Skip to content

Configure a Threat Rule

Rule Configuration Options

Each custom threat rule supports the following configuration fields:

FieldDescriptionRequired
NameA descriptive name for the ruleYes
ScoreImpact value (1–10) contributed to the category totalYes
Show in ReportsWhether the rule appears in Search Library detection reportsNo (default: on)
Show in Impact PostureWhether the rule counts towards the Identity Posture threat scoreNo (default: on)
Aggregation TypeHow scores combine: Maximum or WeightedNo
Cyber FrameworkCompliance framework reference (e.g., NIST CSF V2.0)No
Framework ControlSpecific control function (e.g., PR.AA-03)No
Detection OnlyFlags accounts without contributing to the threat scoreNo (default: off)
Allow Workflow TriggerEnables automated workflow actions when the rule matchesNo (default: off)
Platform FilterRestricts the rule to specific platformsNo
Data Source FilterRestricts the rule to specific data sourcesNo

Detection-Only Rules

When to Use Detection-Only

Detection-only rules identify and report matching accounts but do not contribute to the threat score. Use detection-only rules when you want to monitor a condition (e.g., password age > 180 days) without impacting the overall threat posture. Detection-only rules still appear in reports when Show in Reports is enabled.

Propagation Type

Score Propagation

The propagation type determines how multiple matches of the same rule aggregate:

  • Max — Only the highest match score is used (default for most rules)
  • Sum — All match scores are added together

For example, if an account matches a rule twice with scores of 5 and 3: max propagation yields 5, while sum propagation yields 8.

Choosing a Score Value

Score Guidance

Score RangeSeverityUse For
1–3LowInformational conditions, policy preferences
4–6ModeratePolicy violations, hygiene issues
7–8HighSecurity risks requiring attention
9–10CriticalImmediate security threats, compliance failures

Consider the cumulative effect: multiple moderate-score rules in the same category can quickly reach the category maximum of 10.

Creating a Threat Rule

Purpose: Add a custom threat detection rule to flag accounts that match your organization's specific risk criteria.

Follow these steps to configure a Threat Rule:

  1. Navigate to Configuration | Identify | Threat Rules.

  2. Click + Add Rule.

  3. For Name, enter a descriptive name for your new rule.

  4. If you want the threat rule to show in reports, select the Show in Reports checkmark.

  5. If you want the threat rule to count towards the overall Identity Posture Threat Score, select the Show in Impact Posture checkmark.

  6. If the rule should flag accounts without contributing to the score, enable the Detection Only checkbox.

  7. From the optional Aggregation Type drop-down, select maximum or weighted.

  8. For Score, enter an impact number (1–10).

  9. To restrict the rule to specific platforms, use the Platform Filter drop-down to select one or more platforms.

  10. To restrict the rule to specific data sources, use the Data Source Filter drop-down to select one or more data sources.

  11. For Cyber Framework, specify the specific framework applying to this rule, for example, NIST CSF v2.0.

  12. For Framework Control, enter the control name, for example, for NIST CSF v2.0, it could be PR.AA-03.

    NOTE

    Multiple framework references can be added for a given risk factor.

  13. Click Add.

You may also edit an existing custom Threat Rule via the edit button. Default Threat Rules can't be edited.

Use the Rule Matches button to retrieve all accounts that match the specific rule. Rule matching is not available for aggregation rules.

Threat Rule Actions

Refer to the Integrate section to learn about actions based on threat rules.

NOTE

To activate the workflow and threat rule association, enable the Allow Workflow Trigger checkbox on the add/edit Threat Detection Rule modal.

Active allow workflow trigger checkbox

Hydden Documentation and Training Hub