# Main

It is the <mark style="color:green;">first stage for create</mark> a rule correlation.

***

### **Identification**

**ID:** Each rule is automatically identified by an ID, which [<mark style="color:green;">is generated according to the prefix set during the MSP configuration.</mark>](https://docs.inopli.com/system-settings/configuring-the-mss/configuring-the-msps-profile#rule-identification-code)

**Language:** The system <mark style="color:green;">allows versions in different languages within the same profile</mark>, providing a customized consultation according to the user's language preference.

**Name:** Serves for the direct <mark style="color:green;">identification of the rule</mark>.

**Attack:** <mark style="color:green;">Defines the attack vector</mark> that the rule aims to prevent or mitigate.

{% hint style="info" %}
The name and attack fields are essential for integration with systems like ChatGPT, facilitating the automatic filling of playbooks and rule details.
{% endhint %}

<figure><img src="https://2621223932-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FLTQJomzpe5BTzHSLQPAt%2Fuploads%2FkPDuI8Lf97qXeB6S2ni3%2FScreenshot%202023-12-30%20at%2013.28.10.png?alt=media&#x26;token=e2afcd69-c484-4bf7-bb97-3c0810abfc29" alt=""><figcaption><p>Identification Stage</p></figcaption></figure>

***

### **Data Source**

**Data Source:** <mark style="color:green;">Identifies the data source</mark> of the selected correlation rule.

**Event Type:** There are two main types of events in information security:

* **Security Intelligence Events:** Associated with data sources that have security intelligence (e.g., endpoint protection or application firewalls) and are usually linked to specific threats. These <mark style="color:green;">do not require complex correlation rules for anomaly identification.</mark>
* **Non-Security Intelligence Events:** Related to data sources without security intelligence (e.g., operating systems), which <mark style="color:green;">require more complex correlation rules.</mark> In these cases, the analyst must create custom event types for these data sources.

<figure><img src="https://2621223932-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FLTQJomzpe5BTzHSLQPAt%2Fuploads%2FtHhTcEj1pEMFClLP5rP6%2FScreenshot%202023-12-30%20at%2013.28.23.png?alt=media&#x26;token=dd75b0a2-dc1e-4236-8a9b-1a013e8799df" alt=""><figcaption><p>Data Source Stage</p></figcaption></figure>

***

### **Integration**

<mark style="color:green;">It is possible to prepare the rule for one or more monitoring solutions.</mark> The selection of vendors directly impacts the listing of relationships and grouping rules (grouping rules).

<figure><img src="https://2621223932-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FLTQJomzpe5BTzHSLQPAt%2Fuploads%2FHXsJHbguFK2Lw8EtoD0G%2FScreenshot%202023-12-30%20at%2013.28.41.png?alt=media&#x26;token=183157a9-85d5-4b9d-8f40-09b71243ce34" alt=""><figcaption><p>Integration Stage</p></figcaption></figure>

***

### **Relations**

This functionality provides the system with <mark style="color:green;">information about which SIEM rule relates to the correlation rule.</mark> This allows for more efficient management and an integrated view of security policies.

<figure><img src="https://2621223932-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FLTQJomzpe5BTzHSLQPAt%2Fuploads%2FLDTqmyrbfbT5Odv9oAmv%2FScreenshot%202023-12-30%20at%2013.29.49.png?alt=media&#x26;token=f30c5bdd-60c7-4eee-8d87-fd2a38ee6e16" alt=""><figcaption><p>Relations Stage</p></figcaption></figure>

***
