crowdstrike/fdr Dashboards
The Detections by Instance dashboard provides detailed visibility into security incidents through instance-based detection visualizations. This dashboard enables analysis of detection patterns, investigation of instance-specific alerts, and tracking of security events across monitored instances.
The Detections by Type dashboard presents comprehensive security alert categorization through type-based detection analytics. This dashboard enables classification of security incidents, trend analysis of detection types, and prioritization of response actions across the security landscape.
The Dev - Software Inventory dashboard provides comprehensive software asset tracking through detailed inventory visualizations. This dashboard enables monitoring of installed applications, tracking of software versions, and assessment of deployment status across the development environment.
The Domain Search dashboard presents domain-related security intelligence through interactive search visualizations. This dashboard enables investigation of domain activities, analysis of domain relationships, and monitoring of suspicious domain patterns across the network.
The File Vantage dashboard provides detailed file analysis capabilities through comprehensive file monitoring visualizations. This dashboard enables tracking of file activities, investigation of file behaviors, and assessment of file-based threats across the environment.
The Hash Search dashboard presents file hash analysis capabilities through specialized search visualizations. This dashboard enables investigation of file signatures, tracking of known malicious hashes, and identification of suspicious files across the infrastructure.
The Host Search dashboard provides comprehensive host investigation capabilities through detailed search visualizations. This dashboard enables analysis of host activities, monitoring of system behaviors, and tracking of host-based security events across the network.
The IP Search dashboard presents IP-based security analysis through specialized search visualizations. This dashboard enables investigation of IP activities, monitoring of network connections, and identification of suspicious IP patterns across the environment.
The Monitor Deployment dashboard provides comprehensive deployment tracking through status-based visualizations. This dashboard enables monitoring of deployment progress, analysis of installation status, and tracking of system coverage across the infrastructure.
The Process Context Events dashboard presents detailed process activity analysis through contextual event visualizations. This dashboard enables monitoring of process behaviors, investigation of process relationships, and tracking of suspicious activities across the environment.
The Threat Hunting dashboard provides advanced threat detection capabilities through specialized hunting visualizations. This dashboard enables proactive threat searching, investigation of suspicious patterns, and identification of potential security threats across the infrastructure.
00 - FDR Package Announcement - Please Read
| Widget | Description | Type |
|---|---|---|
| # Important Changes **This package is being reduced to only include the parser. Please use the crowdstrike/fltr-core package instead.** Instructions for configuring the crowdstrike/fltr-core package can be found here: https://github.com/CrowdStrike/logscale-community-content/wiki/FLTR-Setup-and-Configuration # Migrating Content If you've made modifications to the crowdstrike/fdr package contents and wish to keep them, they can be exported by going to → → in this repo. | Note |
Detections by Instance
The Detections by Instance dashboard provides detailed visibility into security incidents through instance-based detection visualizations. This dashboard enables analysis of detection patterns, investigation of instance-specific alerts, and tracking of security events across monitored instances.
| Widget | Description | Type |
|---|---|---|
Displays a pie chart of event detections.
| Pie Chart | |
Displays a chart of events and their detection rate over a one
hour timespan.
| Time Chart | |
Displays a flow chart of a system's events, and their severity and
technique.
| Sankey | |
Displays a pie chart of detections by severity.
| Pie Chart | |
Displays a chart of API event detections by technique, organized
by computer name, agent ID, and customer ID.
| Bar Chart | |
Displays a table of detections by attack.
| Table | |
Displays a flowchart of event detection parent and grandparent
files by file name.
| Sankey | |
Displays a flowchart of detections by parent file and file.
| Sankey | |
Displays a flow diagram of technique and tactic data.
| Sankey | |
Displays a summary of detected events based on Agent and Customer
ID by username, file path, file name, severity, tactic, technique,
etc then arranges them in table format.
| Table | |
Displays a table of external API event detections by host.
| Table | |
Displays a table of event detections by user.
| Table |
Detections by Type
The Detections by Type dashboard presents comprehensive security alert categorization through type-based detection analytics. This dashboard enables classification of security incidents, trend analysis of detection types, and prioritization of response actions across the security landscape.
| Widget | Description | Type |
|---|---|---|
Displays a pie chart of event detections.
| Pie Chart | |
Displays a chart of events and their detection rate over a one
hour timespan.
| Time Chart | |
Displays a flow chart of a system's events, and their severity and
technique.
| Sankey | |
Displays a pie chart of detections by severity.
| Pie Chart | |
Displays a chart of API event detections by technique, organized
by computer name, agent ID, and customer ID.
| Bar Chart | |
Displays a table of detections by attack.
| Table | |
Displays a flowchart of event detection parent and grandparent
files by file name.
| Sankey | |
Displays a flowchart of detections by parent file and file.
| Sankey | |
Displays a flow diagram of technique and tactic data.
| Sankey | |
Displays a summary of detected events based on Agent and Customer
ID by username, file path, file name, severity, tactic, technique,
etc then arranges them in table format.
| Table | |
Displays a table of external API event detections by host.
| Table | |
Displays a table of event detections by user.
| Table |
Dev - Software Inventory
The Dev - Software Inventory dashboard provides comprehensive software asset tracking through detailed inventory visualizations. This dashboard enables monitoring of installed applications, tracking of software versions, and assessment of deployment status across the development environment.
| Widget | Description | Type |
|---|---|---|
Displays a pie chart of product versions.
| Pie Chart | |
Displays a chart of an application's associated product and
company names.
| Bar Chart | |
Displays a table of software inventory and associated data
(company name, product name, file version) in descending order.
| Table | |
Displays a list of software companies and application information.
| Bar Chart | |
| # FDR Requirements This dashboard runs on the secondary FDR data. FDR secondary data is not enabled by default, you may need to submit a ticket to CrowdStrike Support to enable the secondary data feed. You can check to see if your data includes secondary data by searching this data for: @path = fdrv2* To narrow down the data set use the CompanyName and then the ProductName drop-down parameters above. | Note |
Domain Search
The Domain Search dashboard presents domain-related security intelligence through interactive search visualizations. This dashboard enables investigation of domain activities, analysis of domain relationships, and monitoring of suspicious domain patterns across the network.
| Widget | Description | Type |
|---|---|---|
Displays a domain lookup summary with associated data sorted by
number of hosts, then limits the results to the first 200 entries.
| Table | |
Displays a table of specific processes and their domain details
from a specific agent ID or ComputerName.
| Table | |
Displays a list of the number of distinct hosts hitting the
domain. Query results will only be provided if ?DomainName is
specified.
| Single Value | |
Displays a list of distinct hosts and the number of lookup
requests they made.
| Bar Chart | |
Displays a list of distinct hosts using ComputerName that resolve
a specific domain, and how many requests they made.
| Table | |
Shows all lookups for a given domain name/pattern
| Table | |
| # Process and Domain Details Provide Domain Name and ComputerName (or aid) to display the data. | Note | |
| # Domain Lookup and Process Details Provide Domain Name to display the data. You can filter results by aid or Computer Name. | Note | |
| # Domain Lookup Summary Displays top domains, enter Domain Name to narrow the search. | Note | |
| # Domain Lookups by Host Displays top Hosts hitting the Domain(s). Enter Domain Name to narrow the search. | Note |
File Vantage
The File Vantage dashboard provides detailed file analysis capabilities through comprehensive file monitoring visualizations. This dashboard enables tracking of file activities, investigation of file behaviors, and assessment of file-based threats across the environment.
| Widget | Description | Type |
|---|---|---|
Displays a chart of file integrity alerts by user.
| Bar Chart | |
Displays a table of file vantage alerts and associated data.
| Table | |
Displays a list of File Vantage alerts by criticality (Low,
Medium, High, and Critical).
| Pie Chart | |
Displays a chart of file integrity alerts in a 1 hour timespan.
| Time Chart | |
Displays a list of file integrity alerts by operation, including
create, write, delete, set, and rename.
| Bar Chart | |
Displays a list of file vantage alerts by platform.
| Pie Chart | |
Displays a pie chart of file vantage alerts by file name.
| Pie Chart | |
Displays a list of file integrity alerts by object, including,
'file', 'folder', 'value', and 'key'.
| Bar Chart |
Hash Search
The Hash Search dashboard presents file hash analysis capabilities through specialized search visualizations. This dashboard enables investigation of file signatures, tracking of known malicious hashes, and identification of suspicious files across the infrastructure.
| Widget | Description | Type |
|---|---|---|
Displays a list of file execution details by file name or SHA256
and limits results to the first 20,000 entries.
| Table | |
Displays a pie chart of file executions by host, limited to the
first 25 entries.
| Pie Chart | |
Displays a pie chart of files written by hosts, limited to the
first 25 entries.
| Pie Chart | |
This widget only shows result if a ComputerName is specified)
| Table | |
Displays a list of files written on distinct hosts.
| Single Value | |
Displays a chart of execution activity.
| Time Chart | |
Display a table of execution history including execution date/time
and file name, organizes it by host, and limits to the top 199
entries. Note that this query will only return results if at least
one of ?FileName or ?SHA256 is specified.
| Table | |
Displays the number of hosts executing a specific program that
have been identified as suspicious.
| Single Value | |
Displays a chart of unique host executions over time.
| Time Chart | |
| # Workflow Start by entering a file name or a SHA256 to see results for 'Execution History', File Execution Details', and 'File Written Details'. | Note |
Host Search
The Host Search dashboard provides comprehensive host investigation capabilities through detailed search visualizations. This dashboard enables analysis of host activities, monitoring of system behaviors, and tracking of host-based security events across the network.
| Widget | Description | Type |
|---|---|---|
Displays a table of services started on Windows platform and
limits results to the first 200 entries.
| Table | |
Displays a world map of network connection destinations by IP
address.
| World Map | |
Displays a flow chart of the parent file to child file process.
| Sankey | |
Displays a table of ports that are listening and associated data,
then limits results to the first 200 entries.
| Table | |
Displays a list of top DNS requests by domain name.
| Table | |
Displays a flow chart of detections by tactic and technique.
| Sankey | |
Displays a table of user logons by type with additional data, then
limits results to the first 200 entries.
| Table | |
Displays a table of scheduled tasks with associated data
(username, task name, command data, and arguments).
| Table | |
Displays a list of IP4 network connections.
| Table | |
Displays a list of API event detections.
| Table | |
Displays a list of packed executables that have been written.
| Single Value | |
Displays a list of unique executables written using SHA256 hash
data.
| Single Value | |
Displays a table of processes by file name and limits results to
the first 200 entries.
| Table | |
Displays a table of host information, including computer name,
agent version, etc.)
| Table | |
| #Workflow Add a non-wildcard value to the aid parameter for the widgets to display results. | Note |
IP Search
The IP Search dashboard presents IP-based security analysis through specialized search visualizations. This dashboard enables investigation of IP activities, monitoring of network connections, and identification of suspicious IP patterns across the environment.
| Widget | Description | Type |
|---|---|---|
Displays a table of summarized IP address data.
| Table | |
Displays a table of IP connections for a given host.
| Table | |
Displays a chart of IP connections for a given host.
| Bar Chart | |
Displays a table of target process IDs and IP addresses in
descending order and limits results to the first 100 entries.
| Table | |
Displays a table of IP address details including computer ID, the
first and last lookup, etc. then limits the results to the first
199 entries.
| Table |
Monitor Deployment
The Monitor Deployment dashboard provides comprehensive deployment tracking through status-based visualizations. This dashboard enables monitoring of deployment progress, analysis of installation status, and tracking of system coverage across the infrastructure.
| Widget | Description | Type |
|---|---|---|
Displays a list of active sensors on a world map.
| World Map | |
Displays a chart of the number of hosts online in a 6 hour
timespan.
| Time Chart | |
Displays a pie chart of hosts by platform.
| Pie Chart | |
Displays a table of hosts by platform.
| Table |
Process Context Events
The Process Context Events dashboard presents detailed process activity analysis through contextual event visualizations. This dashboard enables monitoring of process behaviors, investigation of process relationships, and tracking of suspicious activities across the environment.
| Widget | Description | Type |
|---|---|---|
Displays a table of network events TCP, ICMP, UDP, and IP data.
| Table | |
Displays a pie chart of context events by type.
| Pie Chart | |
Displays a list of files that have been written.
| Table | |
Displays a record of an original process from the command line,
with an accompanying file name.
| Table | |
Displays a list of files that have been deleted by process ID.
| Table | |
Display a pie chart of destination IP addresses by type.
| Pie Chart | |
Displays a table of DNS requests by domain name.
| Table | |
Displays a list of all context events by ID.
| Event List | |
Displays a table of image hash events.
| Table | |
| # Workflow Start by entering a filename. The aid is optional, but will constrain (and speed up) the search if you have it. If you find an interesting process copy the ProcessId and paste it in the parameter above to show the context events below. | Note |
Threat Hunting
The Threat Hunting dashboard provides advanced threat detection capabilities through specialized hunting visualizations. This dashboard enables proactive threat searching, investigation of suspicious patterns, and identification of potential security threats across the infrastructure.
| Widget | Description | Type |
|---|---|---|
Displays a list of any found ASEPs.
| Table | |
Displays a table of top country destinations by IP address and
country.
| Table | |
Displays a table of suspicious lead data.
| Table | |
Displays a list of high entropy domains using Akamai and limits
the results to the first 20 entries.
| Table | |
Displays a table of open ports for a given agent ID.
| Table | |
Displays a table of top IP destinations.
| Table | |
Script content rated by Shanon entropy to look for randomness as a
proxy for obfuscation attempts.
| Table | |
Displays a list of unoriginal executable file names.
| Event List | |
| Please specify the aid parameter in order to see results for the 'Open Ports' widget. | Note |