[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-03-06。"],[[["Applied Threat Intelligence in Google SecOps Enterprise Plus utilizes Mandiant threat intelligence to proactively detect and alert on high-priority threats within your network."],["This feature includes rule sets that identify network and host-related Indicators of Compromise (IOCs), prioritizing those labeled as \"Active Breach\" or \"High\" based on Mandiant intelligence."],["Google SecOps evaluates Universal Data Model (UDM) event data against Mandiant-curated IOCs, matching domains, IP addresses, or file hashes, and generates alerts upon finding matches."],["Users can tune alerts by creating rule exclusions based on specified UDM fields like `principal.hostname`, `principal.ip`, `target.domain.name`, and `target.file.sha256` to refine the detection scope."],["The rule sets rely on specific UDM fields, such as `network.direction` and `security_result.[]action` for host and network data, and the `principal.ip`, `principal.asset.ip`, and `src.ip` for Inbound IP Address Authentication to determine threat priority and network direction."]]],[]]