# Detections

## Overview:&#x20;

BluSapphire SIEM platform enables support for writing and deploy custom SIGMA rules from within BluSapphire Portal. This document is meant for Security Analysts & IT/System Administrators to help answer queries that he/she may have while writing Sigma rule.

## What is Sigma?&#x20;

While we've Snort rules for detecting Network Traffic, Yara Signatures for identifying suspicious files, consider Sigma rules for searching/pattern matching through log data. Sigma is a generic and open signature format that allows analysts to write & describe searches on log data in a straightforward manner. These rules can be converted and applied to many log management or SIEM systems. Writing Sigma rules is easy and follows the YAML format, which is quite flexible to accommodate custom fields.

**Note**: Sigma specifications may change over time with versions, in case of any missing or new attribute, please refer to the official SIGMA specifications wiki available at SIGMAHQ with frequent updates.

The following pages will help empower your abilities in understanding Sigma format and use them effectively to write/edit Detections.

###


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://manuals.blusapphire.io/blusapphire/untitled.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
