Tag: Chronicle UDM

AI-Validated Hostname Filtering for Chronicle Queries
AI-Validated Hostname Filtering for Chronicle Queries

How It Works This Uncoder AI feature showcases its ability to analyze and validate Chronicle UDM queries involving multiple domain-based conditions. In this example, Uncoder AI processes a threat-hunting query associated with Sandworm (UAC-0133) activity, which targets a set of .sh and .so domains. The platform automatically identifies that the detection logic uses a field-level […]

Read More
IOC-to-Query Generation for Google SecOps (Chronicle) in Uncoder AI
IOC-to-Query Generation for Google SecOps (Chronicle) in Uncoder AI

How It Works 1. IOC Extraction from Threat Reports Uncoder AI automatically parses structured threat reports to extract: Domains and subdomains (e.g., mail.zhblz.com, doc.gmail.com.gyehdhhrggdi…) URLs and paths from phishing and payload delivery servers Related IPs, hashes, and filenames (seen on the left) This saves significant manual effort compared to copying and normalizing IOCs from multiple […]

Read More