Views:
To view specific data, select from the following optional attributes and operators, and type an associated value.

Search Criteria: Network Detections

Attribute
Operator
Action
Host Name
Contains/Does not contain/Starts with/Equals
Type a value
Interested Host
Contains/Does not contain/Starts with/Equals
Type a value
Peer Host
Contains/Does not contain/Starts with/Equals
Type a value
IP Address
Contains/Does not contain/Equals
Type a value
In range/Not in range
Type a range
Interested IP Address
Contains/Does not contain/Equals
Type a value
In range/Not in range
Type a range
Peer IP Address
Contains/Does not contain/Equals
Type a value
In range/Not in range
Type a range
Peer IP Country/Region
In/Not in
Select one or more peer IP countries
MAC Address
In/Not in
Type a value
Network Group
Contains/Does not contain/Equals
Type a value
User Account
Has user account/No user account
 
Contains/Does not contain
Type a value
Protocol
In/Not in
Select one or more protocols
Transport Layer Security (TLS)
Equals
Select one of the following:
  • Over SSL/TLS
  • Not over SSL/TLS
Direction
Equals
Select one of the following:
  • Internal
  • External
Threat/Detection/Reference
Contains/Does not contain/Equals
Type a value
Detection Rule ID
In/Not in
Type a range
YARA Rule File Name
Has YARA rule file name/No YARA rule file name
 
Contains/Does not contain/Equals
Type a value
Correlation Rule ID (ICID)
In/Not in
Type a value
Detection Type
In/Not in
Select one or more of the following:
  • Malicious Content
  • Malicious Behavior
  • Suspicious Behavior
  • Exploit
  • Grayware
  • Malicious URL
  • Disruptive Application
  • Correlated Incident
Attack Phase
In/Not in
Select one or more of the following:
  • Intelligence Gathering
  • Point of Entry
  • C&C Communication
  • Lateral Movement
  • Asset/Data Discovery
  • Data Exfiltration
  • Unknown Attack Phase
Tactics
Has tactics/No tactics
 
In/Not in
Select one or more of the following:
  • Initial Access
  • Execution
  • Persistence
  • Privilege Escalation
  • Defense Evasion
  • Credential Access
  • Discovery
  • Lateral Movement
  • Collection
  • Exfiltration
  • Command and Control
  • Impact
URL Category
In/Not in
Select one or more URL categories
C&C List Source
In/Not in
Select one or more of the following:
  • Global Intelligence
  • Virtual Analyzer
  • User-defined
  • Relevance Rule
C&C Callback Address
Contains/Does not contain
Type a value
C&C Risk Level
In/Not in
Select one or more of the following:
  • Low
  • Medium
  • High
  • Unknown
Virtual Analyzer Result
Has analysis results/No analysis results
 
PCAP File
Has PCAP file/No PCAP file
 
Is Targeted Attack Related
Equals
Select one of the following:
  • Yes
  • No
File Detection Type
In
Select one or more of the following:
  • Highly Suspicious File
  • Heuristic Detection
  • Known Malware
File Path/File Name
Has file name/No file name
 
Contains/Does not contain/Equals
Type a value
File SHA-1
Has file SHA-1/No file SHA-1/
 
Contains/Does not contain
Type a value
File SHA-256
Has file SHA-256/No file SHA-256
 
Contains/Does not contain
Type a value
Domain/URL
Contains/Does not contain/Equals
Type a value
Suspicious Object/Deny List Entity/User-Defined SO
Contains/Does not contain/Starts with/Equals
Type a value
Sender (Email)
Has sender/No sender
 
Equals/Contains/Does not contain
Type a value
Recipient (Email)
Has recipient/No recipient
 
Equals/Contains/Does not contain
Type a value
Message ID (Email)
Has message ID/No message ID
 
Contains/Does not contain
Type a value
Subject (Email)
Has subject/No subject
 
Contains/Does not contain
Type a value
For details, see the following: