top of page
Search

Beyond Detection: Hidden Power Features of Sublime Security

  • 3 days ago
  • 2 min read

Updated: 2 days ago

ree


While Detection Rules and Automations are at the heart of Sublime Security's threat detection and response, the platform is packed with additional tools and capabilities that make it even more powerful, customizable, and community-driven.


Here are a few advanced features every security team should explore.

🧠 Git-Backed Rule Feeds

ree

Stay Updated, Stay Ahead

Sublime supports Git-backed rule feeds that allow you to receive continuous updates from the Sublime team and the broader security community.

ree


  • Sublime Rules Feed is included by default and maintained by the Sublime team.

  • You can add custom feeds from GitHub, GitLab, or Bitbucket—perfect for managing and sharing detection rules across teams or community groups.

  • To manage feeds, just head to the Feeds section in your dashboard and click New Feed.

🔗 Pro Tip: Community collaboration makes rule evolution much faster. Embrace it.


🗂 Lists

Dynamic Sets for Smarter Matching

Sublime supports the use of named lists—these are reusable sets of data (like domains, email addresses, or file hashes) you can reference within your detection logic using MQL.

ree
  • All list names start with $ (e.g., $org_vips, $blocked_domains)

  • You can create your own lists or use the built-in ones provided by Sublime.

  • Lists simplify rule maintenance and improve readability.





🚫 Exclusions

Cut Out the Noise

ree

Exclusions are used to suppress alerts on known benign messages (like phishing simulations or internal test emails). They're evaluated before rules or automations trigger.

ree

There are three types of exclusions:

  1. Global Exclusion – Message is skipped from all rules and automations

  2. Detection Rule Exclusion – Message bypasses detection rules, but still hits automations

  3. Rule-Specific Exclusion – Blocks a specific rule from matching a sender, domain, or recipient


Sublime ships with built-in global exclusions for vendors like Cofense, KnowBe4, and Hoxhunt—inactive by default, but available if needed.

✅ Use exclusions strategically to reduce alert fatigue and fine-tune precision.
ree


⚙️ Actions: How You Enforce Responses

Actions are what you want to do when something is detected. You can apply actions manually or automatically through Rules and Automations. Here are two key ones:

ree

🛑 Quarantine (Enterprise)

  • Makes the email inaccessible to end users

  • In Microsoft 365, the message goes to “Recoverable Items Purges”

  • In Google Workspace, it's deleted from the user's inbox but retrievable by Sublime admins


📌 To add quarantine:

  1. Open a Rule or Automation

  2. Click "Edit"

  3. Under Actions, choose Quarantine

  4. Save


📬 Move to Spam (Core + Enterprise)

  • Moves suspicious messages to the Spam/Junk folder

  • Good for messages that are unwanted but not outright malicious

  • Often paired with Warning Banners for extra visibility


📌 To use Move to Spam:

  1. Open your Rule or Automation

  2. Click "Edit"

  3. Select Move to Spam under Actions

  4. Save


✨ Final Thoughts

These extra features may seem small, but they can supercharge your email security operations when used properly:
  • Feed integrations keep your detections fresh

  • Lists and Exclusions fine-tune your logic

  • Actions like Quarantine and Move to Spam help automate response

  • And Git-based feeds make Sublime feel like a true DevSecOps-native platform


Let the platform do the heavy lifting—you focus on what matters most.

---------------------------------------------------Dean--------------------------------------------------

Upcoming Article: Meet ASA: Your New AI-Powered Security Teammate from Sublime Security

----------------------------------------------------------------------------------------------------------


 
 
 

Commentaires


bottom of page