Data Leakage Scenario Rule Conditions

This topic describes the conditions that you can use to create rules and the default rules provided for the data leakage scenario.

Data leakage includes the following scenarios:

Each scenario has its own conditions and default rules.

Ransomware leaks

Ransomware - conditions

The following table describes the conditions that you can use to create rules. When using a regular expression, don't surround the expression with quotation marks.

FeaturesOperatorValueDescription
Detection algorithmidentified/did not identify"A relevant ransomware leak"Did the Rapid7 internal detection algorithm identify a ransomware leak?
Asset tagin/not inSelect tagsAre any of the threat's matched assets tagged with any of the specified tags?
Attacked company namecontains/does not contain"Asset name"Does the name of the attacked company contain a specific company asset?
Attacked company namecontains/does not contain"Regex list"Does the name of the attacked company contain a pattern (can be expressed as a regular expression)?
Attacked company regionsin/not inList of regionsDid the leak occur in selected geographical regions?
Attacked company sectorsin/not inList of sectorsDid the leak occur in selected sectors?
Days since first reported=, !=, >=, <=, >, <How many days ago was the leak first reported by Rapid7?
Days since publication date=, !=, >=, <=, >, <How many days ago was the leak published?
File contentcontains/does not contain"Asset name"Does the content of at least one leaked file contain a specific company asset?
File or folder namecontains/does not contain"Asset name"Does at least one leaked file or folder name name contain a specific company asset?
Leak namecontains/does not contain"Asset name"Does the name of the leak contain a specific company asset?
"Regex list"Does the name of the leak contain a pattern (can be expressed as a regular expression)?
Leak publish statusis, is notIs the leak publication status full, partial, or unknown?
Leak URLcontains/does not contain"Regex list"Does the URL of the leak contain a pattern (can be expressed as a regular expression)?
Number of matched files=, !=, >=, <=, >, <How many leaked files contain a company asset in the file name or content?
Number of matched folders=, !=, >=, <=, >, <How many leaked folders contain a company asset in the folder name?
Number of matched objects=, !=, >=, <=, >, <How many leaked objects (files or folders) contain a company asset in the file name, content, or folder name?
Ransomware group namecontains/does not contain"Regex list"Does the ransomware group name contain a pattern (can be expressed as a regular expression)?

Ransomware - default rule

The following table lists the rules that are provided to get you started quickly.

Rule nameDescription of matchDefault state
Threat Command Ransomware LeaksDid the Rapid7 internal detection algorithm identify a ransomware leak? All threats that hold matched objects (at least one match between the file, folder name, or content and the asset) will be elevated as alerts.Enabled

Example uses

These examples show how you can use the Alert Profiler to fine-tune ransomware alert reporting.

Trigger an alert when a leak is published about a specific sector:

test

Trigger an alert when a specific ransomware group publishes a leak:

test

Trigger an alert when your assets are mentioned in any context (even if not deemed to be relevant):

test

Confidential documents

Confidential documents - conditions

The following table describes the conditions that you can use to create rules.  When using a regular expression, don't surround the expression with quotation marks.

FeaturesOperatorValueDescription
Detection algorithmidentified/did not identifyA confidential documentDid the Threat Command internal detection algorithm identify an exposed confidential document?
Asset namein/not inAsset NameDoes the document match a specific company asset?
Asset tagsin/not inSelect tagsAre any of the threat's matched assets tagged with any of the specified tags?
Author namecontains/does not contain“regex list”Does the document author name contain a pattern (can be expressed as a regular expression)?
contains/does not containAsset NameDoes the document author name contain a specific company asset?
Documentcontains/does not containregex listDoes the document contain a specific phrase (can be expressed as a regular expression)?
contains/does not containAsset NameDoes the document contain a specific company asset?
contains/does not containConfidentiality terms listDoes the document contain a specific confidentiality term?
Document URLcontains/does not containAsset NameDoes the document URL contain a specific company asset?
contains/does not containregex listDoes the document URL contain a specific phrase (can be expressed as a regular expression)?
Fileis/is not"Protected"Is the file protected (by either a password or encryption)?
File namecontains/does not containregex listDoes the document name contain a pattern (can be expressed as a regex)?
contains/does not containAsset NameDoes the document name contain a specific company asset?
contains/does not containConfidentiality terms listDoes the document name contain a specific confidentiality term?
File typein/not inClosed listIs the document a specific file type?
Last editorcontains/does not containregex listDoes the document last editor name contain a pattern (can be expressed as a regular expression)?
Location of confidentiality termin/not inClosed listIs the confidentiality term located in a specific location in the document?
Weeks since creation date=, !=, >=, <=, >, <User types an integer numberHow many weeks ago was the document created?
Weeks since last modification=, !=, >=, <=, >, <User types an integer numberHow many weeks ago was the document last modified?

Confidential documents - default rule

The following table lists the rules that are provided to get you started quickly.

Rule nameDescription of matchDefault state
Confidential documents - Default Detection RuleAn exposed document was found to be related to your company and confidential, based on your assetsEnabled
Confidential documents - Extended DLP Detection RuleAn exposed document was found to be related to your company and generally confidential, based on common confidentiality terms.Disabled