You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/security/threat-intelligence/find-threats.md
+45Lines changed: 45 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,3 +25,48 @@ For syntax and examples, see [`threatlookup` search operator](/docs/search/searc
25
25
You can also [run threatlookup with the cat search operator](/docs/search/search-query-language/search-operators/threatlookup/#run-threatlookup-with-the-cat-search-operator) to search the entire store of threat intelligence indicators.
26
26
-->
27
27
28
+
<!-- Add this after sumo://threat/cs is replaced by threatlookup":
29
+
30
+
## Threatlookup queries in dashboards
31
+
32
+
The `threatlookup` search operator is used for queries in some dashboards, including [dashboards in the Threat Intel Quick Analysis app](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/#viewing-threat-intel-quick-analysis-dashboards). These queries provide great examples of how to use the operator.
33
+
34
+
To see `threatlookup` used in a query:
35
+
1. Open the Threat Intel Quick Analysis app.
36
+
1. Navigate to a dashboard, such as **Overview**.
37
+
1. Click the three-dot kebab in the upper-right corner of the dashboard panel.
38
+
1. Select **Open in Log Search**.
39
+
1. Look for `threatlookup` used in the query.
40
+
41
+
For example, here is the query used for the **Threat Count** panel in the **Threat Intel Quick Analysis - IP** dashboard:
| where ip_address != "0.0.0.0" and ip_address != "127.0.0.1"
47
+
| count as ip_count by ip_address
48
+
49
+
| threatlookup singleIndicator ip_address
50
+
51
+
// normalize confidence level to a string
52
+
| if (_threatlookup.confidence >= 85, "high", if (_threatlookup.confidence >= 50, "medium", if (_threatlookup.confidence >= 15, "low", if (_threatlookup.confidence >= 0, "unverified", "unknown")))) as threat_confidence
53
+
54
+
// filter for threat confidence
55
+
| where threat_confidence matches "*"
56
+
57
+
//rename to match threat_<foo> convention
58
+
| %"_threatlookup.actors" as threat_actors
59
+
| %"_threatlookup.type" as type
60
+
| %"_threatlookup.threat_type" as threat_type
61
+
62
+
//convert threat valid from to human readable time
63
+
| toLong(%"_threatlookup.valid_from" * 1000) as %"_threatlookup.valid_from"
64
+
| formatDate(%"_threatlookup.valid_from", "MM-dd-yyyy") as threat_valid_from
65
+
66
+
| where type matches "ipv4-addr*" and !isNull(threat_confidence)
67
+
68
+
| if (isEmpty(threat_actors), "Unassigned", threat_actors) as threat_actors
0 commit comments