다음을 위해
한 후 Panther에서 볼 수 있기까지 몇 분 기다려야 할 수 있습니다.,PUT및DELETE작업을 수행하려면 API 토큰에 다음 권한이 있어야 합니다규칙 관리권한이 있어야 합니다.
작업
set this field to false to exclude running tests prior to saving
trueset this field to true if you want to run tests without saving
falseThe alert context represented in YAML
The alert title represented in YAML
The amount of time in minutes for grouping alerts
60The description of the rule
The yaml representation of the rule
The display name of the rule
The dynamic severity represented in YAML
Determines whether or not the rule is active
The key on an event to group by represented in YAML
The id of the rule
The filter for the rule represented in YAML
log types
Determines if the simple rule is managed by panther
Destination IDs that override default alert routing based on severity
The python body of the rule
How to handle the generated alert
A list of fields in the event to create top 5 summaries for
The tags for the simple rule
the number of events that must match before an alert is triggered
1OK response.
No Content response.
No content
bad_request: Bad Request response.
exists: Conflict response.
ID of the rule to fetch
determines if associated python for the generated rule is returned
falseOK response.
not_found: Not Found response.
put creates or updates a rule
the id of the rule
set this field to false to exclude running tests prior to saving
trueset this field to true if you want to run tests without saving
falseThe alert context represented in YAML
The alert title represented in YAML
The amount of time in minutes for grouping alerts
60The description of the rule
The yaml representation of the rule
The display name of the rule
The dynamic severity represented in YAML
Determines whether or not the rule is active
The key on an event to group by represented in YAML
The id of the rule
The filter for the rule represented in YAML
log types
Determines if the simple rule is managed by panther
Destination IDs that override default alert routing based on severity
The python body of the rule
How to handle the generated alert
A list of fields in the event to create top 5 summaries for
The tags for the simple rule
the number of events that must match before an alert is triggered
1200 returned if the item already existed
201 returned if the item was created
No Content response.
No content
bad_request: Bad Request response.
ID of the simple rule to delete
No Content response.
No content
bad_request: Bad Request response.
not_found: Not Found response.
No content
the pagination token
the maximum results to return
100determines if associated python for the generated rule is returned
falseSubstring search by name (case-insensitive)
Only include rules in the given state
Only include rules which apply to one of the given log types
Only include rules with one of the given tags (case-insensitive)
Only include rules whose creator matches this user ID or actor ID
Only include rules last modified by this user ID or actor ID
OK response.
OK response.
Last updated
Was this helpful?

