Audit - Falcon UI Logs
WidgetDescriptionType
Top UserId -> OperationName

Hide Query

Show Query

Sankey
Top Users and Operations

Hide Query

Show Query

Heat Map
Top Operations

Hide Query

Show Query

Pie Chart
Top OperationName -> ServiceName

Hide Query

Show Query

Sankey
Top Services

Hide Query

Show Query

Pie Chart
Top Users by Activity

Hide Query

Show Query

Pie Chart
Audit Details

Hide Query

Show Query

Table
User Activity

Hide Query

Show Query

Time Chart
Detections - By AgentId
WidgetDescriptionType
Detections by Tactic

Hide Query

Show Query

Pie Chart
Detection Rate

Hide Query

Show Query

Time Chart
Map: Severity -> Technique

Hide Query

Show Query

Sankey
Detections by Severity

Hide Query

Show Query

Pie Chart
Detections by Technique

Hide Query

Show Query

Bar Chart
Detection by Attack

Hide Query

Show Query

Table
Detection: Grandparent File -> Parent File

Hide Query

Show Query

Sankey
Detection: Parent File -> File

Hide Query

Show Query

Sankey
Map: Technique -> Tactic

Hide Query

Show Query

Sankey
Detection Table

Hide Query

Show Query

Table
Detections by Host

Hide Query

Show Query

Table
Detections by User

Hide Query

Show Query

Table
Detections - By Alert Type
WidgetDescriptionType
Detections by Tactic

Hide Query

Show Query

Pie Chart
Detection Rate

Hide Query

Show Query

Time Chart
Map: Severity -> Technique

Hide Query

Show Query

Sankey
Detections by Severity

Hide Query

Show Query

Pie Chart
Detections by Technique

Hide Query

Show Query

Bar Chart
Detection by Attack

Hide Query

Show Query

Table
Detection: Grandparent File -> Parent File

Hide Query

Show Query

Sankey
Detection: Parent File -> File

Hide Query

Show Query

Sankey
Map: Technique -> Tactic

Hide Query

Show Query

Sankey
Detection Table

Hide Query

Show Query

Table
Detections by Host

Hide Query

Show Query

Table
Detections by User

Hide Query

Show Query

Table
Detections - Event Summary
WidgetDescriptionType
Total Endpoints Unique Falcon Agent ID values with endpoint detections.

Hide Query

Show Query

Single Value
Falcon Actions Number of preventions versus detections issued by Falcon. This directly correlates with the configured prevention policy for the target endpoint.

Hide Query

Show Query

Bar Chart
Top Subnets with Endpoint Detections

Hide Query

Show Query

Table
Top Users with Endpoint Detections

Hide Query

Show Query

Table
Detections by Severity Detection count by maximum severity.

Hide Query

Show Query

Pie Chart
Top Endpoint Detections by Severity Weight

Hide Query

Show Query

Table
Top Machine Domains with Endpoint Detections

Hide Query

Show Query

Table
Total Detections Total number of unique endpoint detections.

Hide Query

Show Query

Single Value
Total Behaviors Total number of behaviors detected (note: a single detection can contain multiple behaviors).

Hide Query

Show Query

Single Value
Potential Preventions Actions Falcon would have blocked had the requisite prevention policy setting been enabled.

Hide Query

Show Query

Single Value
Falcon Action by Severity Falcon action taken by detection severity.

Hide Query

Show Query

Sankey
Detections - File Vantage
WidgetDescriptionType
File Integrity Alerts by User

Hide Query

Show Query

Bar Chart
File Vantage Alerts

Hide Query

Show Query

Table
File Vantage Alerts by Criticality

Hide Query

Show Query

Pie Chart
File Integrity Alerts

Hide Query

Show Query

Time Chart
File Integrity Alerts by Operation

Hide Query

Show Query

Bar Chart
File Vantage Alerts by Platform

Hide Query

Show Query

Pie Chart
File Vantage Alerts by File Name

Hide Query

Show Query

Pie Chart
File Integrity Alerts by Object

Hide Query

Show Query

Bar Chart
Detections - MITRE ATT&CK Evaluation
WidgetDescriptionType
Tactic by Time

Hide Query

Show Query

Heat Map
Top 25 Endpoints by Tactic

Hide Query

Show Query

Table
Tactic Distribution

Hide Query

Show Query

Pie Chart
Technique Distribution

Hide Query

Show Query

Pie Chart
Tactic to Technique - Weighted by Severity

Hide Query

Show Query

Sankey
Top 25 Endpoints by Technique

Hide Query

Show Query

Table
Heatmap by Tactic and Technique

Hide Query

Show Query

Heat Map
Top 25 Triggering Files by Tactic and Technique

Hide Query

Show Query

Table
Top 25 Tactic and Technique Combinations

Hide Query

Show Query

Table
Tactic and Technique - Stacked

Hide Query

Show Query

Bar Chart
Health - Cloud Workload Protection
WidgetDescriptionType
Pod Service Account Names

Hide Query

Show Query

Single Value
Pod Detections by Name

Hide Query

Show Query

Pie Chart
Pod Detections by Severity

Hide Query

Show Query

Pie Chart
Pod Namespaces

Hide Query

Show Query

Single Value
Sensor List

Hide Query

Show Query

Table
Pod Detections

Hide Query

Show Query

Single Value
Sensor Locations

Hide Query

Show Query

World Map
Detection Events

Hide Query

Show Query

Table
Linux Kernel Versions

Hide Query

Show Query

Bar Chart
Total Pods

Hide Query

Show Query

Single Value
Health - Inventory of Installed Software
WidgetDescriptionType
Product Versions

Hide Query

Show Query

Pie Chart
Product Names

Hide Query

Show Query

Bar Chart
Software Inventory

Hide Query

Show Query

Table
Software Companies

Hide Query

Show Query

Bar Chart
Health - Linux Sensors
WidgetDescriptionType
Linux Sensor Status

Hide Query

Show Query

Pie Chart
Pod Namespaces

Hide Query

Show Query

Single Value
Sensor List

Hide Query

Show Query

Table
Endpoints with Root Logons

Hide Query

Show Query

Table
Linux Sensors in RFM

Hide Query

Show Query

Single Value
Top 10 SSH Destinations

Hide Query

Show Query

Table
Sensor Locations

Hide Query

Show Query

World Map
Linux Kernel Versions

Hide Query

Show Query

Bar Chart
Top 10 Listening Ports

Hide Query

Show Query

Table
Total Pods

Hide Query

Show Query

Single Value
Health - Monitor Deployment
WidgetDescriptionType
Active Sensors

Hide Query

Show Query

World Map
Number of Hosts

Hide Query

Show Query

Time Chart
Hosts by Platform

Hide Query

Show Query

Pie Chart
Hosts by Platform

Hide Query

Show Query

Table
OS - Windows Account Discovery
WidgetDescriptionType
Windows net Usage by Flag (Sankey)

Hide Query

Show Query

Sankey
[T1087.002] Account Discovery - Domain Account

Hide Query

Show Query

Table
Windows Net Flag Usage by Week

Hide Query

Show Query

Time Chart
[T1087.001] Account Discovery - Local Account

Hide Query

Show Query

Table
Windows net Usage by Flag

Hide Query

Show Query

Heat Map
OS - Windows User Logon Activity
WidgetDescriptionType
Avg Password Age

Hide Query

Show Query

Single Value
Logon Trends by Logon Type

Hide Query

Show Query

Time Chart
Logon Table

Hide Query

Show Query

Table
Stale Passwords Passwords over 365 days old.

Hide Query

Show Query

Single Value
RDP Connections by Destination IP

Hide Query

Show Query

World Map
SID Collisions

Hide Query

Show Query

Single Value
Endpoint Location by External IP

Hide Query

Show Query

World Map
Search - Acquire Host Details
WidgetDescriptionType
Firewall Rules Set

Hide Query

Show Query

Table
Network Connection Destinations

Hide Query

Show Query

World Map
Powershell Activities

Hide Query

Show Query

Table
Cloud Instance Info

Hide Query

Show Query

Table
Parent to Child Process

Hide Query

Show Query

Sankey
Network Connections

Hide Query

Show Query

Table
Command History

Hide Query

Show Query

Table
Listening Ports

Hide Query

Show Query

Table
Uniqe ASEP Values Updated

Hide Query

Show Query

Single Value
Unique Browser-Injected Threads

Hide Query

Show Query

Single Value
Top DNS Requests

Hide Query

Show Query

Table
Falcon Links

Hide Query

Show Query

Table
Scripts Written

Hide Query

Show Query

Table
Manual Registry Additions

Hide Query

Show Query

Table
Unique ASEP Keys Updated

Hide Query

Show Query

Single Value
Host Info

Hide Query

Show Query

Table
Java Injected Threads

Hide Query

Show Query

Single Value
Files Written to Removable Media

Hide Query

Show Query

Event List
User Logons

Hide Query

Show Query

Table
Schedule Tasks

Hide Query

Show Query

Table
Network Connections Count

Hide Query

Show Query

Table
Local and External IPs

Hide Query

Show Query

Table
Detections

Hide Query

Show Query

Table
Admin Tools

Hide Query

Show Query

Table
Packed Executable Written

Hide Query

Show Query

Single Value
BIOS Information

Hide Query

Show Query

Table
Running Services (started during selected time range)

Hide Query

Show Query

Table
Processes Executions

Hide Query

Show Query

Table
Injected Threads From Unsigned Modules

Hide Query

Show Query

Single Value
Unique Executables Written

Hide Query

Show Query

Single Value
Executable Activities

Hide Query

Show Query

Table
Detections Links

Hide Query

Show Query

Table
Unique DLL Injections

Hide Query

Show Query

Single Value
Rar / Zip File Written

Hide Query

Show Query

Table
Host Information

Hide Query

Show Query

Table
Search - By AgentId
WidgetDescriptionType
Services Started

Hide Query

Show Query

Table
Network Connection Destinations

Hide Query

Show Query

World Map
Listening Ports

Hide Query

Show Query

Table
Top DNS Requests

Hide Query

Show Query

Table
Heatmap: Tactics and Techniques

Hide Query

Show Query

Heat Map
Top DNS IOC Hits

Hide Query

Show Query

Table
Detections: Map Tactic Technique

Hide Query

Show Query

Sankey
User Logons

Hide Query

Show Query

Table
Schedule Tasks

Hide Query

Show Query

Table
Network Connections Count

Hide Query

Show Query

Table
Detections

Hide Query

Show Query

Table
Packed Executable Written

Hide Query

Show Query

Single Value
Unique Executables Written

Hide Query

Show Query

Single Value
Processes

Hide Query

Show Query

Table
Host Information

Hide Query

Show Query

Table
Workflow Note - Dashboard does not return results by default. - You must input an aid into the parameter. - The default time range is 7 days. Note
Search - By DNS
WidgetDescriptionType
Domain Lookup Summary

Hide Query

Show Query

Table
Process and Domain Details

Hide Query

Show Query

Table
Number of Hosts hitting the domain

Hide Query

Show Query

Single Value
Domain Lookups by Host

Hide Query

Show Query

Bar Chart
Total DnsRequest Events Over Time

Hide Query

Show Query

Time Chart
Top DnsRequest Events by DomainName

Hide Query

Show Query

Time Chart
Workflow Details - DomainName is required as an input parameter. - DomainName should be lower-case. - Wildcards can be used for DomainName, e.g. *crowdstrike*. - aid and ComputerName can be used to further refine the results. Note
Search - By File Hash
WidgetDescriptionType
File Execution Details (Specify FileName or SHA256)

Hide Query

Show Query

Table
File Execution by Host

Hide Query

Show Query

Pie Chart
File Written by Hosts

Hide Query

Show Query

Pie Chart
File Written Details (Specify ComputerName) This widget only shows result if a ComputerName is specified)

Hide Query

Show Query

Table
Written on Distinct Hosts

Hide Query

Show Query

Single Value
Execution Activity

Hide Query

Show Query

Time Chart
Execution History (Specify FileName or SHA256)

Hide Query

Show Query

Table
Number of Hosts Executing File

Hide Query

Show Query

Single Value
Unique Host Executions

Hide Query

Show Query

Time Chart
Workflow Note # Workflow Start by entering a file name or a SHA256 to see results for 'Execution History', File Execution Details', and 'File Written Details'. Note
Search - By IP Address
WidgetDescriptionType
IP Location (GeoIP)

Hide Query

Show Query

World Map
Process Executions

Hide Query

Show Query

Table
Connection Count

Hide Query

Show Query

Table
IP Address Details

Hide Query

Show Query

Table
Top 10 Endpoints

Hide Query

Show Query

Table
IP Connection History

Hide Query

Show Query

Single Value
Connection Count Over Time

Hide Query

Show Query

Time Chart
Total Connections

Hide Query

Show Query

Single Value
Search - By Process Context
WidgetDescriptionType
Process - Network Events

Hide Query

Show Query

Table
Context Events by Type

Hide Query

Show Query

Pie Chart
Files Written

Hide Query

Show Query

Table
Original Processes

Hide Query

Show Query

Table
Files Deleted

Hide Query

Show Query

Table
Destination IPs

Hide Query

Show Query

Pie Chart
DNS Requests

Hide Query

Show Query

Table
All Context Events

Hide Query

Show Query

Event List
Image Hash Events

Hide Query

Show Query

Table
Workflow Note # Workflow Start by entering a filename. The aid is optional, but will constrain (and speed up) the search if you have it. If you find an interesting process copy the ProcessId and paste it in the parameter above to show the context events below. Note
Search - By UserName
WidgetDescriptionType
Detection Events

Hide Query

Show Query

Table
Failed Logon Events

Hide Query

Show Query

Table
Top Events Over Time

Hide Query

Show Query

Time Chart
Scheduled Task Events

Hide Query

Show Query

Table
Distinct Event Types by Asset

Hide Query

Show Query

Table
Successful Interactive Logon Events

Hide Query

Show Query

Table
File Write Events

Hide Query

Show Query

Table
Workflow - Enter a value for the UserName input parameter. - The input is case-insensitive, e.g. USER will match both User and user in the results. Note
Search - Threat Hunting
WidgetDescriptionType
Top Country Destinations

Hide Query

Show Query

Table
Suspicious Leads

Hide Query

Show Query

Table
High Entropy Domains

Hide Query

Show Query

Table
Top IP Destinations

Hide Query

Show Query

Table
Potential Script Obfuscation Script content rated by Shanon entropy to look for randomness as a proxy for obfuscation attempts.

Hide Query

Show Query

Table
zBeta - Identify Statistical Anomalies
WidgetDescriptionType
Calculate Statistical Deviations

Hide Query

Show Query

Table
Details This dashboard is designed to calculate statistical anomalies based on standard deviations. The default window is 30 days with a 7-day rolling average. Default values are provided for the parameter inputs. You can change these as needed. The Event Name and Group By drop-down values are displayed based on frequency. It is recommended that you input your own values for the specific use case, e.g. UserLogonFailed2 for the Event Name and UserName for the Group By. Note
Instructions These are the input values that can be modified: - AnomalyFactor: the number of standard deviations from the mean, e.g. 3. - EventSimpleName: the #event_simpleName value that the query should be applied to, e.g. UserLogonFailed2. - GroupByValue: the value the results should be grouped by, e.g. UserName. - RollingAverageDays: the number of days that should be used to calculate a rolling average window, e.g. 7d to compare each day to a 7-day rolling average. Note