Quick Start
Operating Modes
Guard operates in two modes and transitions automatically:Learning Mode (Day 1—7)
During the first 7 days, Guard observes your system to build a behavioral baseline:- No alerts are generated (prevents false positives)
- Records normal process patterns, network connections, file activity
- Sends daily learning progress summaries via Chat
Protection Mode (Day 8+)
After the baseline is established, Guard switches to active protection:- Deviations from baseline trigger alerts
- Automated response based on confidence thresholds
- Real-time notifications via Chat
The DARE Pipeline
Every security event flows through 4 agents in sequence:| Agent | Responsibility |
|---|---|
| Detect | Rule matching (Sigma + YARA), threat intel lookup, deduplication, event correlation |
| Analyze | Evidence collection, weighted confidence scoring, AI reasoning, baseline deviation checks |
| Respond | Action execution (block IP, kill process, quarantine file), safety checks, escalation |
| Report | JSONL logging with rotation, baseline updates, anonymized data for Threat Cloud |
Agent Pipeline Deep Dive
Detailed breakdown of each agent’s inputs, outputs, and decision logic.
Detection Layers
Guard uses a 3-layer AI detection funnel to minimize latency and cost:| Layer | Engine | Cost | Latency | Traffic |
|---|---|---|---|---|
| Layer 1 | Sigma rules, YARA, built-in patterns, threat intel | $0 | < 1 ms | ~90% of events |
| Layer 2 | Ollama (local AI) | $0 | ~100 ms | ~7% of events |
| Layer 3 | Claude / OpenAI (cloud AI) | ~$0.01/event | ~1 s | ~3% of events |
Key Capabilities
| Capability | Details |
|---|---|
| Monitor types | 10 (4 built-in + 6 advanced) |
| Sigma rules | 20 built-in + custom + community |
| YARA rules | 900+ file pattern matching rules |
| Threat intel feeds | 5 sources (ThreatFox, URLhaus, Feodo, GreyNoise, AbuseIPDB) |
| Correlation patterns | 7 attack patterns with MITRE ATT&CK mapping |
| Response actions | IP block, process kill, file quarantine, notify, log |
| Cross-platform | macOS (pfctl), Linux (iptables), Windows (netsh) |
| Log retention | 50 MB per file, 10 rotated files, 90-day retention |