Skip to main content

Who is this article for?

Incydr Professional, Enterprise, Horizon, and Gov F2
Incydr Basic, Advanced, and Gov F1

Find your product plan in the Code42 console on the Account menu.

Instructor, no.

Incydr Professional, Enterprise, Horizon, and Gov F2, yes.

Incydr Basic, Advanced, and Gov F1, yes.

HOME
GETTING STARTED
RELEASE NOTES
FAQs
APIs
SYSTEM STATUS
Code42 Support

Manage Rules reference

Who is this article for?

Incydr Professional, Enterprise, Horizon, and Gov F2
Incydr Basic, Advanced, and Gov F1

Find your product plan in the Code42 console on the Account menu.

Instructor, no.

Incydr Professional, Enterprise, Horizon, and Gov F2, yes.

Incydr Basic, Advanced, and Gov F1, yes.

Overview

Code42 Alerts let you know when important data may be leaving your company. Use the Manage Rules table to view or update the different alert rules you have in your Code42 environment that trigger these notifications.

This article is a reference guide with detailed descriptions of the rules in the Manage Rules table. You can also use Alerts to view and dismiss the alert notifications generated by these rules. For information about alert notifications, see Review Alerts reference. For information on creating and configuring alert rules, see Create and manage alert rules.

Considerations

Manage Rules

Use the Manage Rules screen to view, create, edit, duplicate, and delete existing alert rules that trigger alert notifications.

To add or edit alert rules:

  1. Sign in to the Code42 console.
  2. Select Alerts > Manage Rules.
    Manage Rules list
Item Description
a Risk settings

Click to open the risk settings where you can set the score of each risk indicator. Scores are used to calculate the severity of each file event. For more information, see the Risk settings reference.
 

To edit risk settings, you must have the Insider Risk Admin or Insider Risk Analyst role. Users with the Insider Risk Read Only role can view risk settings, but not make changes.

b Create rule Creates a new rule that you can use to alert you when important data may be leaving your company.
c Recommended rules

Creates a new rule from a pre-configured template that has recommended settings. Click one of the rule names to start creating a rule from that template, or click View all recommendations to view all of the recommended rules. You can change and customize the settings to match your specific needs.

d Rule name Name entered for the rule when it was created.
e Created Date the rule was created.
f Column sort Sort column Hover over any column header to see the sort option. Click the up arrow to sort results by this column in ascending order. Click the down arrow to sort in descending order.
g Last modified Date the rule was last changed. 
h Enable

Click to enable or disable rules.

  • Enable: Allows the rule to notify of you of potential file exfiltration based on its settings. 
  • Disable: Stops the alert from firing for all users that were added to the rule. The alert will no longer generate new notifications on the Review Alerts tab.
i Actions Actions for alert rule Click to make a copy of an existing rule or to delete a rule.
j View View Click to view an alert rule's settings. For more information on editing rule settings, see Create and manage alert rules.
k Rows per page Select the number of rules to display on each page.
l Pagination Click the right and left arrows to scroll through pages of rules.

Recommended rule templates

Code42 includes a number of pre-configured, recommended rule templates. You can quickly create rules from these templates, modifying the default settings to match your needs and environment.

Recommended rule templates

To start creating a rule from a template:

  • If the template you want appears in the Recommended rules list, click its name.
  • Otherwise, click View all recommendations to view all recommended rule templates and then click the rule name. 

When the Step 1 of 3 panel opens for that template, use it to customize the rule for your unique needs and environment. Each recommended rule template uses alert rule settings to identify the specific file activity to alert on.

Alert rule settings

To create an alert rule, you select rule settings that match the activity you want to be alerted about. You can mix and match settings as needed to target specific activity your organization has identified as carrying the most risk.

Alert rule settings

For more information about a setting, follow these links:

  1. Risk severity
  2. Filename or extension
  3. File categories
  4. File extension mismatch
  5. File volume
  6. Destination
  7. Source
  8. Individual users
  9. Watchlists

After adding settings to a rule, complete the rule by naming it, giving it a description, and identifying the users you want to notify when Code42 detects activity matching the rule's criteria.

View rule

For any alert rule listed in the Manage Rules table, click View View icon to view details about that rule. You can then change the rule name, description, and add or edit the rule's settings.

Rule details vary. Specific rules may display different details than those shown in the example below.

View rule settings

Item Description
a Rule name and description

The name and description entered when the rule was created. Rule names must be unique.

b Actions menu Actions icon

Click Actions for alert rule to open the Actions menu where you can:

  • Edit the rule's name and description.
  • Make a copy of the rule.
  • Delete the rule.
c Rule settings

The settings that were added to the rule when it was created. The options selected for each setting are also listed. Click the "more" link when it appears to view all of the options selected for that setting.

 

Code42 automatically monitors all destinations for activity. For this reason, Any destination is listed for Destination even when no Destination setting has been added to the rule. If you have selected specific destinations that filter the detection of matching activity, those destinations are listed instead.

"No users defined" error message
An error message appears when the rule has the Individual users setting but no users have been added to that setting.

You can either either add users to the Individual users setting or remove the setting entirely. If you remove the setting, you can instead add the Watchlists setting to the rule to monitor the activity of higher-risk users on a watchlist.
d Add settings Click to add a new setting to the rule and select its options.
e Edit Edit alert rule Click to update the options selected for that setting, the Instructor lesson that's sent to users in response to their risky activity, or the email addresses to which notification emails are sent when an alert is generated.
f Show default settings

By default, Code42 automatically monitors for all file activity, and uses the options you select in rule settings as filters to alert only on matching activity to reduce noise. To view the default rule settings that Code42 automatically uses for the rule, click Show default criteria.


You can edit these settings to add them to the rule with specific options as filters, as needed.

g Actions

If you have an Code42 Instructor product plan or an Incydr product plan that includes Code42 Instructor, the lesson that is automatically sent via email or Slack to users when their risky activity triggers the alert rule. Click Edit Edit alert rule to update this lesson as needed.

 

To avoid lesson "fatigue," lessons are automatically sent to users only once every 30 days even if they repeat the risky activity within that timeframe.

h Notifications

The email addresses of the users who are automatically notified when activity that matches the rule is detected. Click Edit Edit alert rule to update these addresses as needed.

 

If you do not enter any email addresses, Code42 does not send any emails but still collects information about the file activity that triggers the alert. You can view these notifications in the Review Alerts table.

Code42 only alerts you about untrusted activity
Code42 automatically filters file events to alert you only about activity that occurs outside the domains, URL paths, or Slack workspaces you trust. While Code42 still records all file activity (and you can view it in Forensic Search), you are not notified by alert rules for trusted events.
  • Was this article helpful?