Real-Time Protection
Panguard Guard runs 24/7 on your system, monitoring processes, network connections, files, and logs. It uses a four-agent AI pipeline to detect, analyze, respond to, and report on security threats in real time.For pre-install security, see Skill Auditor — the recommended first step
before running any AI agent skill.
Quick Start
Start Guard
Learning Mode (Days 1-7)
During the learning period, Guard silently observes and records:- Processes — Which programs normally run, startup times, resource usage
- Network — Normal connection patterns, common ports, traffic characteristics
- Files — Change patterns in critical directories
- Users — Login times, source IPs, operational patterns
Guard does not generate alerts during learning mode. This prevents the flood of false positives
that makes most security tools useless. You receive a daily learning progress summary via Chat.
Protection Mode (Day 8+)
Once the baseline is established, Guard activates full protection:- Events that deviate from the baseline trigger alerts
- The three-layer AI funnel analyzes suspicious events
- Automated or manual responses based on confidence level
- Real-time notifications via your configured Chat channel
Confidence-Based Response
| Confidence | Action | Example |
|---|---|---|
| > 90% | Auto-execute, notify after | Known malicious IP automatically blocked |
| 70-90% | Ask for confirmation via Chat | Suspicious process — asks if you want to terminate |
| < 70% | Notify only | Minor anomaly — informs you for observation |
The Four-Agent Pipeline
Every security event flows through four specialized agents:| Agent | Role |
|---|---|
| DetectAgent | Rule matching (ATR), threat intelligence lookup, event correlation |
| AnalyzeAgent | Evidence collection, weighted confidence scoring, AI reasoning via three-layer funnel |
| RespondAgent | Action execution (block IP, kill process, isolate file), safety checks, escalation |
| ReportAgent | Event logging, baseline updates, anonymized data for Threat Cloud |
Response Actions
Guard can execute the following response actions automatically:| Action | Description | Platform Support |
|---|---|---|
| IP Block | Block malicious IP addresses | macOS (pfctl), Linux (iptables), Windows (netsh) |
| File Isolation | Quarantine suspicious files with SHA-256 record | All platforms |
| Process Termination | Kill malicious processes (SIGTERM, then SIGKILL after 5s) | All platforms |
Safety Protections
Guard includes built-in safety rules to prevent accidental damage:- Whitelisted IPs:
127.0.0.1,::1,localhost,0.0.0.0(plus user-configured) - Protected processes:
sshd,systemd,init,launchd,node,panguard-guard - Protected accounts:
root,Administrator,SYSTEM - Network isolation requires confidence >= 95%
- Self-process kill prevention
Integrated Threat Intelligence
Guard automatically queries 5 threat intelligence feeds:- ThreatFox — IoC database (IPs, domains, URLs, file hashes)
- URLhaus — Malware distribution URLs
- Feodo Tracker — C2 server tracking
- GreyNoise — IP reputation (targeted vs. mass scanning)
- AbuseIPDB — Community-reported malicious IPs
Rule Engine
ATR Rules
Guard ships with 61 bundled ATR rules. You can also add custom rules:.yml files in Guard’s rules directory. Guard automatically loads new rules with hot reload support.
Managing Guard
CLI Reference
Related
Learning Mode
Deep dive into the 7-day learning period and baseline building.
Three-Layer AI Funnel
How rules, local AI, and cloud AI work together.
System Service
Install Guard as a systemd/launchd service.
Notification Setup
Configure how Guard notifies you about threats.