Resources To Learn And Understand SIGMA Rules
- Sigma Rule Creation Guide by SigmaHQ
- Introducing Generic Log Sources in Sigma by Thomas Patzkes
- A Guide to Generic Log Sources in Sigma by Thomas Patzkes
- How to Write Sigma Rules
- The Best Possible Monitoring with Sigma Rules
- What is Sigma? Threat Hunting in SIEM Products with Sigma Rules – Example Sigma Rules
- Threat Detection with SIGMA Rules
- Sigma - Generic Signatures for SIEM Systems by Florian Roth
- Threat Hunting with Application Logs and Sigma by Thomas Patzke
- Sigma Hall of Fame - EU ATT&CK User Workshop, October 2021 by Florian Roth
- Sigma - Generic Signatures for Log Events by Thomas Patzke
- Security Talks with SOC Prime: Implementing & Customizing SIGMA
- Security Talks with SOC Prime: All About SIGMA
- [SIGMA] 2.1 - Case Study 1 - Windows Event Logs - Background and Sample Rule by Applied Network Defense
- How to Level Up Your Threat Detection Practice by SANS
- Practical Threat Intelligence and Data-Driven Threat Hunting - Chapter 5 Include an Introduction to SIGMA Rules.