如果需要偵測規則符合貴機構獨特需求的模組,自訂模組就非常實用。舉例來說,如果記錄項目顯示資源連線至特定 IP 位址,或是在受限區域中建立,您就可以新增自訂模組來建立調查結果。
Event Threat Detection 自訂模組的運作方式
自訂模組是一組 Event Threat Detection 偵測器,您可以設定自己的偵測參數。您可以透過 Google Cloud 控制台建立 Event Threat Detection 自訂模組。或者,您也可以更新自訂模組範本,然後透過 Google Cloud CLI 將自訂模組傳送至 Security Command Center,藉此建立模組。如要瞭解可用的範本,請參閱「自訂模組和範本」。
自訂模組範本是以 JSON 格式編寫,可讓您定義偵測參數,指定應觸發發現結果的記錄項目事件。舉例來說,內建的 Malware: Bad IP 偵測器會檢查虛擬私有雲流量記錄,找出連線至已知可疑 IP 位址的證據。不過,您可以啟用並修改 Configurable Bad IP 自訂模組,並使用您維護的可疑 IP 位址清單。如果記錄檔顯示連線至您提供的任何 IP 位址,系統就會產生發現項目並寫入 Security Command Center。
[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["難以理解","hardToUnderstand","thumb-down"],["資訊或程式碼範例有誤","incorrectInformationOrSampleCode","thumb-down"],["缺少我需要的資訊/範例","missingTheInformationSamplesINeed","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-08-19 (世界標準時間)。"],[],[],null,["# Overview of custom modules for Event Threat Detection\n\n| Premium and Enterprise [service tiers](/security-command-center/docs/service-tiers)\n\nThis page provides an overview of custom modules for Event Threat Detection.\n\nYou can configure modules, also known as *detectors* , to process your\n[Cloud Logging](/logging/docs/overview) stream and\ndetect threats based on parameters you specify. This feature extends the\nmonitoring capabilities of Event Threat Detection and lets you add modules with your\nown detection parameters, remediation guidance, and severity designations for\nconfigurations that the built-in detectors might not support.\n\nCustom modules are useful if you need modules with detection rules that meet the\nunique needs of your organization. For example, you can add a custom module that\ncreates findings if log entries show that a resource is connected to specific IP\naddresses or is created in a restricted region.\n\nHow custom modules for Event Threat Detection work\n--------------------------------------------------\n\nCustom modules are a select group of Event Threat Detection detectors that you can\nconfigure with your own detection parameters. You can create an\nEvent Threat Detection custom module through the Google Cloud console. Alternatively,\nyou can create one by updating a custom module template and\nsending the custom module to Security Command Center through the Google Cloud CLI. For\ninformation about available templates, see [Custom modules and\ntemplates](#custom_modules_and_templates).\n\nCustom module templates are written in JSON and let you define detection\nparameters that control what events in log entries should trigger findings. For\nexample, the built-in `Malware: Bad IP` detector checks\nVirtual Private Cloud Flow Logs for evidence of connections to known suspicious IP\naddresses. However, you can enable and modify the `Configurable Bad IP` custom\nmodule with a list of suspicious IP addresses that you maintain. If your logs\nindicate a connection to any of your supplied IP addresses, a finding is\ngenerated and written to Security Command Center.\n\nModule templates also let you define the severity of threats and provide custom\nremediation steps to help your security teams fix issues.\n\nWith custom modules, you have more control over how Event Threat Detection detects\nthreats and reports findings. Custom modules include your supplied parameters,\nbut still utilize Event Threat Detection's proprietary detection logic and threat\nintelligence, including tripwire indicator matching. You can implement a broad\nset of threat models tailored to your organization's unique requirements.\n\nEvent Threat Detection custom modules run alongside the built-in detectors. Enabled\nmodules run in real-time mode, which triggers scans whenever new logs are\ncreated.\n\nCustom modules and templates\n----------------------------\n\nThe following table contains a list of supported custom module types,\ndescriptions, required logs, and JSON module templates.\n\nYou need these JSON module templates if you want to use the\ngcloud CLI to create or update custom modules. To see a template,\nclick the expand icon add_circle next to its name. For information\nabout using custom modules, see [Configure and manage custom\nmodules](/security-command-center/docs/use-custom-modules-etd).\n\nPricing and quota\n-----------------\n\nThis feature is free of charge to Security Command Center Premium\ncustomers.\n\nEvent Threat Detection custom modules are subject to quota limits.\n\nThe default quota limit for the creation of custom modules is 200.\n\nAPI calls to custom module methods are also subject to quota limits. The\nfollowing table shows the default quota limits for custom module API calls.\n\nModule size limits\n------------------\n\nEach Event Threat Detection custom module has a\nsize limit of 6 MB.\n\nRate limits\n-----------\n\nThe following rate limits apply:\n\n- 30 findings per custom module per hour.\n- 200 custom module findings per parent resource (organization or project) per hour. Each finding counts towards either an organization or project, depending on which level the source custom module was created in.\n\nThese limits can't be increased.\n\nWhat's next\n-----------\n\n- Learn how to [create and manage custom modules](/security-command-center/docs/use-custom-modules-etd)."]]