Skip to content

Commit c03a6af

Browse files
Analyzer support for CrowdStrike and SentinelOne (#2306)
Contributes to #2024. Updates the visual event analyzer docs to document support for analyzing events from CrowdStrike and SentinelOne integrations. Preview: [Visual event analyzer](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/2306/solutions/security/investigate/visual-event-analyzer) 8.x PR: elastic/security-docs#6989
1 parent 8e780bf commit c03a6af

File tree

1 file changed

+13
-7
lines changed

1 file changed

+13
-7
lines changed

solutions/security/investigate/visual-event-analyzer.md

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -23,12 +23,19 @@ If you’re experiencing performance degradation, you can [exclude cold and froz
2323

2424
## Find events to analyze [find-events-analyze]
2525

26-
You can only visualize events triggered by hosts configured with the {{elastic-defend}} integration or any `sysmon` data from `winlogbeat`.
26+
You can visualize events from the following sources:
2727

28-
In KQL, this translates to any event with the `agent.type` set to either:
28+
* {{elastic-defend}} integration
29+
* Sysmon data collected through {{winlogbeat}}
30+
* [CrowdStrike integration](integration-docs://reference/crowdstrike.md) (Falcon logs collected through Event Stream or FDR)
31+
* [SentinelOne Cloud Funnel integration](integration-docs://reference/sentinel_one_cloud_funnel.md)
32+
33+
In KQL, this translates to any event with the `agent.type` set to:
2934

3035
* `endpoint`
3136
* `winlogbeat` with `event.module` set to `sysmon`
37+
* `filebeat` with `event.module` set to `crowdstrike`
38+
* `filebeat` with `event.module` set to `sentinel_one_cloud_funnel`
3239

3340
To find events that can be visually analyzed:
3441

@@ -37,13 +44,12 @@ To find events that can be visually analyzed:
3744
* Find **Hosts** in the main menu, or search for `Security/Explore/Hosts` by using the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md), then select the **Events** tab. A list of all your hosts' events appears at the bottom of the page.
3845
* Find **Alerts** in the main menu or by using the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md), then scroll down to the Alerts table.
3946

40-
2. Filter events that can be visually analyzed by entering either of the following queries in the KQL search bar, then selecting **Enter**:
47+
2. Filter events that can be visually analyzed by entering one of the following queries in the KQL search bar, then selecting **Enter**:
4148

4249
* `agent.type:"endpoint" and process.entity_id :*`
43-
44-
Or
45-
4650
* `agent.type:"winlogbeat" and event.module: "sysmon" and process.entity_id : *`
51+
* `agent.type:"filebeat" and event.module: "crowdstrike" and process.entity_id : *`
52+
* `agent.type:"filebeat" and event.module: "sentinel_one_cloud_funnel" and process.entity_id : *`
4753

4854
3. Events that can be visually analyzed are denoted by a cubical **Analyze event** icon. Select this option to open the event in the visual analyzer. The event analyzer is accessible from the **Hosts**, **Alerts**, and **Timelines** pages, as well as the alert details flyout.
4955

@@ -75,7 +81,7 @@ Within the visual analyzer, each cube represents a process, such as an executabl
7581

7682
To understand what fields were used to create the process, select the **Process Tree** to show the schema that created the graphical view. The fields included are:
7783

78-
* `SOURCE`: Can be either `endpoint` or `winlogbeat`
84+
* `SOURCE`: Indicates the data source—for example, `endpoint` or `winlogbeat`
7985
* `ID`: Event field that uniquely identifies a node
8086
* `EDGE`: Event field which indicates the relationship between two nodes
8187

0 commit comments

Comments
 (0)