crowdstrike/fltr-core Dashboards
Detections - MITRE ATT&CK Evaluation
Audit - Falcon UI Logs
Widget | Description | Type |
---|---|---|
Top UserId -> OperationName | logscale
| Sankey |
Top Users and Operations | logscale
| Heat Map |
Top Operations | logscale
| Pie Chart |
Top OperationName -> ServiceName | logscale
| Sankey |
Top Services | logscale
| Pie Chart |
Top Users by Activity | logscale
| Pie Chart |
Audit Details | logscale
| Table |
User Activity | logscale
| Time Chart |
Detections - By AgentId
Widget | Description | Type |
---|---|---|
Detections by Tactic | logscale
| Pie Chart |
Detection Rate | logscale
| Time Chart |
Map: Severity -> Technique | logscale
| Sankey |
Detections by Severity | logscale
| Pie Chart |
Detections by Technique | logscale
| Bar Chart |
Detection by Attack | logscale
| Table |
Detection: Grandparent File -> Parent File | logscale
| Sankey |
Detection: Parent File -> File | logscale
| Sankey |
Map: Technique -> Tactic | logscale
| Sankey |
Detection Table |
Displays a summary of detected events based on Agent and Customer
ID by username, file path, file name, severity, tactic, technique,
etc then arranges them in table format.
logscale
| Table |
Detections by Host | logscale
| Table |
Detections by User | logscale
| Table |
Detections - By Alert Type
Widget | Description | Type |
---|---|---|
Detections by Tactic | logscale
| Pie Chart |
Detection Rate | logscale
| Time Chart |
Map: Severity -> Technique | logscale
| Sankey |
Detections by Severity | logscale
| Pie Chart |
Detections by Technique | logscale
| Bar Chart |
Detection by Attack | logscale
| Table |
Detection: Grandparent File -> Parent File | logscale
| Sankey |
Detection: Parent File -> File | logscale
| Sankey |
Map: Technique -> Tactic | logscale
| Sankey |
Detection Table |
Displays a summary of detected events based on Agent and Customer
ID by username, file path, file name, severity, tactic, technique,
etc then arranges them in table format.
logscale
| Table |
Detections by Host | logscale
| Table |
Detections by User | logscale
| Table |
Detections - Event Summary
Widget | Description | Type |
---|---|---|
Total Endpoints |
Unique Falcon Agent ID values with endpoint detections.
logscale
| Single Value |
Falcon Actions |
Number of preventions versus detections issued by Falcon. This
directly correlates with the configured prevention policy for the
target endpoint.
logscale
| Bar Chart |
Top Subnets with Endpoint Detections | logscale
| Table |
Top Users with Endpoint Detections | logscale
| Table |
Detections by Severity |
Detection count by maximum severity.
logscale
| Pie Chart |
Top Endpoint Detections by Severity Weight | logscale
| Table |
Top Machine Domains with Endpoint Detections | logscale
| Table |
Total Detections |
Total number of unique endpoint detections.
logscale
| Single Value |
Total Behaviors |
Total number of behaviors detected (note: a single detection can
contain multiple behaviors).
logscale
| Single Value |
Potential Preventions |
Actions Falcon would have blocked had the requisite prevention
policy setting been enabled.
logscale
| Single Value |
Falcon Action by Severity |
Falcon action taken by detection severity.
logscale
| Sankey |
Detections - File Vantage
Widget | Description | Type |
---|---|---|
File Integrity Alerts by User | logscale
| Bar Chart |
File Vantage Alerts | logscale
| Table |
File Vantage Alerts by Criticality | logscale
| Pie Chart |
File Integrity Alerts | logscale
| Time Chart |
File Integrity Alerts by Operation | logscale
| Bar Chart |
File Vantage Alerts by Platform |
Displays a list of file vantage alerts by platform.
logscale
| Pie Chart |
File Vantage Alerts by File Name | logscale
| Pie Chart |
File Integrity Alerts by Object | logscale
| Bar Chart |
Detections - MITRE ATT&CK Evaluation
Widget | Description | Type |
---|---|---|
Tactic by Time | logscale
| Heat Map |
Top 25 Endpoints by Tactic | logscale
| Table |
Tactic Distribution | logscale
| Pie Chart |
Technique Distribution |
Displays a list of events that summarize detection techniques by
user ID.
logscale
| Pie Chart |
Tactic to Technique - Weighted by Severity | logscale
| Sankey |
Top 25 Endpoints by Technique | logscale
| Table |
Heatmap by Tactic and Technique | logscale
| Heat Map |
Top 25 Triggering Files by Tactic and Technique | logscale
| Table |
Top 25 Tactic and Technique Combinations |
Displays a list of tactic and technique combinations and limits
them to the top 25 entries.
logscale
| Table |
Tactic and Technique - Stacked | logscale
| Bar Chart |
Health - Cloud Workload Protection
Widget | Description | Type |
---|---|---|
Pod Service Account Names | logscale
| Single Value |
Pod Detections by Name | logscale
| Pie Chart |
Pod Detections by Severity | logscale
| Pie Chart |
Pod Namespaces | logscale
| Single Value |
Sensor List | logscale
| Table |
Pod Detections | logscale
| Single Value |
Sensor Locations | logscale
| World Map |
Detection Events | logscale
| Table |
Linux Kernel Versions |
Displays a list of OS version information and Linux kernel
versions and sets the limit of entries to maximum.
logscale
| Bar Chart |
Total Pods | logscale
| Single Value |
Health - Inventory of Installed Software
Widget | Description | Type |
---|---|---|
Product Versions | logscale
| Pie Chart |
Product Names | logscale
| Bar Chart |
Software Inventory | logscale
| Table |
Software Companies |
Displays a list of software companies and application information.
logscale
| Bar Chart |
Health - Linux Sensors
Widget | Description | Type |
---|---|---|
Linux Sensor Status | logscale
| Pie Chart |
Pod Namespaces | logscale
| Single Value |
Sensor List | logscale
| Table |
Endpoints with Root Logons | logscale
| Table |
Linux Sensors in RFM | logscale
| Single Value |
Top 10 SSH Destinations |
Creates a table that details the top 10 SSH destinations by
country and city.
logscale
| Table |
Sensor Locations | logscale
| World Map |
Linux Kernel Versions |
Displays a list of OS version information and Linux kernel
versions and sets the limit of entries to maximum.
logscale
| Bar Chart |
Top 10 Listening Ports | logscale
| Table |
Total Pods | logscale
| Single Value |
Health - Monitor Deployment
Widget | Description | Type |
---|---|---|
Active Sensors | logscale
| World Map |
Number of Hosts | logscale
| Time Chart |
Hosts by Platform | logscale
| Pie Chart |
Hosts by Platform | logscale
| Table |
OS - Windows Account Discovery
Widget | Description | Type |
---|---|---|
Windows net Usage by Flag (Sankey) | logscale
| Sankey |
[T1087.002] Account Discovery - Domain Account | logscale
| Table |
Windows Net Flag Usage by Week | logscale
| Time Chart |
[T1087.001] Account Discovery - Local Account | logscale
| Table |
Windows net Usage by Flag | logscale
| Heat Map |
OS - Windows User Logon Activity
Widget | Description | Type |
---|---|---|
Avg Password Age | logscale
| Single Value |
Logon Trends by Logon Type | logscale
| Time Chart |
Logon Table | logscale
| Table |
Stale Passwords |
Passwords over 365 days old.
logscale
| Single Value |
RDP Connections by Destination IP |
Create a map of RDP connections of users based on their
destination IP address.
logscale
| World Map |
SID Collisions | logscale
| Single Value |
Endpoint Location by External IP | logscale
| World Map |
Search - Acquire Host Details
Widget | Description | Type |
---|---|---|
Firewall Rules Set | logscale
| Table |
Network Connection Destinations | logscale
| World Map |
Powershell Activities | logscale
| Table |
Cloud Instance Info | logscale
| Table |
Parent to Child Process | logscale
| Sankey |
Network Connections | logscale
| Table |
Command History | logscale
| Table |
Listening Ports | logscale
| Table |
Uniqe ASEP Values Updated | logscale
| Single Value |
Unique Browser-Injected Threads | logscale
| Single Value |
Top DNS Requests | logscale
| Table |
Falcon Links | logscale
| Table |
Scripts Written | logscale
| Table |
Manual Registry Additions |
Displays a list of manual registry additions and groups them by
user ID, file name, etc. then sorts them by time stamp and limits
to the first 1000 entries.
logscale
| Table |
Unique ASEP Keys Updated | logscale
| Single Value |
Host Info | logscale
| Table |
Java Injected Threads | logscale
| Single Value |
Files Written to Removable Media |
Displays files that have been written to a removable media source.
logscale
| Event List |
User Logons | logscale
| Table |
Schedule Tasks | logscale
| Table |
Network Connections Count | logscale
| Table |
Local and External IPs | logscale
| Table |
Detections | logscale
| Table |
Admin Tools | logscale
| Table |
Packed Executable Written | logscale
| Single Value |
BIOS Information |
Retrieves detailed BIOS information, then summarizes based on
computer name, system manufacturer, release date, BIOS version,
etc.
logscale
| Table |
Running Services (started during selected time range) | logscale
| Table |
Processes Executions | logscale
| Table |
Injected Threads From Unsigned Modules |
Displays a list of injected threads from unsigned modules.
logscale
| Single Value |
Unique Executables Written | logscale
| Single Value |
Executable Activities | logscale
| Table |
Detections Links | logscale
| Table |
Unique DLL Injections | logscale
| Single Value |
Rar / Zip File Written | logscale
| Table |
Host Information | logscale
| Table |
Search - By AgentId
Widget | Description | Type |
---|---|---|
Services Started | logscale
| Table |
Network Connection Destinations | logscale
| World Map |
Listening Ports | logscale
| Table |
Top DNS Requests | logscale
| Table |
Heatmap: Tactics and Techniques | logscale
| Heat Map |
Top DNS IOC Hits | logscale
| Table |
Detections: Map Tactic Technique | logscale
| Sankey |
User Logons | logscale
| Table |
Schedule Tasks | logscale
| Table |
Network Connections Count | logscale
| Table |
Detections | logscale
| Table |
Packed Executable Written | logscale
| Single Value |
Unique Executables Written | logscale
| Single Value |
Processes | logscale
| Table |
Host Information | logscale
| Table |
Workflow Note | - Dashboard does not return results by default. - You must input an aid into the parameter. - The default time range is 7 days. | Note |
Search - By DNS
Widget | Description | Type |
---|---|---|
Domain Lookup Summary | logscale
| Table |
Process and Domain Details | logscale
| Table |
Number of Hosts hitting the domain | logscale
| Single Value |
Domain Lookups by Host | logscale
| Bar Chart |
Total DnsRequest Events Over Time | logscale
| Time Chart |
Top DnsRequest Events by DomainName |
Displays a list of requested DNS events by domain name and limits
results to the first 10 entries.
logscale
| Time Chart |
Workflow Details | - DomainName is required as an input parameter. - DomainName should be lower-case. - Wildcards can be used for DomainName, e.g. *crowdstrike*. - aid and ComputerName can be used to further refine the results. | Note |
Search - By File Hash
Widget | Description | Type |
---|---|---|
File Execution Details (Specify FileName or SHA256) | logscale
| Table |
File Execution by Host | logscale
| Pie Chart |
File Written by Hosts | logscale
| Pie Chart |
File Written Details (Specify ComputerName) |
This widget only shows result if a ComputerName is specified)
logscale
| Table |
Written on Distinct Hosts | logscale
| Single Value |
Execution Activity | logscale
| Time Chart |
Execution History (Specify FileName or SHA256) | logscale
| Table |
Number of Hosts Executing File | logscale
| Single Value |
Unique Host Executions | logscale
| Time Chart |
Workflow Note | # Workflow Start by entering a file name or a SHA256 to see results for 'Execution History', File Execution Details', and 'File Written Details'. | Note |
Search - By IP Address
Widget | Description | Type |
---|---|---|
IP Location (GeoIP) | logscale
| World Map |
Process Executions | logscale
| Table |
Connection Count | logscale
| Table |
IP Address Details | logscale
| Table |
Top 10 Endpoints | logscale
| Table |
IP Connection History |
Displays a list of a user's IP connection history over time.
logscale
| Single Value |
Connection Count Over Time | logscale
| Time Chart |
Total Connections | logscale
| Single Value |
Search - By Process Context
Widget | Description | Type |
---|---|---|
Process - Network Events | logscale
| Table |
Context Events by Type | logscale
| Pie Chart |
Files Written |
Displays a list of files that have been written.
logscale
| Table |
Original Processes |
Displays a record of an original process from the command line,
with an accompanying file name.
logscale
| Table |
Files Deleted | logscale
| Table |
Destination IPs | logscale
| Pie Chart |
DNS Requests | logscale
| Table |
All Context Events | logscale
| Event List |
Image Hash Events | logscale
| Table |
Workflow Note | # Workflow Start by entering a filename. The aid is optional, but will constrain (and speed up) the search if you have it. If you find an interesting process copy the ProcessId and paste it in the parameter above to show the context events below. | Note |
Search - By UserName
Widget | Description | Type |
---|---|---|
Detection Events | logscale
| Table |
Failed Logon Events | logscale
| Table |
Top Events Over Time | logscale
| Time Chart |
Scheduled Task Events | logscale
| Table |
Distinct Event Types by Asset | logscale
| Table |
Successful Interactive Logon Events | logscale
| Table |
File Write Events | logscale
| Table |
Workflow | - Enter a value for the UserName input parameter. - The input is case-insensitive, e.g. USER will match both User and user in the results. | Note |
Search - Threat Hunting
Widget | Description | Type |
---|---|---|
Top Country Destinations | logscale
| Table |
Suspicious Leads | logscale
| Table |
High Entropy Domains |
Displays a list of high entropy domains using Akamai and limits
the results to the first 20 entries.
logscale
| Table |
Top IP Destinations | logscale
| Table |
Potential Script Obfuscation |
Script content rated by Shanon entropy to look for randomness as a
proxy for obfuscation attempts.
logscale
| Table |
zBeta - Identify Statistical Anomalies
Widget | Description | Type |
---|---|---|
Calculate Statistical Deviations | logscale
| Table |
Details | This dashboard is designed to calculate statistical anomalies based on standard deviations. The default window is 30 days with a 7-day rolling average. Default values are provided for the parameter inputs. You can change these as needed. The Event Name and Group By drop-down values are displayed based on frequency. It is recommended that you input your own values for the specific use case, e.g. UserLogonFailed2 for the Event Name and UserName for the Group By. | Note |
Instructions | These are the input values that can be modified: - AnomalyFactor: the number of standard deviations from the mean, e.g. 3. - EventSimpleName: the #event_simpleName value that the query should be applied to, e.g. UserLogonFailed2. - GroupByValue: the value the results should be grouped by, e.g. UserName. - RollingAverageDays: the number of days that should be used to calculate a rolling average window, e.g. 7d to compare each day to a 7-day rolling average. | Note |