crowdstrike/fltr-core Dashboards
Detections - MITRE ATT&CK Evaluation
Audit - Falcon UI Logs
Widget | Description | Type |
---|---|---|
Displays a list of user IDs and an audit of their activity by
operation name.
logscale
| Sankey | |
Displays a heat map of top users and their operations and
timestamp using IP locations data.
logscale
| Heat Map | |
Displays a pie chart of the top 5 operations and their IP
location.
logscale
| Pie Chart | |
Displays a flowchart of the top operation names to their
respective service name.
logscale
| Sankey | |
Displays a pie chart of the top 5 event services and associated
data.
logscale
| Pie Chart | |
Displays a pie chart of the top 5 users by activity.
logscale
| Pie Chart | |
Displays a table of audit events and their details.
logscale
| Table | |
Displays a chart of user activity and associated data by user ID
then limits results to the first 10 entries.
logscale
| Time Chart |
Detections - By AgentId
Widget | Description | Type |
---|---|---|
Displays a pie chart of event detections.
logscale
| Pie Chart | |
Displays a chart of events and their detection rate over a one
hour timespan.
logscale
| Time Chart | |
Displays a flow chart of a system's events, and their severity and
technique.
logscale
| Sankey | |
Displays a pie chart of detections by severity.
logscale
| Pie Chart | |
Displays a chart of API event detections by technique, organized
by computer name, agent ID, and customer ID.
logscale
| Bar Chart | |
Displays a table of detections by attack.
logscale
| Table | |
Displays a flowchart of event detection parent and grandparent
files by file name.
logscale
| Sankey | |
Displays a flowchart of detections by parent file and file.
logscale
| Sankey | |
Displays a flow diagram of technique and tactic data.
logscale
| Sankey | |
Displays a summary of detected events based on Agent and Customer
ID by username, file path, file name, severity, tactic, technique,
etc then arranges them in table format.
logscale
| Table | |
Displays a table of external API event detections by host.
logscale
| Table | |
Displays a table of event detections by user.
logscale
| Table |
Detections - By Alert Type
Widget | Description | Type |
---|---|---|
Displays a pie chart of event detections.
logscale
| Pie Chart | |
Displays a chart of events and their detection rate over a one
hour timespan.
logscale
| Time Chart | |
Displays a flow chart of a system's events, and their severity and
technique.
logscale
| Sankey | |
Displays a pie chart of detections by severity.
logscale
| Pie Chart | |
Displays a chart of API event detections by technique, organized
by computer name, agent ID, and customer ID.
logscale
| Bar Chart | |
Displays a table of detections by attack.
logscale
| Table | |
Displays a flowchart of event detection parent and grandparent
files by file name.
logscale
| Sankey | |
Displays a flowchart of detections by parent file and file.
logscale
| Sankey | |
Displays a flow diagram of technique and tactic data.
logscale
| Sankey | |
Displays a summary of detected events based on Agent and Customer
ID by username, file path, file name, severity, tactic, technique,
etc then arranges them in table format.
logscale
| Table | |
Displays a table of external API event detections by host.
logscale
| Table | |
Displays a table of event detections by user.
logscale
| Table |
Detections - Event Summary
Widget | Description | Type |
---|---|---|
Unique Falcon Agent ID values with endpoint detections.
logscale
| Single Value | |
Number of preventions versus detections issued by Falcon. This
directly correlates with the configured prevention policy for the
target endpoint.
logscale
| Bar Chart | |
Displays a table of top subnets and their associated endpoint
detections then limits results to the first 100 entries.
logscale
| Table | |
Displays a table of top users with endpoint detections by username
and severity in descending order, then limits the results to the
first 100 entries.
logscale
| Table | |
Detection count by maximum severity.
logscale
| Pie Chart | |
Displays a table of API endpoint security detections by severity
weight and limits results to the first 100 entries.
logscale
| Table | |
Displays a table of top machine domains with endpoint detections
and limits results to the first 100 entries.
logscale
| Table | |
Total number of unique endpoint detections.
logscale
| Single Value | |
Total number of behaviors detected (note: a single detection can
contain multiple behaviors).
logscale
| Single Value | |
Actions Falcon would have blocked had the requisite prevention
policy setting been enabled.
logscale
| Single Value | |
Falcon action taken by detection severity.
logscale
| Sankey |
Detections - File Vantage
Widget | Description | Type |
---|---|---|
Displays a chart of file integrity alerts by user.
logscale
| Bar Chart | |
Displays a table of file vantage alerts and associated data.
logscale
| Table | |
Displays a list of File Vantage alerts by criticality (Low,
Medium, High, and Critical).
logscale
| Pie Chart | |
Displays a chart of file integrity alerts in a 1 hour timespan.
logscale
| Time Chart | |
Displays a list of file integrity alerts by operation, including
create, write, delete, set, and rename.
logscale
| Bar Chart | |
Displays a list of file vantage alerts by platform.
logscale
| Pie Chart | |
Displays a pie chart of file vantage alerts by file name.
logscale
| Pie Chart | |
Displays a list of file integrity alerts by object, including,
'file', 'folder', 'value', and 'key'.
logscale
| Bar Chart |
Detections - MITRE ATT&CK Evaluation
Widget | Description | Type |
---|---|---|
Displays a list of external API events and detection tactics over
time and organized by agent ID.
logscale
| Heat Map | |
Displays a table of the top 25 endpoints by tactic.
logscale
| Table | |
Displays a pie chart of tactic distribution.
logscale
| Pie Chart | |
Displays a list of events that summarize detection techniques by
user ID.
logscale
| Pie Chart | |
Displays a flow chart of event tactics and their associated
technique, weighted by severity.
logscale
| Sankey | |
Displays a table of the top 25 API endpoints by technique and
limits the results to the first 25 entries.
logscale
| Table | |
Displays a heat map by severity of tactic and technique data .
logscale
| Heat Map | |
Displays a table of the top 25 triggering files by tactic and
technique and limits results to the first 25 entries.
logscale
| Table | |
Displays a list of tactic and technique combinations and limits
them to the top 25 entries.
logscale
| Table | |
Displays a bar chart of external events and their tactic and
technique data.
logscale
| Bar Chart |
Health - Cloud Workload Protection
Widget | Description | Type |
---|---|---|
Displays a table of pod service account names.
logscale
| Single Value | |
Displays a pie chart of Kubernetes pod detections by name.
logscale
| Pie Chart | |
Displays a pie chart of Kubernetes pod detections by severity.
logscale
| Pie Chart | |
Displays a list of pod namespaces.
logscale
| Single Value | |
Displays a table of sensors and limits results to the first 20,000
entries.
logscale
| Table | |
Displays a list of events in a user's Kubernetes pod.
logscale
| Single Value | |
Displays a world map of sensor locations using pod information.
logscale
| World Map | |
Displays a table of Kubernetes detection events with severity data
and detection names then limits results to the first 1000 entries.
logscale
| Table | |
Displays a list of OS version information and Linux kernel
versions and sets the limit of entries to maximum.
logscale
| Bar Chart | |
Displays the total number of pods.
logscale
| Single Value |
Health - Inventory of Installed Software
Widget | Description | Type |
---|---|---|
Displays a pie chart of product versions.
logscale
| Pie Chart | |
Displays a chart of an application's associated product and
company names.
logscale
| Bar Chart | |
Displays a table of software inventory and associated data
(company name, product name, file version) in descending order.
logscale
| Table | |
Displays a list of software companies and application information.
logscale
| Bar Chart |
Health - Linux Sensors
Widget | Description | Type |
---|---|---|
Displays a pie chart of Linux sensor status by category including
'user mode', 'kernel mode', and 'RFM'.
logscale
| Pie Chart | |
Displays a list of pod namespaces.
logscale
| Single Value | |
Displays a table of sensors and limits results to the first 20,000
entries.
logscale
| Table | |
Displays a table of endpoints with root logons then limits results
to the first 1000 entries.
logscale
| Table | |
Displays a list of Linux sensors in RFM.
logscale
| Single Value | |
Creates a table that details the top 10 SSH destinations by
country and city.
logscale
| Table | |
Displays a world map of sensor locations using pod information.
logscale
| World Map | |
Displays a list of OS version information and Linux kernel
versions and sets the limit of entries to maximum.
logscale
| Bar Chart | |
Displays a list of the top 10 listening ports in ascending order.
logscale
| Table | |
Displays the total number of pods.
logscale
| Single Value |
Health - Monitor Deployment
Widget | Description | Type |
---|---|---|
Displays a list of active sensors on a world map.
logscale
| World Map | |
Displays a chart of the number of hosts online in a 6 hour
timespan.
logscale
| Time Chart | |
Displays a pie chart of hosts by platform.
logscale
| Pie Chart | |
Displays a table of hosts by platform.
logscale
| Table |
OS - Windows Account Discovery
Widget | Description | Type |
---|---|---|
Displays a flowchart of Windows net usage by flag.
logscale
| Sankey | |
Displays a table of account discovery - domain account instances
and associated data.
logscale
| Table | |
Displays a chart of Windows net flag usage by week.
logscale
| Time Chart | |
Displays a table of local accounts using account discovery
sub-technique T1087.001 and associated data.
logscale
| Table | |
Displays a heat map of Windows net usage by flag.
logscale
| Heat Map |
OS - Windows User Logon Activity
Widget | Description | Type |
---|---|---|
Displays the average password age of a user in days.
logscale
| Single Value | |
Displays a chart of logon trends by logon type.
logscale
| Time Chart | |
Displays a table of logons by user ID and age of password.
logscale
| Table | |
Passwords over 365 days old.
logscale
| Single Value | |
Create a map of RDP connections of users based on their
destination IP address.
logscale
| World Map | |
Displays a list of SID collisions by user ID and limits results to
the first 1000 entries.
logscale
| Single Value | |
Displays a world map of endpoint locations by external IP.
logscale
| World Map |
Search - Acquire Host Details
Widget | Description | Type |
---|---|---|
Displays a table of set firewall rules and associated data (name,
protocol, computer name, app name, direction, profile, etc.)
logscale
| Table | |
Displays a world map of network connection destinations by IP
address.
logscale
| World Map | |
Displays a table of PowerShell activities and their associated
data, then limits results to the first 1000 entries.
logscale
| Table | |
Displays a table of cloud instance information then limits results
to the first 1000 entries.
logscale
| Table | |
Displays a flow chart of the parent file to child file process.
logscale
| Sankey | |
Displays a table of network connections and their details,
including timestamp, IP address, port data, etc. and limits
results to the first 1000 entries.
logscale
| Table | |
Displays a table of a user's command history then limits the
results to the first 1000 entries.
logscale
| Table | |
Displays a table of ports that are listening and associated data,
then limits results to the first 200 entries.
logscale
| Table | |
Displays a list of unique ASEP values that have been updated.
logscale
| Single Value | |
Displays the number of unique browser-injected threads by computer
name.
logscale
| Single Value | |
Displays a list of top DNS requests by domain name.
logscale
| Table | |
Displays a table of real time response data including user search,
zero trust assessment data, etc. then limits the results to the
first 10 entries.
logscale
| Table | |
Displays a table of scripts written and limits results to the
first 1000 entries.
logscale
| Table | |
Displays a list of manual registry additions and groups them by
user ID, file name, etc. then sorts them by time stamp and limits
to the first 1000 entries.
logscale
| Table | |
Displays a list of ASEP keys that have been updated.
logscale
| Single Value | |
Displays a table of host information including city, country,
product type, version, etc.
logscale
| Table | |
Displays a list of Java injected threads.
logscale
| Single Value | |
Displays files that have been written to a removable media source.
logscale
| Event List | |
Displays a table of user logons by type with additional data, then
limits results to the first 200 entries.
logscale
| Table | |
Displays a table of scheduled tasks with associated data
(username, task name, command data, and arguments).
logscale
| Table | |
Displays a list of IP4 network connections.
logscale
| Table | |
Displays a table of local and external IP addresses and limits
results to the first 100 entries.
logscale
| Table | |
Displays a list of API event detections.
logscale
| Table | |
Displays a table of admin tools associated with an event and
related data, then limits results to the first 1000 entries.
logscale
| Table | |
Displays a list of packed executables that have been written.
logscale
| Single Value | |
Retrieves detailed BIOS information, then summarizes based on
computer name, system manufacturer, release date, BIOS version,
etc.
logscale
| Table | |
Displays a table of services that started running during a
selected time range, then limits results to the first 1000
entries.
logscale
| Table | |
Displays a list of events and the processes executed.
logscale
| Table | |
Displays a list of injected threads from unsigned modules.
logscale
| Single Value | |
Displays a list of unique executables written using SHA256 hash
data.
logscale
| Single Value | |
Displays a table of executable activities (deleted, renamed,
added) and limits results to the first 1000 entries.
logscale
| Table | |
Displays a table of detection links and additional relevant data,
then limits results to the first 1000 entries.
logscale
| Table | |
Displays a list of unique DLL injections.
logscale
| Single Value | |
Displays a table of RAR/zip files written and associated data then
limits results to the first 1000 entries.
logscale
| Table | |
Displays a table of host information, including computername,
agentversion, etc.)
logscale
| Table |
Search - By AgentId
Widget | Description | Type |
---|---|---|
Displays a table of services started on Windows platform and
limits results to the first 200 entries.
logscale
| Table | |
Displays a world map of network connection destinations by IP
address.
logscale
| World Map | |
Displays a table of ports that are listening and associated data,
then limits results to the first 200 entries.
logscale
| Table | |
Displays a list of top DNS requests by domain name.
logscale
| Table | |
Displays a heat map of tactics and techniques used in detected
events.
logscale
| Heat Map | |
Displays a table of top DNS IOC hits by domain name.
logscale
| Table | |
Displays a flow chart of detections by tactic and technique.
logscale
| Sankey | |
Displays a table of user logons by type with additional data, then
limits results to the first 200 entries.
logscale
| Table | |
Displays a table of scheduled tasks with associated data
(username, task name, command data, and arguments).
logscale
| Table | |
Displays a list of IP4 network connections.
logscale
| Table | |
Displays a list of API event detections.
logscale
| Table | |
Displays a list of packed executables that have been written.
logscale
| Single Value | |
Displays a list of unique executables written using SHA256 hash
data.
logscale
| Single Value | |
Displays a table of processes by file name and limits results to
the first 200 entries.
logscale
| Table | |
Displays a table of host information, including computername,
agentversion, etc.)
logscale
| Table | |
Dashboard does not return results by default. You must input an
aid into the parameter. The
default time range is 7 days.
| Note |
Search - By DNS
Widget | Description | Type |
---|---|---|
Displays a domain lookup summary with associated data sorted by
number of hosts, then limits the results to the first 200 entries.
logscale
| Table | |
Displays a table of specific processes and their domain details
from a specific agent ID or ComputerName.
logscale
| Table | |
Displays a list of the number of distinct hosts hitting the
domain. Query results will only be provided if ?DomainName is
specified.
logscale
| Single Value | |
Displays a list of distinct hosts and the number of lookup
requests they made.
logscale
| Bar Chart | |
Displays a chart of all DNS requests over a given time frame by
domain name
logscale
| Time Chart | |
Displays a list of requested DNS events by domain name and limits
results to the first 10 entries.
logscale
| Time Chart | |
| Note |
Search - By File Hash
Widget | Description | Type |
---|---|---|
Displays a list of file execution details by file name or SHA256
and limits results to the first 20,000 entries.
logscale
| Table | |
Displays a pie chart of file executions by host, limited to the
first 25 entries.
logscale
| Pie Chart | |
Displays a pie chart of files written by hosts, limited to the
first 25 entries.
logscale
| Pie Chart | |
This widget only shows result if a ComputerName is specified)
logscale
| Table | |
Displays a list of files written on distinct hosts.
logscale
| Single Value | |
Displays a chart of execution activity.
logscale
| Time Chart | |
Display a table of execution history including execution date/time
and file name, organizes it by host, and limits to the top 199
entries. Note that this query will only return results if at least
one of ?FileName or ?SHA256 is specified.
logscale
| Table | |
Displays the number of hosts executing a specific program that
have been identified as suspicious.
logscale
| Single Value | |
Displays a chart of unique host executions over time.
logscale
| Time Chart | |
# Workflow Start by entering a file name or a SHA256 to see results for 'Execution History', File Execution Details', and 'File Written Details'. | Note |
Search - By IP Address
Widget | Description | Type |
---|---|---|
Displays a world map of IP locations based on IP-based
geolocation.
logscale
| World Map | |
Displays a table of process executions and limits results to the
first 1000 entries.
logscale
| Table | |
Displays a table of network connections then limits results to the
first 1000 entries.
logscale
| Table | |
Displays a table of IP addresses and additional data (city, state,
country, latitude/longitude, etc.)
logscale
| Table | |
Displays a table of the top 10 device endpoints.
logscale
| Table | |
Displays a list of a user's IP connection history over time.
logscale
| Single Value | |
Displays a chart of connection count over time based on IP address
data.
logscale
| Time Chart | |
Displays a list of total system connections.
logscale
| Single Value |
Search - By Process Context
Widget | Description | Type |
---|---|---|
Displays a table of network events TCP, ICMP, UDP, and IP data.
logscale
| Table | |
Displays a pie chart of context events by type.
logscale
| Pie Chart | |
Displays a list of files that have been written.
logscale
| Table | |
Displays a record of an original process from the command line,
with an accompanying file name.
logscale
| Table | |
Displays a list of files that have been deleted by process ID.
logscale
| Table | |
Display a pie chart of destination IP addresses by type.
logscale
| Pie Chart | |
Displays a table of DNS requests by domain name.
logscale
| Table | |
Displays a list of all context events by ID.
logscale
| Event List | |
Displays a table of image hash events.
logscale
| Table | |
# Workflow Start by entering a filename. The aid is optional, but will constrain (and speed up) the search if you have it. If you find an interesting process copy the ProcessId and paste it in the parameter above to show the context events below. | Note |
Search - By UserName
Widget | Description | Type |
---|---|---|
Displays a table of detection events with agent ID, computer name,
and additional data then limits results to the first 1000 entries.
logscale
| Table | |
Displays a table of failed logon events by username and computer
name then limits results to the first 1000 entries.
logscale
| Table | |
Displays a chart of the top 10 events over time.
logscale
| Time Chart | |
Displays a table of registered scheduled tasks.
logscale
| Table | |
Displays a table of distinct event types by asset then limits the
results to the first 1000 entries.
logscale
| Table | |
Displays a table of successful interactive logon events and groups
the results by computer name and logon type, then limits results
to the first 1000 entries.
logscale
| Table | |
Displays a table of file write events and limits results to the
first 1000 entries.
logscale
| Table | |
- Enter a value for the
UserName input
parameter. - The input is case-insensitive, e.g. USER will match
both User and user in the results.
| Note |
Search - Threat Hunting
Widget | Description | Type |
---|---|---|
Displays a table of top country destinations by IP address and
country.
logscale
| Table | |
Displays a table of suspicious lead data.
logscale
| Table | |
Displays a list of high entropy domains using Akamai and limits
the results to the first 20 entries.
logscale
| Table | |
Displays a table of top IP destinations.
logscale
| Table | |
Script content rated by Shanon entropy to look for randomness as a
proxy for obfuscation attempts.
logscale
| Table |
zBeta - Identify Statistical Anomalies
Widget | Description | Type |
---|---|---|
Displays a list of statistical deviation events and by how much,
then limits results to the first 500 entries.
logscale
| Table | |
This dashboard is designed to calculate statistical anomalies
based on standard deviations. The default window is 30 days with a
7-day rolling average. Default values are provided for the
parameter inputs. You can change these as needed. The
Event Name and
Group By drop-down
values are displayed based on frequency. It is recommended that
you input your own values for the specific use case, e.g.
UserLogonFailed2 for the
Event Name and UserName
for the Group By.
| Note | |
These are the input values that can be modified: -
AnomalyFactor : the
number of standard deviations from the mean, e.g.
3 . -
EventSimpleName : the
#event_simpleName value
that the query should be applied to, e.g.
UserLogonFailed2 . -
GroupByValue : the value
the results should be grouped by, e.g.
UserName . -
RollingAverageDays : the
number of days that should be used to calculate a rolling average
window, e.g. 7d to
compare each day to a 7-day rolling average.
| Note |