Common Report Queries🔗
The following advanced search queries yield results for commonly requested reports. You can create these queries using either Query Language or Builder.
Netflow events that identify SSH activity in outbound traffic but exclude a specific IP address (e.g. 10.0.0.121)
Netflow events that identify SSH activity in outbound traffic from a specific IP address (e.g. 10.0.0.121)
FROM netflow WHERE destination_port=22 AND direction='OUTBOUND' AND destination_address = 10.0.0.121
Netflow and Auth events involving a specific IP address (e.g. 10.0.0.121)
Windows events where a user was added to a security-enabled global group (e.g. domain admins)
All events, regardless of alert type, that contain a specific user ID (e.g. admin)
All command line events across multiple alert types that contain the creation of a scheduled task
Process events where the command line includes scheduled tasks
Process events that include 'whoami' or another specific value (e.g. ATOMIC)
Generic events from a specified sensor (e.g. Zeek)
Generic events from the past 2 hours
Inspector and process events for specific data 'lsass' for the past 7 days
All DNS query events that do not contain specific data 'secureworks' and 'windows update'
DNS query events matching '*.secureworks.com' sorted by the query_name in alphabetical order
Process events from Red Cloak™ Endpoint Agent and CrowdStrike
Auth events where the source user name or target user name contains a specific value (e.g. admin)
Auth events where the source user name and target_user_name do not contain a specific value (e.g. admin)
Auth events where the source user name and target_user_name do not contain a specific value (e.g. admin), but the win_summary field has a value containing 'special'