Skip to main content

getMonitoredRules

This method displays all the monitored PHASR rules across all behavioral categories for a specific company.

Parameters

Parameter

Description

Included in request

Type

Values

companyId

The ID of the company you want to retrieve the monitored rules for.

Mandatory

String

The user making the request must have Network administrator rights for The company the ID belongs to.

Default value: The ID of the company associated with the API key used for the request.

categories

Determines what type of rules are returned by the method.

Optional

Array of integers

Possible values:

  • 1 - Tampering tool

  • 2 - Hack tool

  • 3 - Remote tool

  • 4 - Miner

  • 5 - Lolbin

General parameters

These are common parameters, available across all public API methods.

Parameter

Description

Included in request

Type

Values

id

This parameter adds an identifier to the request, linking it to its corresponding response.

The target replies with the same value in the response, allowing easy call tracking.

Mandatory

String

No additional requirements

method

The name of the method you are using to send the request.

Mandatory

String

Must be a valid method name.

jsonrpc

The version of JSON-RPC used by the request and the response.

Mandatory

Integer

Possible values:

  • 2.0

params

An object containing the configuration of the request.

Mandatory

Object

No additional requirements.

Under the params object

page

The results page number.

Optional

Integer

Default value: 1

perPage

The number of results displayed per page.

Optional

Integer

The upper limit is 300 items per page.

Default value: 30

Return value

Attribute

Type

Descripton

page

Integer

The page number currently being displayed.

perPage

Integer

The number of results displayed per page.

pagesCount

Integer

The total number of pages included in the response.

total

Integer

The total number of behavioral profiles included in the response.

Objects

items

Attribute

Type

Description

ruleId

Integer

The ID of the rule.

category

String

The type of the rule.

name

String

The name of the rule.

description

String

A short description of the rules and the conditions for the trigger.

lastTriggered

Integer

The timestamp for when the rule was last triggered, in Unix epoch format.

latestUpdate

Integer

The timestamp for when the rule was last updated, in Unix epoch format.

recommendations

Integer

The number of recommendations generated as a result of triggering the rule.

ruleTriggers

Integer

The number of times the rule was triggered.

profilesUsingSuchTools

Integer

The number of profiles that exhibited signs of using the tool or technique targeted by the rule.

profilesNotUsingSuchTools

Integer

The number of profiles that did not exhibit any signs of using the tool or technique targeted by the rule.

restrictedProfilesByAutopilot

Integer

The number of profiles where the recommendations created as a result of triggering this rule were automatically.

This PHASR setting is called Autopilot.

restrictedProfilesByDirectControl

Integer

The number of profiles where the recommendations created as a result of triggering this rule were applied after being manually approved.

This PHASR setting is called Direct control.

Example

Request:

{
    "params": {
      "companyId": "68306c15c9b5cb3e920ffe22",
      "categories": [1, 3, 5],
      "page": 29,
      "perPage": 3
    },
    "jsonrpc": "2.0",
    "method": "getMonitoredRules",
    "id": "d4d50719-3215-455a-a329-086fe77f6d72"
}

Response:

{
  "id": "d4d50719-3215-455a-a329-086fe77f6d72",
  "jsonrpc": "2.0",
  "result": [
    "page": 29,
    "perPage": 3,
    "pagesCount": 32,
    "total": 95,
    "items": [
      {
        "ruleId": 787,
        "category": "TamperingTool",
        "name": "AuotitGenericUsage",
        "description": "AutoIt is a scripting language for automating the Windows GUI and general scripting. The \"autoit.exe\" is typically the executable used to run scripts written in AutoIt language.\nMalware can use AutoIt to create scripts that automate malicious activities, such as downloading and executing other malware, keylogging, or altering system settings without user consent.",
        "lastTriggered": 1748247681,
        "latestUpdate": 1748250401,
        "recommendations": 1,
        "ruleTriggers": 0,
        "profilesUsingSuchTools": 10,
        "profilesNotUsingSuchTools": 7,
        "restrictedProfilesByAutopilot": 10,
        "restrictedProfilesByDirectControl": 6
      },
      {
        "ruleId": 695,
        "category": "HackTool",
        "name": "KmspicoGenericUsage",
        "description": "KMSPico is a tool designed to activate Microsoft products such as Windows and Office without a legitimate license by emulating a Key Management Service (KMS) server.\nMalware can use KMSPico to bypass software activation measures, allowing unauthorized access to software features, and potentially including malicious payloads to compromise the system.",
        "lastTriggered": null,
        "latestUpdate": null,
        "recommendations": 1,
        "ruleTriggers": 0,
        "profilesUsingSuchTools": 8,
        "profilesNotUsingSuchTools": 8,
        "restrictedProfilesByAutopilot": 9,
        "restrictedProfilesByDirectControl": 6
      },
      {
        "ruleId": 696,
        "category": "HackTool",
        "name": "WindowsActivatorGenericUsage",
        "description": "The term \"activator\" in a Windows binary name typically refers to a tool used to bypass software activation mechanisms, often for pirated software. An activator can modify system files or registry entries to trick software into recognizing the installation as legally activated.\nMalware can use activators to disable legitimate software protections, enabling the spread of pirated software. Additionally, malicious actors may disguise malware as activators or bundle malware with them, resulting in unauthorized system access, data theft, or installation of additional malicious software.",
        "lastTriggered": null,
        "latestUpdate": null,
        "recommendations": 1,
        "ruleTriggers": 0,
        "profilesUsingSuchTools": 8,
        "profilesNotUsingSuchTools": 6,
        "restrictedProfilesByAutopilot": 8,
        "restrictedProfilesByDirectControl": 10
      }
    ]
  ]
}