Generate a behavior rule/query from a threat report or any other description of malicious activity with AI.
Go to the Generate mode in Uncoder AI.
Select Threat Report/IOCs as the input type.
Select Behavior Rule/Query as the output
Select the platform (language) of the output rule/query (start typing the platform name in the dropdown to filter the options).
Optionally, customize the rule:
Set a different data schema.
Set additional customization profiles (note that configuring these profiles is available only with the Enterprise subscription):
Paste the text of a threat report or any other description of a malicious activity into the input panel and click Generate.
Wait for the AI to generate a rule/query. Once the output is ready, check it and make modifications if needed.
Next Steps
After you've ensured that the generated rule/query fits your needs and preferences, you can:
Save it to a custom repository
Copy it to the clipboard and paste it into your system or download the rule/query as a file
Deploy it to a SIEM or push it to a Git repository
Translate it into a different language
Validate its syntax and structure
Optimize the query
Group query results
Get its short summary, full summary, or decision tree
Make custom modifications with AI
Supported Platforms
To find out what platforms (languages) are supported, see this article.
