Overview
TDM (Threat Detection Module) displays the top 10 alert trends, top 10 events, host event list, and network event list for a default period of one week on the TDM overview page. Users can change the data range using the Time Picker.
1. Alerts
(1) Alert Pie Chart: Divides alerts by severity in a pie chart.
(2) Alert Event List: Lists the last alert time, alert count, and severity based on rule name.
(3) Click "View Detection" to open the TDM detection dashboard page.
2. Top 10 Alert Trends: Displays a time trend chart of TDM detection alerts for a default period of one week.
Click "View Detection" to open the TDM detection dashboard page.
3. Top 10 Events: Displays a time trend chart of host events for a default period of one week.
Click "View Events" to open the TDM host event dashboard page.
4. Host Events: Displays a statistical list of host events for a default period of one week.
Click "View Host" to open the TDM host dashboard page.
5. Network Events: Displays a statistical list of network events for a default period of one week.
Click "View Network" to open the TDM network event dashboard page.
AD Dashboard
In the left menu, select "TDM" -> "AD" to access the AD Event Dashboard. By default, it displays the following information for the past 7 days:
- Host events with the tag safe_tag:AD in Timeflow.
- Counts of account creation, deletion, lockout, enablement, and disablement events.
- A list of hosts with login failures exceeding three attempts.

Host
Select "TDM" → "Host" from the left menu to enter the host dashboard, displaying the number of hosts, user authentications, and a unique IP time trend chart at the top.

1. Host Tab: Shows host name, last log time, operating system, and OS version.
2. Authentication Tab: Displays host and user authentication information for the last seven days.
(1) Host Authentications Events:Time trend chart of host authentication events.
(2) User Authentications Events:List of user authentication event details.

3. Event Tab: Displays the top 10 host events and event information list for the last seven days.

User
Select "TDM" → "User" from the left menu to enter the user dashboard, displaying the user count and user authentication time trend chart at the top.

1. User Tab: Shows user name, last log time, host name, domain, and OS version for the last seven days.
2. Authentication Tab

(1) Displays a timeline of host authentication events for the last seven days.
(2) User Authentication Events: List showing user name, total success and failure authentication events, last successful authentication time, source host IP and domain, and last failed authentication time, source host IP, and domain.
3. Event Tab: Displays the top 10 user events and user event information list for the last seven days.

Detections
Select "TDM" → "Host" from the left menu to enter the host dashboard, displaying the top 10 detection event time trend chart at the top, with a detection event list below.

1. Detection Rule Management: Click "Rule Management" to enter the rule management page.

Custom Tab

(1) Add Custom Rule: Click "Add" to open the add rule edit page.

1-1. Basic Information
1-1-1. Name: Required. Enter the custom detection rule name (under 128 characters).
1-1-2. Description: Required. Enter a description for the custom detection rule (under 1024 characters).
1-1-3. Severity: Required. Select severity from a dropdown menu (Critical/High/Medium/Low).
1-1-4. Risk Score: Required. System auto-populates based on severity, but admins can manually enter a score between 1 and 100.
1-1-5. Tag: Optional. Admins can assign tags to the detection rule.
1-1-6. URL: Click the icon to add a reference URL.
1-1-7. MITRE ATT&CK™ threat: Click the icon to add a tactic URL.
1-2. Condition Settings

1-2-1. Filter Name: Required. Select a filter condition name from the dropdown. Click "Preview" to view log data matching the filter condition for the last seven days.
1-2-2. Counting Time Interval: Required. Input the query data range for the schedule, which must be a number between 1 and 99,999 and cannot exceed the execution frequency.
1-2-3. Threshold: Required. Select a condition from the dropdown and input a count between 1 and 99,999.
1-2-4. Frequency: Required. Input the schedule’s execution frequency, which must be a number between 1 and 99,999.
1-3. Notification Mechanism:
1-3-1. Email Detection Notification:Select the recipient role group from the drop-down menu. System administrators can manually enter email addresses and customize the email subject.
1-3-2. IFTTT: Check the checkbox to enable the IFTTT notification function.

1-4. Click "Finish" to save the custom detection rule. Click "Apply" on the custom detection management page to activate detection operations.
(2) Import: Click the import icon to open a file upload window and import custom rules as .des3 files.

(3) Export: On the custom rule management list page, check the desired custom rules, click "Export", and export the selected rules as .des3 files.

AD Tab
Only detect log host events that contain safe_tag:AD, and a license with AD permissions must be used.

(1) Edit AD Detection Rules: Click the edit icon to open the rule editing page.
1-1. Basic Information: The system automatically fills in the default data, and only the Recommended Measures can be edited.

1-2. Condition Settings

1-2-1. Filter Name: Non-editable.
1-2-2. Counting Time Interval:Required. Enter the schedule query data range (must be a number between 1 and 99,999, not exceeding the execution frequency).
1-2-3. Threshold: Required. Select a condition from the dropdown and input a count (between 1 and 99,999).
1-2-4. Frequency: Required. Input the schedule execution frequency (between 1 and 99,999).
1-3. Notification Mechanism:
1-3-1. Email Detection Notification:Select the recipient role group from the drop-down menu. System administrators can manually enter email addresses and customize the email subject.
1-3-2. IFTTT: Check the checkbox to enable the IFTTT notification function.

1-4. Click "Finish" to save the official detection rule. Click "Apply" on the detection management page to activate detection operations.

2. Click the view
icon to see the event list, which includes basic data and an event list.


Malicious Tab
(1) In The Relay list alert settings, only editing schedules and notification settings is allowed.

(2) List Features
1.Click the edit icon to open the edit rule page. the system will fill in the default values automatically.

1-2. Condition settings

1-2-1. Filter: Not editable.
1-2-2. Counting Time Interval: Required field. the system administrator enters the data range for the scheduled query. only numbers between 1 and 99999 can be entered, and the data range cannot be greater than the execution frequency.
1-2-3. Threshold: Required field. the system administrator selects a condition from the dropdown menu and enters the number of records. only numbers between 1 and 99999 can be entered.
1-2-4. Frequency: Required field. the system administrator enters the execution frequency for the schedule. only numbers between 1 and 99999 can be entered.
1-3. Notification Mechanism:
1-3-1. Email Detection Notification:Select the recipient role group from the drop-down menu. System administrators can manually enter email addresses and customize the email subject.
1-3-2. IFTTT: Check the checkbox to enable the IFTTT notification function.

1-4. Click "Finish" to save the relay list alert. You must also click "Apply" on the detection management page to enable the detection operation.

2. Click the
icon to view the event list. The content includes basic information and the event list.


3.Whitelist Settings
3-1. Click
to open the whitelist settings page, where you can enter IPv4 and domain. After entering the information, click Save, and then click "Apply" again on the list page.

OS Tab
(1) OS alert settings only allow editing schedules and notification settings.

(2) List Features
1.Click the edit icon to open the edit rule page. the system will fill in the default values automatically.
1-1. Basic Information: The system will fill in the default values automatically.

1-2. Condition settings

1-2-1. Filter: Not editable.
1-2-2. Counting Time Interval: Required field. the system administrator enters the data range for the scheduled query. only numbers between 1 and 99999 can be entered, and the data range cannot be greater than the execution frequency.
1-2-3. Threshold: Required field. the system administrator selects a condition from the dropdown menu and enters the number of records. only numbers between 1 and 99999 can be entered.
1-2-4. Frequency: Required field. the system administrator enters the execution frequency for the schedule. only numbers between 1 and 99999 can be entered.
1-3. Notification Mechanism:
1-3-1. Email Detection Notification:Select the recipient role group from the drop-down menu. System administrators can manually enter email addresses and customize the email subject.
1-3-2. IFTTT: Check the checkbox to enable the IFTTT notification function.

1-4. Click "Finish" to save the OS list alert. You must also click "Apply" on the detection management page to enable the detection operation.

2. Click the
icon to view the event list. The content includes basic information and the event list.

Cloud Tab
(1) Cloud alert settings only allow editing schedules and notification settings.

(2) List Features
1.Click the edit icon to open the edit rule page.
1-1. Basic Information: The system will fill in the default values automatically.

1-2. Condition settings

1-2-1. Filter: Not editable.
1-2-2. Counting Time Interval: Required field. the system administrator enters the data range for the scheduled query. only numbers between 1 and 99999 can be entered, and the data range cannot be greater than the execution frequency.
1-2-3. Threshold: Required field. the system administrator selects a condition from the dropdown menu and enters the number of records. only numbers between 1 and 99999 can be entered.
1-2-4. Frequency: Required field. the system administrator enters the execution frequency for the schedule. only numbers between 1 and 99999 can be entered.
1-3. Notification Mechanism:
1-3-1. Email Detection Notification:Select the recipient role group from the drop-down menu. System administrators can manually enter email addresses and customize the email subject.
1-3-2. IFTTT: Check the checkbox to enable the IFTTT notification function.

1-4. Click "Finish" to save the OS list alert. You must also click "Apply" on the detection management page to enable the detection operation.

2. Click the
icon to view the event list. The content includes basic information and the event list.

Elastic Tab
(1) Elastic alert settings only allow editing schedules and notification settings. The rules can be referenced from the website https://github.com/elastic/detection-rules/tree/main/rules.

(2) List Features
1.Click the edit icon to open the edit rule page. the system will fill in the default values automatically.
1-1. Basic Information: The system automatically fills in the default data, and only the Recommended Measures can be edited.

1-2. Condition settings

1-2-1. Filter Name: Non-editable.
1-2-2. Counting Time Interval:Required. Enter the schedule query data range (must be a number between 1 and 99,999, not exceeding the execution frequency).
1-2-3. Threshold: Required. Select a condition from the dropdown and input a count (between 1 and 99,999).
1-2-4. Frequency: Required. Input the schedule execution frequency (between 1 and 99,999).
1-3. Notification Mechanism:
1-3-1. Email Detection Notification:Select the recipient role group from the drop-down menu. System administrators can manually enter email addresses and customize the email subject.
1-3-2. IFTTT: Check the checkbox to enable the IFTTT notification function.

1-4. Click "Finish" to save the Elastic rule. Click "Apply" on the detection management page to activate detection operations.

2. Click the view
icon to see the event list, which includes basic data and an event list.

Network
1. Displays network traffic on a world map.

2. Quad Chart: Displays network event count, DNS queries, unique traffic IDs, network input, and network output traffic.
3. Line Chart: Shows a timeline of unique private source/destination IP counts.

BlackList
1. Select "TDM" → "Blacklist" from the left menu to enter the blacklist management page, where admins can add or delete blacklist hosts and activate blacklist alerts on the official detection tab.

(1) Add to Blacklist: Click the add icon, enter the blacklist host IP in the input box, and click "Save".

(2) Import Blacklist

2-1. Download Import Template: Click the "Template" icon to download the blacklist import template (CSV).
2-2. Update Blacklist: Upload the blacklist CSV file, then click "Update" to complete the blacklist update.
(3) Edit Blacklist: Click the
icon to edit the blacklist host.

(4) Delete Blacklist: Click the
icon to delete the blacklist host.
(5) Enable Blacklist: Change the source IP and destination IP fields in the parsing rule page settings to "safe_sourceIP" and "safe_destinationsIP", then click "Apply". Finally, enable the Blacklist Alert on the detection official tab.




