Filter Detection Analytics

Prev Next

This article provides a quick reference to filtering your detection analytics.

To group and understand your detection analytics, you can filter them by attribute.

  1. From the navigation menu, click the Analytics dropdown.

  2. Enter attributes in the Detection Analytics filter bar, and then press Return or Enter.

Supported filter attributes

Attribute

Description

Example

Name

The detection analytic's name.

name:ANY-BLOODHOUND-FILEMOD

Description

A string contained in the detection analytic's description.

bloodhound

Detection Type

The primary type of detection to identify behavior.

detection_type:red_canary_behavioral detection_type:red_canary_intelligence

detection_type:targeted_product

detection_type:threat_hunt

detection_type:third_party

detection_type:process_memory_signature

Source

Filter by the source of the detection analytic.

source:"Amazon GuardDuty Unified"

source:"Microsoft Defender for Cloud"

Attack Technique

A MITRE ATT&CK® technique number that the detection analytic identifies.

attack_technique_id:T1069

Associated Indicators

An atomic indicator that the detection analytic identifies. Examples include application publisher names and binary hashes. 

f5b3d6ab5971f65c0d0fc7a56c4d014a

Chengdu Yijia Advertising Co. Ltd.

First Detection Time

The first time Red Canary identified a threat in your environment using the detection analytic.

first_detection_at:2022-03-03..

Latest Detection Time

The latest time Red Canary identified a threat in your environment using the detection analytic.

latest_detection_at:2022-03-03..

Dates are specified using from..to syntax, where from and to are date-times or ISO 8601 dates. You can omit either from or to to filter for unbounded times.

To filter endpoints by operating system, use the operating_system: field. You may either type a word after the colon, for example, operating_system:windows; or multiple words surrounded by double quotes, for example, operating_system:"Windows 10". This field is not case-sensitive, and will match on specific endpoint operating systems, as well as canonicalized names.