Update detection rule set
Update a detection rule set by sending a new JSON structure.
Service endpoint | /rulesets/v2/{ruleset_id} |
Optional query string parameters | — |
Example | https://protectapi.cylance.com/rulesets/v2/c407f28a-3805-4014-b32c-0c2553ac1e17 |
Method | HTTP/1.1 PUT |
Request headers |
|
Request
{ "name": "", "description": "", "notification_message": "", "category": "Custom", "rules": [ { "detection_rule_id": "998ece50-49af-472a-b0d8-3c3700883736", "detection_rule_version": 1, "detection_name": "Gatekeeper Bypass (MITRE)", "detection_description": "Detects on usage of xattr or spctl to bypass Gatekeeper, by a non-root user (MITRE1144)", "category": "Cylance MITRE ATT&CK Rules", "severity": "High", "operating_systems": [ { "Name": "macOS" } ], "date_added": "2018-11-20T17:58:49Z", "enabled": false, "notification_enabled": false, "responses": [ { "template_id": "9986d82e-1b1d-45a9-977a-cf86f1063b14", "response_id": "95947b5c-71ce-4a7e-a5e0-df5043402b5c", "response_rule_version": 1, "description": "DisplayDesktopNotification", "value": {}, "enabled": false, "created": "2018-11-20T17:58:49Z" } ], "exceptions": [ { "exception_id": "9f12a426-a956-4f4e-a698-df732ba1b295", "enabled": false, "name": "AO Exception" } ], "playbooks": [] } ] }
Response
Please see the Response status codes for more information.
Response JSON schema
Field Name | Description |
---|---|
name | This is the name of the detection rule set. |
description | This is the description of the detection rule set. |
notification_message | This is the message to display on the endpoint when a detection rule is triggered. |
rules | This is a list of detection rule objects and their associated response actions, detection exceptions, and package playbooks. |
detection_rule_id | This is the unique ID of the detection rule. |
detection_rule_version | This is the version of the detection rule. |
detection_name | This is the name of the detection rule. |
detection_description | This is the description of the detection rule set. |
category | This is the category of the detection rule. |
severity | This is the severity assigned to the detection rule. Possible values are:
|
operating_systems | This is an object detailing the operating systems to which the detection rule can be applied. It will include the "name" field. This can consist of:
|
date_added | This is the timestamp (in UTC) when the detection rule was added to the tenant. |
enabled | This determines whether or not a detection rule is enabled in the detection rule set. When viewing the content of a detection rule set, this should always be set to 'true'. |
notification_enabled | This determines whether or not the message defined in the 'notification_message' field should display on the device when the detection rule is triggered. To enable display desktop notification on device using the API, set notification_enabled and DisplayDesktopNotification to "true". To disable, set both to "false". The DisplayDesktopNotification setting enables or disables the feature. The notification_enabled setting affects the display desktop notification on device checkbox in the console as enabled (checked) or disabled (unchecked). |
responses | This is a list of response objects for each response action enabled for a particular detection rule. Each object will include the following fields:
|
exceptions | This is a list of exception rule objects that should be applied to the detection rule. Each object will include the following fields:
|
playbooks | This is a list of package playbook unique IDs that will be executed when the detection rule is triggered on the device. |