Audit - Falcon UI Logs
WidgetDescriptionType
Top UserId -> OperationName

Hide Query

Show Query

Sankey
Top Users and Operations

Hide Query

Show Query

Heat Map
Top Operations

Hide Query

Show Query

Pie Chart
Top OperationName -> ServiceName

Hide Query

Show Query

Sankey
Top Services

Hide Query

Show Query

Pie Chart
Top Users by Activity

Hide Query

Show Query

Pie Chart
Audit Details

Hide Query

Show Query

Table
User Activity

Hide Query

Show Query

Time Chart
Detections - By AgentId
WidgetDescriptionType
Detections by Tactic

Hide Query

Show Query

Pie Chart
Detection Rate

Hide Query

Show Query

Time Chart
Map: Severity -> Technique

Hide Query

Show Query

Sankey
Detections by Severity

Hide Query

Show Query

Pie Chart
Detections by Technique

Hide Query

Show Query

Bar Chart
Detection by Attack

Hide Query

Show Query

Table
Detection: Grandparent File -> Parent File

Hide Query

Show Query

Sankey
Detection: Parent File -> File

Hide Query

Show Query

Sankey
Map: Technique -> Tactic

Hide Query

Show Query

Sankey
Detection Table Displays a summary of detected events based on Agent and Customer ID by username, file path, file name, severity, tactic, technique, etc then arranges them in table format.

Hide Query

Show Query

Table
Detections by Host

Hide Query

Show Query

Table
Detections by User

Hide Query

Show Query

Table
Detections - By Alert Type
WidgetDescriptionType
Detections by Tactic

Hide Query

Show Query

Pie Chart
Detection Rate

Hide Query

Show Query

Time Chart
Map: Severity -> Technique

Hide Query

Show Query

Sankey
Detections by Severity

Hide Query

Show Query

Pie Chart
Detections by Technique

Hide Query

Show Query

Bar Chart
Detection by Attack

Hide Query

Show Query

Table
Detection: Grandparent File -> Parent File

Hide Query

Show Query

Sankey
Detection: Parent File -> File

Hide Query

Show Query

Sankey
Map: Technique -> Tactic

Hide Query

Show Query

Sankey
Detection Table Displays a summary of detected events based on Agent and Customer ID by username, file path, file name, severity, tactic, technique, etc then arranges them in table format.

Hide Query

Show Query

Table
Detections by Host

Hide Query

Show Query

Table
Detections by User

Hide Query

Show Query

Table
Detections - Event Summary
WidgetDescriptionType
Total Endpoints Unique Falcon Agent ID values with endpoint detections.

Hide Query

Show Query

Single Value
Falcon Actions Number of preventions versus detections issued by Falcon. This directly correlates with the configured prevention policy for the target endpoint.

Hide Query

Show Query

Bar Chart
Top Subnets with Endpoint Detections

Hide Query

Show Query

Table
Top Users with Endpoint Detections

Hide Query

Show Query

Table
Detections by Severity Detection count by maximum severity.

Hide Query

Show Query

Pie Chart
Top Endpoint Detections by Severity Weight

Hide Query

Show Query

Table
Top Machine Domains with Endpoint Detections

Hide Query

Show Query

Table
Total Detections Total number of unique endpoint detections.

Hide Query

Show Query

Single Value
Total Behaviors Total number of behaviors detected (note: a single detection can contain multiple behaviors).

Hide Query

Show Query

Single Value
Potential Preventions Actions Falcon would have blocked had the requisite prevention policy setting been enabled.

Hide Query

Show Query

Single Value
Falcon Action by Severity Falcon action taken by detection severity.

Hide Query

Show Query

Sankey
Detections - File Vantage
WidgetDescriptionType
File Integrity Alerts by User

Hide Query

Show Query

Bar Chart
File Vantage Alerts

Hide Query

Show Query

Table
File Vantage Alerts by Criticality

Hide Query

Show Query

Pie Chart
File Integrity Alerts

Hide Query

Show Query

Time Chart
File Integrity Alerts by Operation

Hide Query

Show Query

Bar Chart
File Vantage Alerts by Platform Displays a list of file vantage alerts by platform.

Hide Query

Show Query

Pie Chart
File Vantage Alerts by File Name

Hide Query

Show Query

Pie Chart
File Integrity Alerts by Object

Hide Query

Show Query

Bar Chart
Detections - MITRE ATT&CK Evaluation
WidgetDescriptionType
Tactic by Time

Hide Query

Show Query

Heat Map
Top 25 Endpoints by Tactic

Hide Query

Show Query

Table
Tactic Distribution

Hide Query

Show Query

Pie Chart
Technique Distribution Displays a list of events that summarize detection techniques by user ID.

Hide Query

Show Query

Pie Chart
Tactic to Technique - Weighted by Severity

Hide Query

Show Query

Sankey
Top 25 Endpoints by Technique

Hide Query

Show Query

Table
Heatmap by Tactic and Technique

Hide Query

Show Query

Heat Map
Top 25 Triggering Files by Tactic and Technique

Hide Query

Show Query

Table
Top 25 Tactic and Technique Combinations Displays a list of tactic and technique combinations and limits them to the top 25 entries.

Hide Query

Show Query

Table
Tactic and Technique - Stacked

Hide Query

Show Query

Bar Chart
Health - Cloud Workload Protection
WidgetDescriptionType
Pod Service Account Names

Hide Query

Show Query

Single Value
Pod Detections by Name

Hide Query

Show Query

Pie Chart
Pod Detections by Severity

Hide Query

Show Query

Pie Chart
Pod Namespaces

Hide Query

Show Query

Single Value
Sensor List

Hide Query

Show Query

Table
Pod Detections

Hide Query

Show Query

Single Value
Sensor Locations

Hide Query

Show Query

World Map
Detection Events

Hide Query

Show Query

Table
Linux Kernel Versions Displays a list of OS version information and Linux kernel versions and sets the limit of entries to maximum.

Hide Query

Show Query

Bar Chart
Total Pods

Hide Query

Show Query

Single Value
Health - Inventory of Installed Software
WidgetDescriptionType
Product Versions

Hide Query

Show Query

Pie Chart
Product Names

Hide Query

Show Query

Bar Chart
Software Inventory

Hide Query

Show Query

Table
Software Companies Displays a list of software companies and application information.

Hide Query

Show Query

Bar Chart
Health - Linux Sensors
WidgetDescriptionType
Linux Sensor Status

Hide Query

Show Query

Pie Chart
Pod Namespaces

Hide Query

Show Query

Single Value
Sensor List

Hide Query

Show Query

Table
Endpoints with Root Logons

Hide Query

Show Query

Table
Linux Sensors in RFM

Hide Query

Show Query

Single Value
Top 10 SSH Destinations Creates a table that details the top 10 SSH destinations by country and city.

Hide Query

Show Query

Table
Sensor Locations

Hide Query

Show Query

World Map
Linux Kernel Versions Displays a list of OS version information and Linux kernel versions and sets the limit of entries to maximum.

Hide Query

Show Query

Bar Chart
Top 10 Listening Ports

Hide Query

Show Query

Table
Total Pods

Hide Query

Show Query

Single Value
Health - Monitor Deployment
WidgetDescriptionType
Active Sensors

Hide Query

Show Query

World Map
Number of Hosts

Hide Query

Show Query

Time Chart
Hosts by Platform

Hide Query

Show Query

Pie Chart
Hosts by Platform

Hide Query

Show Query

Table
OS - Windows Account Discovery
WidgetDescriptionType
Windows net Usage by Flag (Sankey)

Hide Query

Show Query

Sankey
[T1087.002] Account Discovery - Domain Account

Hide Query

Show Query

Table
Windows Net Flag Usage by Week

Hide Query

Show Query

Time Chart
[T1087.001] Account Discovery - Local Account

Hide Query

Show Query

Table
Windows net Usage by Flag

Hide Query

Show Query

Heat Map
OS - Windows User Logon Activity
WidgetDescriptionType
Avg Password Age

Hide Query

Show Query

Single Value
Logon Trends by Logon Type

Hide Query

Show Query

Time Chart
Logon Table

Hide Query

Show Query

Table
Stale Passwords Passwords over 365 days old.

Hide Query

Show Query

Single Value
RDP Connections by Destination IP Create a map of RDP connections of users based on their destination IP address.

Hide Query

Show Query

World Map
SID Collisions

Hide Query

Show Query

Single Value
Endpoint Location by External IP

Hide Query

Show Query

World Map
Search - Acquire Host Details
WidgetDescriptionType
Firewall Rules Set

Hide Query

Show Query

Table
Network Connection Destinations

Hide Query

Show Query

World Map
Powershell Activities

Hide Query

Show Query

Table
Cloud Instance Info

Hide Query

Show Query

Table
Parent to Child Process

Hide Query

Show Query

Sankey
Network Connections

Hide Query

Show Query

Table
Command History

Hide Query

Show Query

Table
Listening Ports

Hide Query

Show Query

Table
Uniqe ASEP Values Updated

Hide Query

Show Query

Single Value
Unique Browser-Injected Threads

Hide Query

Show Query

Single Value
Top DNS Requests

Hide Query

Show Query

Table
Falcon Links

Hide Query

Show Query

Table
Scripts Written

Hide Query

Show Query

Table
Manual Registry Additions Displays a list of manual registry additions and groups them by user ID, file name, etc. then sorts them by time stamp and limits to the first 1000 entries.

Hide Query

Show Query

Table
Unique ASEP Keys Updated

Hide Query

Show Query

Single Value
Host Info

Hide Query

Show Query

Table
Java Injected Threads

Hide Query

Show Query

Single Value
Files Written to Removable Media Displays files that have been written to a removable media source.

Hide Query

Show Query

Event List
User Logons

Hide Query

Show Query

Table
Schedule Tasks

Hide Query

Show Query

Table
Network Connections Count

Hide Query

Show Query

Table
Local and External IPs

Hide Query

Show Query

Table
Detections

Hide Query

Show Query

Table
Admin Tools

Hide Query

Show Query

Table
Packed Executable Written

Hide Query

Show Query

Single Value
BIOS Information Retrieves detailed BIOS information, then summarizes based on computer name, system manufacturer, release date, BIOS version, etc.

Hide Query

Show Query

Table
Running Services (started during selected time range)

Hide Query

Show Query

Table
Processes Executions

Hide Query

Show Query

Table
Injected Threads From Unsigned Modules Displays a list of injected threads from unsigned modules.

Hide Query

Show Query

Single Value
Unique Executables Written

Hide Query

Show Query

Single Value
Executable Activities

Hide Query

Show Query

Table
Detections Links

Hide Query

Show Query

Table
Unique DLL Injections

Hide Query

Show Query

Single Value
Rar / Zip File Written

Hide Query

Show Query

Table
Host Information

Hide Query

Show Query

Table
Search - By AgentId
WidgetDescriptionType
Services Started

Hide Query

Show Query

Table
Network Connection Destinations

Hide Query

Show Query

World Map
Listening Ports

Hide Query

Show Query

Table
Top DNS Requests

Hide Query

Show Query

Table
Heatmap: Tactics and Techniques

Hide Query

Show Query

Heat Map
Top DNS IOC Hits

Hide Query

Show Query

Table
Detections: Map Tactic Technique

Hide Query

Show Query

Sankey
User Logons

Hide Query

Show Query

Table
Schedule Tasks

Hide Query

Show Query

Table
Network Connections Count

Hide Query

Show Query

Table
Detections

Hide Query

Show Query

Table
Packed Executable Written

Hide Query

Show Query

Single Value
Unique Executables Written

Hide Query

Show Query

Single Value
Processes

Hide Query

Show Query

Table
Host Information

Hide Query

Show Query

Table
Workflow Note - Dashboard does not return results by default. - You must input an aid into the parameter. - The default time range is 7 days. Note
Search - By DNS
WidgetDescriptionType
Domain Lookup Summary

Hide Query

Show Query

Table
Process and Domain Details

Hide Query

Show Query

Table
Number of Hosts hitting the domain

Hide Query

Show Query

Single Value
Domain Lookups by Host

Hide Query

Show Query

Bar Chart
Total DnsRequest Events Over Time

Hide Query

Show Query

Time Chart
Top DnsRequest Events by DomainName Displays a list of requested DNS events by domain name and limits results to the first 10 entries.

Hide Query

Show Query

Time Chart
Workflow Details - DomainName is required as an input parameter. - DomainName should be lower-case. - Wildcards can be used for DomainName, e.g. *crowdstrike*. - aid and ComputerName can be used to further refine the results. Note
Search - By File Hash
WidgetDescriptionType
File Execution Details (Specify FileName or SHA256)

Hide Query

Show Query

Table
File Execution by Host

Hide Query

Show Query

Pie Chart
File Written by Hosts

Hide Query

Show Query

Pie Chart
File Written Details (Specify ComputerName) This widget only shows result if a ComputerName is specified)

Hide Query

Show Query

Table
Written on Distinct Hosts

Hide Query

Show Query

Single Value
Execution Activity

Hide Query

Show Query

Time Chart
Execution History (Specify FileName or SHA256)

Hide Query

Show Query

Table
Number of Hosts Executing File

Hide Query

Show Query

Single Value
Unique Host Executions

Hide Query

Show Query

Time Chart
Workflow Note # Workflow Start by entering a file name or a SHA256 to see results for 'Execution History', File Execution Details', and 'File Written Details'. Note
Search - By IP Address
WidgetDescriptionType
IP Location (GeoIP)

Hide Query

Show Query

World Map
Process Executions

Hide Query

Show Query

Table
Connection Count

Hide Query

Show Query

Table
IP Address Details

Hide Query

Show Query

Table
Top 10 Endpoints

Hide Query

Show Query

Table
IP Connection History Displays a list of a user's IP connection history over time.

Hide Query

Show Query

Single Value
Connection Count Over Time

Hide Query

Show Query

Time Chart
Total Connections

Hide Query

Show Query

Single Value
Search - By Process Context
WidgetDescriptionType
Process - Network Events

Hide Query

Show Query

Table
Context Events by Type

Hide Query

Show Query

Pie Chart
Files Written Displays a list of files that have been written.

Hide Query

Show Query

Table
Original Processes Displays a record of an original process from the command line, with an accompanying file name.

Hide Query

Show Query

Table
Files Deleted

Hide Query

Show Query

Table
Destination IPs

Hide Query

Show Query

Pie Chart
DNS Requests

Hide Query

Show Query

Table
All Context Events

Hide Query

Show Query

Event List
Image Hash Events

Hide Query

Show Query

Table
Workflow Note # Workflow Start by entering a filename. The aid is optional, but will constrain (and speed up) the search if you have it. If you find an interesting process copy the ProcessId and paste it in the parameter above to show the context events below. Note
Search - By UserName
WidgetDescriptionType
Detection Events

Hide Query

Show Query

Table
Failed Logon Events

Hide Query

Show Query

Table
Top Events Over Time

Hide Query

Show Query

Time Chart
Scheduled Task Events

Hide Query

Show Query

Table
Distinct Event Types by Asset

Hide Query

Show Query

Table
Successful Interactive Logon Events

Hide Query

Show Query

Table
File Write Events

Hide Query

Show Query

Table
Workflow - Enter a value for the UserName input parameter. - The input is case-insensitive, e.g. USER will match both User and user in the results. Note
Search - Threat Hunting
WidgetDescriptionType
Top Country Destinations

Hide Query

Show Query

Table
Suspicious Leads

Hide Query

Show Query

Table
High Entropy Domains Displays a list of high entropy domains using Akamai and limits the results to the first 20 entries.

Hide Query

Show Query

Table
Top IP Destinations

Hide Query

Show Query

Table
Potential Script Obfuscation Script content rated by Shanon entropy to look for randomness as a proxy for obfuscation attempts.

Hide Query

Show Query

Table
zBeta - Identify Statistical Anomalies
WidgetDescriptionType
Calculate Statistical Deviations

Hide Query

Show Query

Table
Details This dashboard is designed to calculate statistical anomalies based on standard deviations. The default window is 30 days with a 7-day rolling average. Default values are provided for the parameter inputs. You can change these as needed. The Event Name and Group By drop-down values are displayed based on frequency. It is recommended that you input your own values for the specific use case, e.g. UserLogonFailed2 for the Event Name and UserName for the Group By. Note
Instructions These are the input values that can be modified: - AnomalyFactor: the number of standard deviations from the mean, e.g. 3. - EventSimpleName: the #event_simpleName value that the query should be applied to, e.g. UserLogonFailed2. - GroupByValue: the value the results should be grouped by, e.g. UserName. - RollingAverageDays: the number of days that should be used to calculate a rolling average window, e.g. 7d to compare each day to a 7-day rolling average. Note