Triggered network rules

Kaspersky Threat Intelligence Portal provides the following information about SNORT and Suricata rules triggered during analysis of traffic from the file identified by the requested hash. If the file identified by the requested hash was previously analyzed in Kaspersky Sandbox, this section is displayed on the Results tab.

Triggered network rules

Field name

Description

Zone

Danger zone (level) associated with the network traffic detected by the SNORT or Suricata rule (High, Medium, Low, Info).

Rule

SNORT or Suricata rule name.

Page top