Filter Detection Analytics
    • 08 Sep 2025
    • 1 Minute to read
    • PDF

    Filter Detection Analytics

    • PDF

    Article summary

    This article provides a quick reference to filtering your detection analytics.

    To group and understand your detection analytics, you can filter them by attribute.

    1. From the navigation menu, click the Analytics dropdown.

    2. Enter attributes in the Detection Analytics filter bar, and then press Return or Enter.

    Supported filter attributes

    Attribute

    Description

    Example

    Name

    The detection analytic's name.

    name:ANY-BLOODHOUND-FILEMOD

    Description

    A string contained in the detection analytic's description.

    bloodhound

    Detection Type

    The primary type of detection to identify behavior.

    detection_type:red_canary_behavioral detection_type:red_canary_intelligence

    detection_type:targeted_product

    detection_type:threat_hunt

    detection_type:third_party

    detection_type:process_memory_signature

    Source

    Filter by the source of the detection analytic.

    source:"Amazon GuardDuty Unified"

    source:"Microsoft Defender for Cloud"

    Attack Technique

    A MITRE ATT&CK® technique number that the detection analytic identifies.

    attack_technique_id:T1069

    Associated Indicators

    An atomic indicator that the detection analytic identifies. Examples include application publisher names and binary hashes. 

    f5b3d6ab5971f65c0d0fc7a56c4d014a

    Chengdu Yijia Advertising Co. Ltd.

    First Detection Time

    The first time Red Canary identified a threat in your environment using the detection analytic.

    first_detection_at:2022-03-03..

    Latest Detection Time

    The latest time Red Canary identified a threat in your environment using the detection analytic.

    latest_detection_at:2022-03-03..

    Dates are specified using from..to syntax, where from and to are date-times or ISO 8601 dates. You can omit either from or to to filter for unbounded times.

    To filter endpoints by operating system, use the operating_system: field. You may either type a word after the colon, for example, operating_system:windows; or multiple words surrounded by double quotes, for example, operating_system:"Windows 10". This field is not case-sensitive, and will match on specific endpoint operating systems, as well as canonicalized names.


    Was this article helpful?

    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.