crowdstrike/fdr Dashboards
00 - FDR Package Announcement - Please Read
Widget | Description | Type |
---|---|---|
FDR Package Migration | # Important Changes **This package is being reduced to only include the parser. Please use the crowdstrike/fltr-core package instead.** Instructions for configuring the crowdstrike/fltr-core package can be found here: https://github.com/CrowdStrike/logscale-community-content/wiki/FLTR-Setup-and-Configuration # Migrating Content If you've made modifications to the crowdstrike/fdr package contents and wish to keep them, they can be exported by going to Settings -> Create a Package -> Export Package in this repo. | Note |
Detections by Instance
Widget | Description | Type |
---|---|---|
Detections by Tactic | logscale
| Pie Chart |
Detection Rate | logscale
| Time Chart |
Map: Severity -> Technique | logscale
| Sankey |
Detections by Severity | logscale
| Pie Chart |
Detections by Technique | logscale
| Bar Chart |
Detection by Attack | logscale
| Table |
Detection: Grandparent File -> Parent File | logscale
| Sankey |
Detection: Parent File -> File | logscale
| Sankey |
Map: Technique -> Tactic | logscale
| Sankey |
Detection Table |
Displays a summary of detected events based on Agent and Customer
ID by username, file path, file name, severity, tactic, technique,
etc then arranges them in table format.
logscale
| Table |
Detections by Host | logscale
| Table |
Detections by User | logscale
| Table |
Detections by Type
Widget | Description | Type |
---|---|---|
Detections by Tactic | logscale
| Pie Chart |
Detection Rate | logscale
| Time Chart |
Map: Severity -> Technique | logscale
| Sankey |
Detections by Severity | logscale
| Pie Chart |
Detections by Technique | logscale
| Bar Chart |
Detection by Attack | logscale
| Table |
Detection: Grandparent File -> Parent File | logscale
| Sankey |
Detection: Parent File -> File | logscale
| Sankey |
Map: Technique -> Tactic | logscale
| Sankey |
Detection Table |
Displays a summary of detected events based on Agent and Customer
ID by username, file path, file name, severity, tactic, technique,
etc then arranges them in table format.
logscale
| Table |
Detections by Host | logscale
| Table |
Detections by User | logscale
| Table |
Dev - Software Inventory
Widget | Description | Type |
---|---|---|
Product Versions | logscale
| Pie Chart |
Product Names | logscale
| Bar Chart |
Software Inventory | logscale
| Table |
Software Companies |
Displays a list of software companies and application information.
logscale
| Bar Chart |
Software Inventory Note | # FDR Requirements This dashboard runs on the secondary FDR data. FDR secondary data is not enabled by default, you may need to submit a ticket to CrowdStrike Support to enable the secondary data feed. You can check to see if your data includes secondary data by searching this data for: @path = fdrv2* To narrow down the data set use the CompanyName and then the ProductName drop-down parameters above. | Note |
Domain Search
Widget | Description | Type |
---|---|---|
Domain Lookup Summary | logscale
| Table |
Process and Domain Details | logscale
| Table |
Number of Hosts hitting the domain | logscale
| Single Value |
Domain Lookups by Host | logscale
| Bar Chart |
Domain Lookups by Host (Table) | logscale
| Table |
Lookup Details |
Shows all lookups for a given domain name/pattern
logscale
| Table |
Workflow Note | # Process and Domain Details Provide Domain Name and ComputerName (or aid) to display the data. | Note |
Workflow Note | # Domain Lookup and Process Details Provide Domain Name to display the data. You can filter results by aid or Computer Name. | Note |
Workflow Note | # Domain Lookup Summary Displays top domains, enter Domain Name to narrow the search. | Note |
Workflow Note | # Domain Lookups by Host Displays top Hosts hitting the Domain(s). Enter Domain Name to narrow the search. | Note |
File Vantage
Widget | Description | Type |
---|---|---|
File Integrity Alerts by User | logscale
| Bar Chart |
File Vantage Alerts | logscale
| Table |
File Vantage Alerts by Criticality | logscale
| Pie Chart |
File Integrity Alerts | logscale
| Time Chart |
File Integrity Alerts by Operation | logscale
| Bar Chart |
File Vantage Alerts by Platform |
Displays a list of file vantage alerts by platform.
logscale
| Pie Chart |
File Vantage Alerts by File Name | logscale
| Pie Chart |
File Integrity Alerts by Object | logscale
| Bar Chart |
Hash Search
Widget | Description | Type |
---|---|---|
File Execution Details (Specify FileName or SHA256) | logscale
| Table |
File Execution by Host | logscale
| Pie Chart |
File Written by Hosts | logscale
| Pie Chart |
File Written Details (Specify ComputerName) |
This widget only shows result if a ComputerName is specified)
logscale
| Table |
Written on Distinct Hosts | logscale
| Single Value |
Execution Activity | logscale
| Time Chart |
Execution History (Specify FileName or SHA256) | logscale
| Table |
Number of Hosts Executing File | logscale
| Single Value |
Unique Host Executions | logscale
| Time Chart |
Workflow Note | # Workflow Start by entering a file name or a SHA256 to see results for 'Execution History', File Execution Details', and 'File Written Details'. | Note |
Host Search
Widget | Description | Type |
---|---|---|
Services Started | logscale
| Table |
Network Connection Destinations | logscale
| World Map |
Parent to Child Process | logscale
| Sankey |
Listening Ports | logscale
| Table |
Top DNS Requests | logscale
| Table |
Detections: Map Tactic Technique | logscale
| Sankey |
User Logons | logscale
| Table |
Schedule Tasks | logscale
| Table |
Network Connections Count | logscale
| Table |
Detections | logscale
| Table |
Packed Executable Written | logscale
| Single Value |
Unique Executables Written | logscale
| Single Value |
Processes | logscale
| Table |
Host Information | logscale
| Table |
Workflow Note | #Workflow Add a non-wildcard value to the aid parameter for the widgets to display results. | Note |
IP Search
Widget | Description | Type |
---|---|---|
IP Summary | logscale
| Table |
IP Connections by Host | logscale
| Table |
IP Connections by Host | logscale
| Bar Chart |
Process and IP | logscale
| Table |
IP Lookup Details (Specify IP to show data) |
Displays a table of IP address details including computer ID, the
first and last lookup, etc. then limits the results to the first
199 entries.
logscale
| Table |
Monitor Deployment
Widget | Description | Type |
---|---|---|
Active Sensors | logscale
| World Map |
Number of Hosts | logscale
| Time Chart |
Hosts by Platform | logscale
| Pie Chart |
Hosts by Platform | logscale
| Table |
Process Context Events
Widget | Description | Type |
---|---|---|
Process - Network Events | logscale
| Table |
Context Events by Type | logscale
| Pie Chart |
Files Written |
Displays a list of files that have been written.
logscale
| Table |
Original Processes |
Displays a record of an original process from the command line,
with an accompanying file name.
logscale
| Table |
Files Deleted | logscale
| Table |
Destination IPs | logscale
| Pie Chart |
DNS Requests | logscale
| Table |
All Context Events | logscale
| Event List |
Image Hash Events | logscale
| Table |
Workflow Note | # Workflow Start by entering a filename. The aid is optional, but will constrain (and speed up) the search if you have it. If you find an interesting process copy the ProcessId and paste it in the parameter above to show the context events below. | Note |
Threat Hunting
Widget | Description | Type |
---|---|---|
Check random ASEPs | logscale
| Table |
Top Country Destinations | logscale
| Table |
Suspicious Leads | logscale
| Table |
High Entropy Domains |
Displays a list of high entropy domains using Akamai and limits
the results to the first 20 entries.
logscale
| Table |
Open Ports | logscale
| Table |
Top IP Destinations | logscale
| Table |
Potential Script Obfuscation |
Script content rated by Shanon entropy to look for randomness as a
proxy for obfuscation attempts.
logscale
| Table |
Unoriginal Filename | logscale
| Event List |
Required | Please specify the aid parameter in order to see results for the 'Open Ports' widget. | Note |