Views:

Virtual Analyzer uses YARA rules to identify malware. YARA rules are malware detection patterns that are fully customizable to identify targeted attacks and security threats specific to your environment. Deep Discovery Analyzer supports a maximum of 5,000 YARA rules regardless of the number of YARA rule files.

The following columns show information about YARA rule files.

Table 1. YARA Rules columns

Column Name

Information

File name

Name of the YARA rule file

Rules

Number of YARA rules contained in the YARA rule file

Files to analyze

File types to analyze using the YARA rules in the YARA rule file

Added

Date and time the YARA rule file was added

The following table lists all the YARA Rules tab tasks:

Table 2. YARA Rules Tasks

Task

Steps

Add

Browse and select a YARA rule file and the file types to analyze.

For details, see Managing YARA Rule Files.

Delete

Select one or several YARA rule files to remove and then click Delete.

Export

Select one YARA rule file, and click Export to download a copy of the YARA rule file.

Edit

Click the File name of the YARA rule file to be edited.

For details, see Managing YARA Rule Files.

Records and Pagination Controls

The panel at the bottom of the screen shows the total number of YARA rule files. If all samples cannot display at the same time, use the pagination controls to view the samples that are hidden from view.