YARA Rules Parent topic

Deep Discovery Inspector uses YARA rules to identify malware. YARA rules are malware detection patterns that are fully customizable to identify targeted attacks and security threats specific to your environment.
YARA rules are applied only to objects submitted to the internal Virtual Analyzer. No settings under YARA Rules apply to an external Virtual Analyzer nor Analyzer as a Service. For details about external analysis modules, refer to the applicable product Administrator's Guide.
Deep Discovery Inspector supports a maximum of 5,000 enabled YARA rules regardless of the number of YARA rule files. On the top-right corner of the YARA rule table, the Rules in use field indicates the number of YARA rules currently enabled in the system.
When integrated with Deep Discovery Director, Deep Discovery Director centrally manages all YARA rules and you must manage the YARA rules in the Deep Discovery Director management console. For details, see the Deep Discovery Director Administrator's Guide.
After you register Deep Discovery Inspector to Deep Discovery Director 5.0 (or later), Deep Discovery Inspector automatically synchronizes YARA rule settings from Deep Discovery Director and overwrites existing YARA rule settings that you have configured.
The following table shows information about YARA rule files.

YARA Rules

File Name
Name of the YARA rule file.
Number of YARA rules contained in the YARA rule file.
Files To Analyze
File types to analyze using the YARA rules in the YARA rule file.
Last Updated
Date and time the YARA rule file was last updated.