LogoLogo
BlogHomepage
  • Quick Start
    • Onboarding Guide Walkthrough
  • Introduction
    • What is Garnet?
  • The Garnet Ecosystem
    • Jibril & Garnet Platform
    • Key Differences
  • Key Concepts
    • Environments
    • Jibril: Runtime Security Engine
    • Integrations
    • Events & Detections
  • Getting Started with Garnet Platform
    • Prerequisites
    • Step 1: Generate API Key
    • Step 2: Agent Setup
      • GitHub Actions Integration
      • Kubernetes Integration
    • Step 3: Configure Notifications
  • Using the Garnet Platform
    • Dashboard Overview
    • The Issues Page
    • Viewing Events
    • Understanding Alerts
  • Jibril Sensor: The Engine
    • Architecture & Technology (eBPF)
    • Core Capabilities (Detection & Blocking)
    • Deployment & Configuration
  • Use Cases
    • Securing CI/CD Pipelines
    • Runtime Protection in Production
  • Troubleshooting & Support
    • Troubleshooting Guide
    • Support Channels
  • Resources
    • Security
    • Community
      • Discord
    • Roadmap
    • Conclusion
Powered by GitBook

© 2025 Garnet Labs Inc.

On this page
  1. Key Concepts

Events & Detections

  • Events:

    • Raw system activities observed and collected by Jibril

    • Examples: Process creation, network connections, file operations

    • High volume of telemetry data

    • Most are benign normal activities

  • Detections:

    • Specific events or patterns identified as potentially malicious or anomalous

    • Generated when Jibril's detection engine identifies suspicious behavior

    • Much lower volume than events

    • Require attention, investigation, or automated response

In essence, Jibril continuously monitors a high volume of events. Its engine then intelligently filters and analyzes these events to pinpoint specific detections that warrant attention and potentially an automated response (like blocking) or human investigation.

Understanding the distinction between events and detections is crucial when working with Garnet:

  • Events:

    • Raw activities observed and collected by the Jibril sensor running in your monitored environments.

    • These are fine-grained records of system behavior.

    • Examples include: a network connection being opened, a file being accessed or modified, a new process being executed, or a user escalating privileges.

    • Events provide the foundational data for security analysis but are not, in themselves, indicators of malicious activity.

  • Detections:

    • Specific events, or patterns of events, that are identified by Jibril's behavioral analysis engine as potentially malicious, anomalous, or policy-violating.

    • Detections are the output of Jibril's threat intelligence and rule-based system working on the stream of raw events.

    • These are what trigger alerts within the Garnet Platform.

    • Examples include: "Malicious Network Connection to C2 Server Detected", "Crypto Miner Execution Attempt Blocked", "Unauthorized Credential File Access", "Anomalous Process Execution Chain".

    • Detections are designed to be actionable and provide context for security incidents.

Last updated 16 days ago