Creating high‑confidence alerts with Respond rules
Respond rules help you decide when activity actually matters.
Respond rules let you create high‑confidence alerts by correlating multiple signals into a single condition that is more meaningful than any individual alert on its own. They are used when reviewing individual alerts is not enough to understand risk and you need to surface a specific pattern of behavior consistently.
In day‑to‑day Kaseya MDR usage, Respond rules are introduced after investigation, not before it. You first review alerts, investigate activity in Analysis, and then create Respond rules when you recognize a repeatable pattern that should be detected automatically.
For example, a single alert may be low confidence on its own, but when it occurs together with another action, within a short time window, or for a specific scope such as a user or organization, it becomes meaningful. Respond rules are designed for exactly these situations.
This article focuses on how to think about Respond rules once Kaseya MDR is part of daily operations. It provides practical guidance for designing Respond rules and deciding when they are the right tool, without replacing the step‑by‑step configuration covered in Creating Respond rules. In Kaseya MDR, creating or modifying a Respond rule does not, by itself, indicate SOC review or approval.
When Respond rules are the right tool
Use Respond rules only after you have:
-
Reviewed individual alerts
-
Investigated representative activity in Analysis
-
Confirmed that single alerts are insufficient to represent real risk
Respond rules are appropriate when:
-
Multiple low‑confidence alerts together indicate suspicious behavior
-
Timing or sequence matters (for example, one action followed by another)
-
You want alerts to fire only when all conditions are met together
If an alert is consistently low urgency everywhere, adjust alert severity or detection tuning first. If an alert is expected only in a specific context, use scoped suppression instead. If repeated alerts are the issue but no multi‑signal pattern exists, start with Managing repeated alerts before creating a Respond rule.
If investigation shows that individual alerts already provide sufficient context to make decisions, a Respond rule may not be necessary. In Kaseya MDR, Respond rules support correlation and alerting decisions and do not automatically imply SOC‑executed response actions.
How Respond rules fit into Using Kaseya MDR
Kaseya MDR surfaces security‑relevant activity through alerts and provides investigation context using correlated telemetry collected as part of the MDR service. Respond rules in Kaseya MDR are used when a meaningful pattern spans multiple signals or alert types and cannot be reliably identified through a single alert alone.
Respond rules are not meant to be the first step in investigation. They are introduced after you understand how alerts behave and how activity appears in Analysis. In Kaseya MDR, Respond rules support correlation and alerting decisions and do not automatically imply SOC‑executed response.
A typical workflow in Kaseya MDR looks like this:
-
Alerts surface activity that may require review
-
Analysis is used to understand scope, sequence, and context
-
Respond rules are created when a meaningful pattern needs to be detected consistently
In other words, Respond rules help you operationalize what you’ve already learned through investigation. They reduce repeated manual analysis by turning a known pattern into a reliable signal.
What makes an alert “high confidence”
A high‑confidence alert typically has more than one requirement, such as:
-
More than one event or alert type
-
A defined sequence of actions
-
A time window that connects related behavior
-
A specific scope (user, device, or organization)
Respond rules work by requiring these conditions to be true together, instead of reacting to a single signal in isolation.
Anatomy of a Respond rule
Every Respond rule is assembled from the same logical building blocks:
-
Scope: Which organizations, users, or devices the rule applies to. This defines who or what you are watching
-
Trigger conditions: Which activity initiates rule evaluation. Triggers define what you are paying attention to, such as a specific alert type or category of events
-
Logic and timing: How conditions are combined (AND / OR), how often activity must occur, and within what time window. This is where you define whether behavior is suspicious only when it happens repeatedly, in sequence, or within a short period
-
Outcome: What happens when all conditions are met. Start with alerting for investigation, and enable response actions only when appropriate and supported by your MDR configuration
This structure is what turns background activity into a meaningful signal.
How this relates to detection and IOCs
The same logical components used in Respond rules—triggers, conditions, scope, and outcomes—are also used across detections and IOC matching in Kaseya MDR. The difference is intent: detections surface individual security signals, IOC matches add supporting evidence and investigation context, and Respond rules combine multiple signals into higher‑confidence alerts when correlation is required.
For an overview of how detection logic is structured across the platform, see Detection, IOCs, and Respond Rules.
Designing effective Respond rule filters
Filters refine how a rule evaluates data so it triggers only for relevant behavior. In practice, filters answer this question: When should this rule not trigger, even if the event occurs?
Excluding known benign values
It is common to create Respond rules that trigger on a general condition except when that condition is caused by a known, trusted source.
For example:
-
You want a rule to trigger when a security‑sensitive change occurs
-
But not when that change is routinely made by a trusted system or service
Filters allow you to exclude benign causes so the rule focuses on meaningful risk identified during investigation.
Be careful when excluding multiple values
When excluding multiple values from the same field, ensure exclusions are evaluated together so the rule does not fire simply because one exclusion did not match.
Recommended approach:
-
Use a single filter condition
-
Combine exclusion values using appropriate AND logic
-
Ensure all exclusion checks are evaluated before the rule can trigger
Step 1: Identify the pattern you want to detect
Before creating a Respond rule, clearly define the behavior you are trying to capture:
-
What is happening?
-
Which individual alerts are involved?
-
How often and in what order do they occur?
-
Over what time window?
-
Who or what is affected?
If the behavior you’re trying to capture is already represented by a single detection or IOC but appears too noisy, review detection tuning or IOC severity first. Respond rules are most effective when the pattern only becomes meaningful after correlating multiple signals. For guidance on shaping detection behavior before escalation, see Detection, IOCs, and Respond Rules.
Example: Detecting a suspicious sequence across systems
What happens: A user performs a suspicious sign‑in and then performs a sensitive change shortly afterward.
Why a Respond rule is needed: Each action alone may be low confidence. Together, the sequence warrants investigation.
How the rule works conceptually:
-
The rule watches for two related activity types
-
It groups activity by the same account
-
It requires both actions to occur within a short time window
-
It triggers only when the defined pattern occurs as a combined signal
This is a good Respond rule candidate because no single event represents risk by itself, but the combined behavior does.
NOTE Design rules around decision points—patterns that would change what you do during investigation—rather than patterns that only reduce volume.
Step 2: Validate the pattern using Analysis
Before creating a Respond rule:
-
From the side navigation menu, open Analysis.
-
Investigate historical activity that matches the pattern.
-
Confirm that:
-
The pattern occurs in real data
-
It is not common or expected behavior
-
It consistently represents higher risk than individual alerts
-
Do not create Respond rules based on hypothetical patterns alone. During investigation, IOC matches may appear as supporting context alongside other activity. IOC matches help explain why behavior is suspicious but are rarely sufficient on their own to justify escalation without correlation.
Step 3: Create a Respond rule (conceptual steps)
When you create a Respond rule:
-
Define trigger conditions based on the validated pattern
-
Add all required alerts or activity types
-
Specify the time window in which they must occur
-
Scope the rule appropriately
Proper scoping ensures the rule listens only for relevant activity and reduces unnecessary alerts.
Step 4: Choose the outcome of the rule
When a Respond rule triggers, you choose what outcome occurs:
-
Generate an alert for investigation only, or
-
Initiate response actions when appropriate
Start with alert‑only behavior
Alert‑only is recommended when:
-
You are testing a new rule
-
You want to validate patterns before enabling automation
-
You want visibility without taking immediate action
Alert‑only rules still trigger and appear like any other Respond rule, but no automated remediation is performed.
Use response actions carefully
Before enabling response actions:
-
Confirm the rule triggers only for meaningful patterns
-
Understand the impact of the action on users or services
-
Validate behavior using alert‑only mode first
If you are unsure whether automation is appropriate, keep the rule alert‑only and review outcomes manually.
Step 5: Validate why the rule triggered
After a Respond rule fires, use Analysis to review:
-
Which alerts or events met the rule conditions
-
The sequence and timing that caused the trigger
-
Whether all expected conditions were met
-
Whether the outcome matched expectations
If a rule triggers unexpectedly or too often, refine its conditions, scope, or time window before expanding its use or enabling automation.
Temporarily disabling a Respond rule during validation
During testing or refinement, you may need to pause a Respond rule without deleting it.
Disabling a rule allows you to:
-
Stop the rule from triggering
-
Preserve its logic and conditions
-
Re‑enable it later after refinement
This is especially useful during early rollout, when a rule identifies the right pattern but needs adjustment before being left active.
How Respond rules fit with noise management
Use these tools together in this order:
-
Working with alerts: Understand individual alerts
-
Analysis: Validate patterns, scope, and context
-
Managing noise without reducing coverage: Reduce unnecessary escalations safely
-
Managing repeated alerts: Handle recurring patterns intentionally
-
Alert suppression: Apply scoped exceptions
-
Respond rules: Surface meaningful patterns consistently
Respond rules should replace multiple low‑value alerts, not add more noise.
What to avoid
When creating Respond rules:
-
Do not create rules without validating patterns in Analysis
-
Do not combine unrelated activity just to reduce volume
-
Do not enable automation without understanding impact
-
Do not treat Respond rules as replacements for investigation
-
Do not assume more conditions always equal better detection
Related articles
-
Creating Respond rules: When you are ready to translate these concepts into an actual rule configuration in the product UI
-
Analyzing a Respond trigger: Review why a rule fired and confirm expected behavior
-
Respond actions: Understand available actions and when alert‑only behavior is appropriate
-
Managing Respond connections: Verify that response actions can run for each organization