Filter Detection Analytics
    • 19 Mar 2024
    • 1 Minute to read
    • PDF

    Filter Detection Analytics

    • PDF

    Article summary

    This article provides a quick reference to filtering your detection analytics.

    To group and understand your detection analytics, you can filter them by attribute.

    1. From the navigation menu, click the Analytics dropdown.

    2. Enter attributes in the Detection Analytics filter bar, and then press Return or Enter.

    Supported filter attributes

    Attribute

    Description

    Example

    Name

    The detection analytic's name.

    name:ANY-BLOODHOUND-FILEMOD

    Description

    A string contained in the detection analytic's description.

    bloodhound

    Intelligence Type

    The primary type of intelligence used by the detection analytic.

    intelligence_type:none


    intelligence_type:first_party


    intelligence_type:third_party


    intelligence_type:publisher_blacklist

    Attack Technique

    A MITRE ATT&CK® technique number that the detection analytic identifies.

    attack_technique_id:T1069

    Associated Indicators

    An atomic indicator that the detection analytic identifies. Examples include application publisher names and binary hashes. 

    f5b3d6ab5971f65c0d0fc7a56c4d014a


    Chengdu Yijia Advertising Co. Ltd.

    First Detection Time

    The first time Red Canary identified a threat in your environment using the detection analytic.

    first_detection_at:2022-03-03..

    Latest Detection Time

    The latest time Red Canary identified a threat in your environment using the detection analytic.

    latest_detection_at:2022-03-03..

    Dates are specified using from..to syntax, where from and to are date-times or ISO 8601 dates. You can omit either from or to to filter for unbounded times.

    To filter endpoints by operating system, use the operating_system: field. You may either type a word after the colon, for example, operating_system:windows; or multiple words surrounded by double quotes, for example, operating_system:"Windows 10". This field is not case-sensitive, and will match on specific endpoint operating systems, as well as canonicalized names.


    Was this article helpful?