Skip to content

Commit 3c82d18

Browse files
Update custom_rules.md (DataDog#23326)
1 parent 6a9f56b commit 3c82d18

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

content/en/security/threats/workload_security_rules/custom_rules.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ To use the simple rule creator:
4848

4949
1. In [Agent Configuration][4] or [Threat Detection Rules][3], select **New Rule**, and then select **Simple rule creator**.
5050
2. Define the detection. To monitor your resource effectively, you have the following detection type options:
51-
- To detect unauthorized changes to files, select **File integrity monitoring (FIM)**.
51+
- To detect nonstandard and suspicious changes to files, select **File integrity monitoring (FIM)**.
5252
- To track and analyze system software processes for malicious behavior or policy violations, select **Process activity monitoring**.
5353
- Enter the file/process names or paths to monitor.
5454
3. Specify more conditions. Enter any arguments to add to the threat rule expression. For example, the argument `foo` is added as `process.argv in ["foo"]`.
@@ -196,4 +196,4 @@ To disable a default Agent rule, navigate to the [**Agent Configuration**][6] pa
196196
[7]: /security/threats/workload_security_rules
197197
[8]: /security/threats/
198198
[9]: /security/cloud_siem/log_detection_rules/?tab=threshold#set-a-rule-case
199-
[10]: https://app.datadoghq.com/notebook/list?type=runbook
199+
[10]: https://app.datadoghq.com/notebook/list?type=runbook

0 commit comments

Comments
 (0)