Configuring YARA-X
Understanding YARA-X in GuardMode
Enabling and Configuring YARA-X Analysis
Configuring YARA-X via REST API
Enabling YARA-X in Threshold Analysis
Basic Authorization header
Number of threshold buckets
Limit of data points to analyze
Updated threshold configuration
Request validation failed
Enabling YARA-X in File Integrity Checks
Basic Authorization header
Updates file integrity strategy configuration
Indicates if the file integrity strategy is enabled
OK
Request validation failed
Enabling YARA-X in On-Demand Scanning
Basic Authorization header
Scan creation request
Paths that will be recursively scanned
Indicates if file names found during scan should be analyzed to find files with names often used by ransomware
Indicates if files should be scanned using YARA rules
If true, Agent will raise alert on suspicious file found
If present, causes exclusions to work as if filesystem root was at each of provided paths
Returns a newly created scan
No content
Accepted
Bad request was sent
No content
Applying Configuration Changes
Performance Considerations
Last updated