Custom scoring rules for evidence-based threat assessment
Rules evaluate finding evidence (commands, users, hosts, etc.) against patterns to identify known benign activity like security tools, IT software, and approved operations.
When a rule matches, it can:
Multiple matching rules are combined: multipliers are multiplied together (capped at 0.05 minimum), and score adjustments are summed.