What are EDR detection rules?

NAVIGATION  Policies > Detection Rules

PERMISSIONS   Datto EDR subscription with administrator-level platform access or Datto AV subscription with administrator-level platform access. Service account or administrator-level rights on the target endpoint.

IMPORTANT  Infocyte-created rule bodies can only be copied, modified or viewed by our internal detection engineers. Users can create and edit their own custom rules if desired.

NOTE  Alerts generated by the rules engine display the rule body on the Alert Detail page. For more information, see the article Understanding the Alert Detail page.

This article defines EDR detection rules and explains how to build and edit your own rules using the "Detection rules style guide."

Detection rules background

Detection rules run automatically against endpoint audit data as it is received by your instance. These rules help Datto EDR identify potential threats and determine how to address them. The rules we provide analyze your endpoints for processes and behaviors that align with the most common Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) techniques. When a rule is triggered, Datto EDR generates an alert and follows the workflow you have defined in your Automated Response Policy.

You can selectively enable, disable, and customize rules to tailor your instance's threat analysis procedures to the specific needs of your environment. These management options are available on the Detection page.

Detection rules style guide

The Infocyte Query Language (IQL) is a custom language used to build detection rules. It is powerful yet familiar, and simple enough for non-programmers to learn quickly.

 

Revision Date
Initial release. 9/8/25