Fine Tune a Threat
Selecting a threat in the Threats list displays details for that threat. The Threat Description box displays the name and description of the threat.
The Threat Configuration Box contains a Processing tab, an Exclusions tab, and in some cases a Settings tab.
Processing Tab
The Processing tab contains the configuration options for processing the threat.

General:
-
Status – When set to ON, Threat Manager detects this threat. When set to OFF, Threat Manager doesn't detect this threat. When a threat status is OFF and then set to ON, a dialog appears to determine which data is processed.
-
Threat Level – The relative severity level, or risk level, of the threat. Threat level controls the visibility of the threat. Use it to sort, filter, and influence various dashboards and visualizations throughout the console. This setting doesn't influence the behavior of the threat response.
- High – Indicates a serious threat that should be investigated immediately. Use the high threat level setting as a filter on the Threats Page.
- Medium – Indicates a potentially serious threat of activities leading to a serious threat that should be investigated. Use the medium threat level setting as a filter on the Threats Page.
- Low – Indicates activity that is a potential risk or a bad practice. Use the low threat level setting as a filter on the Threats Page.
- Audit – Indicates activity that isn't necessarily a threat, but should be monitored. Use the audit setting as a filter on the Threats Page. Some threats auto-escalate from audit to a higher level, for example, threats with a high threat event count or if the perpetrators of the threat are sensitive users. Audit events are also shown on the Home Page.
- Informational – Indicates first-time client use or first-time host use, which can be common events but may also indicate a threat
Threat Response:
Assigning a threat response designates a playbook to automatically be executed immediately when a threat of this type is detected.
- Email Alert – Select On to send email notifications when the threat is detected. Select Off to turn off email notifications.
- SIEM Alert – Select On to forward threat information to a SIEM service when the threat is detected. Select Off to turn off forwarding threat information to a SIEM service.
- Run Playbook – Select the playbook used to respond to the threat.
Rollup:
Rollup isn't available for all threat types.
- Enabled – Enables rollups when set to ON. The default state is dependent on the threat type.
- Rollup Time – The timeframe for the rollup. Select a timeframe from the dropdown:
- 1 Minute
- 5 Minutes
- 15 Minutes
- 30 Minutes
- 1 Hour
- 8 Hours
- 24 Hours
If rollup is enabled, multiple events from the same perpetrator are associated with a single threat. For the given rollup criteria, if additional threat events are received within the selected rollup time, the threat events are appended to an existing threat instead of creating a new threat. For example, if a user creates 1000 ransomware files in the configured rollup timeframe, it is reported as 1 ransomware threat with 1000 events, whereas without rollup many threats are created. The configured threat response (Email, SIEM, or Playbooks) triggers only once when the threat is initially detected, regardless of rollup configuration. When a threat rolls up, it also updates the detection time of the threat, pushing it to the top of the Threats Page timeline.

The diagram provides an outline of the rollup process.
Exclusions Tab
The Exclusions tab lists existing exclusions for the threat. Exclusions allow rule-based definitions to be defined for specific criteria to be excluded from threat detection for the threat type.

To view details of an existing exclusion, click the arrow next to the exclusion or the name of the exclusion:
Exclusion Details:
- Add New Filter – Click the Add New Filter button to include an additional filter rule for the exclusion.
- Delete Filter – Click the smaller Delete Icon to the right of the filter to delete that filter.
- Save – Click Save to save changes made to the exclusion.
- Cancel – Click Cancel to close the exclusion details and disregard any changes made to the exclusion.
- Delete Exclusion – Click the larger Delete Icon to the right of the Cancel button below the filters to delete the exclusion. A confirmation window appears to confirm deletion.
Click Add Exclusion to Add a new Threat Detection Exclusion.
Add Threat Detection Exclusions
To add an exclusion to the threat type.

Step 1 – Click Add Exclusion. The Add Exclusion for [Threat Type] window opens:
Step 2 – Select a Name for the exclusion
Step 3 – Select an Attribute from the Attribute dropdown:
- User
- Host
- Client
- File
Step 4 – Select an Operator from the Operator dropdown.
Step 5 – Select a Filter by searching for the value and selecting it from the dropdown. Or, manually enter the value for the selected exclusion type in the following format:
- Computer – [domain][hostname]
- Client – [domain][hostname]
- User – [domain][username]
- File – Folder path and full path to file. This exclusion also supports the asterisk wildcard: *
Step 6 – (Optional) Click Add New Filter to include an additional filter rule for the exclusion.
Step 7 – Click Saveto save the exclusion details. Click Cancel to close the modal and disregard any changes made to the exclusion.
The exclusion is added to the Exclusions list and the specified activity is immediately excluded from threat detection for the threat type.
Settings Tab
The Settings Tab provides additional threat-specific settings that are required for some threats.
The Settings tab is only displayed for threats that require additional settings.

This tab shows the settings that are required for the Forged Ticket threat.
- Sensitive groups only – When enabled, Threat Manager detects Forged Ticket threats only if a group added to the forged ticket is tagged as sensitive.
- Membership cache duration – The number of minutes to cache group membership changes. This value should equal the longest expected time for one DC to replicate changes.
- Use all groups – When enabled, Threat Manager detects Forged Ticket threats whenever a user is detected with an unexpected token.
- Specific groups – Only detect threats if the specified groups have been injected into a user's Privilege Account Certificate (PAC). This setting is ignored when the Use all groups setting is enabled.