crowdstrike/fltr-identityprotection Dashboards
The Detections Dashboard provides comprehensive identity-based security monitoring through integrated detection visualizations. This dashboard enables tracking of identity-related threats, analysis of authentication incidents, and monitoring of access-based security events across the environment.
The Event Analysis Dashboard presents detailed identity event analysis through comprehensive event visualizations. This dashboard enables investigation of authentication patterns, monitoring of access behaviors, and tracking of identity-related activities across the security landscape.
The Identity-based Detections dashboard provides focused identity threat detection through specialized security visualizations. This dashboard enables monitoring of identity-specific threats, analysis of credential misuse, and investigation of suspicious authentication activities across the infrastructure.
The Threat Hunter dashboard presents advanced identity threat hunting capabilities through specialized search visualizations. This dashboard enables proactive investigation of identity threats, analysis of suspicious authentication patterns, and detection of potential identity-based compromises across the environment.
Detections Dashboard
The Detections Dashboard provides comprehensive identity-based security monitoring through integrated detection visualizations. This dashboard enables tracking of identity-related threats, analysis of authentication incidents, and monitoring of access-based security events across the environment.
| Widget | Description | Type |
|---|---|---|
Displays a list of recent external API events, arranges them in
order of severity (low, medium, high, and critical), then limits
results to the first 1000 entries.
| Table | |
Displays a table of source users most involved in detections.
| Table | |
Displays the number of events with a low severity rating (greater
than or equal to 20, or less than or equal to 39).
| Single Value | |
Displays events defined as Critical severity.
| Single Value | |
Displays events considered medium severity, with a rating greater
than 40 but less than 59.
| Single Value | |
Displays a chart of event detections by severity (information,
low, medium, high, and critical).
| Time Chart | |
Displays a table of MITRE ATT@CK tactics and techniques, and their
associated severity level (information, low, medium, high, and
critical).
| Table | |
Displays a list of detections by name.
| Table | |
Displays the number of events given a 'high' severity rating
(greater than or equal to 60, and less than or equal to 79).
| Single Value | |
Displays a table of source endpoints most involved in system
detections.
| Table | |
Displays an overview list of MITRE tactics and techniques.
| Heat Map |
Event Analysis Dashboard
The Event Analysis Dashboard presents detailed identity event analysis through comprehensive event visualizations. This dashboard enables investigation of authentication patterns, monitoring of access behaviors, and tracking of identity-related activities across the security landscape.
| Widget | Description | Type |
|---|---|---|
Displays a chart of total Active Directory password changes by
domain name.
| Time Chart | |
Displays a chart of top Active Directory account lockouts by
username.
| Bar Chart | |
Displays a list of top usernames with the most Active Directory
(AD) change events based on domain.
| Bar Chart | |
Plots the changes to the account within Active Directory
| Time Chart | |
Displays a chart of top Active Directory password changes by
username.
| Bar Chart | |
Displays a table of Active Directory account creations by username
and arranged by domain.
| Table | |
Displays a list of top SSO authentication failures by username.
| Table | |
Displays a table of tp AD authentication failures by username.
| Table |
Identity-based Detections
The Identity-based Detections dashboard provides focused identity threat detection through specialized security visualizations. This dashboard enables monitoring of identity-specific threats, analysis of credential misuse, and investigation of suspicious authentication activities across the infrastructure.
| Widget | Description | Type |
|---|---|---|
Displays a table of identity-based detections, their associated
details, and their associated severity rating, then limits results
to the first 1000 entries.
| Table |
Threat Hunter
The Threat Hunter dashboard presents advanced identity threat hunting capabilities through specialized search visualizations. This dashboard enables proactive investigation of identity threats, analysis of suspicious authentication patterns, and detection of potential identity-based compromises across the environment.
| Widget | Description | Type |
|---|---|---|
Displays a table of IDP escalation detections and summarizes their
details including account name, domain, policy rule name, source
endpoint name, and added privileges.
| Table |