January 15, 2025

Expanding Security Coverage: New Out-of-the-Box Detection Rules for 12 Log Sources

We’re excited to announce a major expansion of Scanner’s detection rule capabilities with ready-to-use rules across 12 critical log sources. This release brings our total to 214 detection rules, covering 11 MITRE ATT&CK tactics and 45 techniques, providing extensive security monitoring across your technology stack.

Detection Coverage Across Your Cloud Infrastructure

Our new detection rules span four key areas:

Cloud Platforms

Monitor your cloud infrastructure with specialized rules for AWS CloudTrail, Google Cloud Platform, and Microsoft Azure. These rules help you detect suspicious activities, unauthorized access, and potential security violations across your cloud environments.

AWS CloudTrail – Detection rules for AWS audit logs and CloudTrail events

Google Cloud (GCP) – Detection rules for GCP audit and security logs

Microsoft Azure – Detection rules for Azure activity and security logs

Identity and Access Management

Strengthen your identity security with dedicated rules for Okta, Auth0, and Cisco Duo. Track authentication patterns, administrative changes, and potential account compromises across your identity providers.

Okta – Detection rules for Okta authentication and administration events

Auth0 – Detection rules for Auth0 authentication logs

Cisco Duo – Detection rules for Duo Security authentication events

Collaboration and Productivity

Protect your workforce tools with rules for GitHub, Microsoft 365, Slack, and Google Workspace. Monitor sensitive actions, data access, and potential insider threats across your collaboration platforms.

GitHub – Detection rules for GitHub organization and repository events

Microsoft 365 – Detection rules for Microsoft 365 audit logs

Slack – Detection rules for Slack workspace events

Google Workspace (formerly GSuite) – Detection rules for Google Workspace admin and security logs

Data and Infrastructure

Secure your critical data and systems with specialized rules for Snowflake and Windows process creation events. Track database access, system changes, and potentially malicious processes.

Snowflake – Detection rules for Snowflake database access and usage

Windows Process Creation Events – Detection rules for Windows process creation events

Flexible and Customizable

Every environment is unique, which is why we’ve designed these rules to be adaptable:

  • Fork any repository to create your customized version while maintaining upstream updates
  • Enable or disable individual rules through Scanner’s interface
  • Adjust detection parameters like thresholds, time windows, and severity levels
  • Contribute improvements back to the community through pull requests
Getting Started

All detection rules are available in their respective repositories under the Scanner organization. Simply connect your log sources to Scanner and enable the relevant rules to begin strengthening your security posture.

Start exploring our detection rules today to enhance your security monitoring capabilities. For detailed documentation and implementation guides, visit our documentation on Scanner’s Out-of-the-Box Detection Rules

Join the Webinar on January 30th
Come join us for our webinar on January 30th where we’ll talk about setting up detections-as-code with CI/CD in Scanner. We’ll demonstrate how to automate your detection engineering workflow and maintain detection rules at scale.

We believe that traditional log architectures are broken for modern log volumes. Scanner enables fast search and detections for log data lakes – directly in your S3 buckets. Reduce the total cost of ownership of logs by 80-90%.
Photo of Cliff Crosland
Cliff Crosland
CEO, Co-founder
Scanner, Inc.
Cliff is the CEO and co-founder of Scanner.dev, which provides fast search and threat detections for log data in S3. Prior to founding Scanner, he was a Principal Engineer at Cisco where he led the backend infrastructure team for the Webex People Graph. He was also the engineering lead for the data platform team at Accompany before its acquisition by Cisco. He has a love-hate relationship with Rust, but it's mostly love these days.