You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In KQL, this translates to any event with the `agent.type` set to:
16
22
17
23
* `endpoint`
18
24
* `winlogbeat` with `event.module` set to `sysmon`
25
+
* `filebeat` with `event.module` set to `crowdstrike`
26
+
* `filebeat` with `event.module` set to `sentinel_one_cloud_funnel`
19
27
20
28
To find events that can be visually analyzed:
21
29
22
30
. First, display a list of events by doing one of the following:
23
31
* Find **Hosts** in the main menu, or search for `Security/Explore/Hosts` by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then select the *Events* tab. A list of all your hosts' events appears at the bottom of the page.
24
32
* Find **Alerts** in the main menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then scroll down to the Alerts table.
25
-
. Filter events that can be visually analyzed by entering either of the following queries in the KQL search bar, then selecting *Enter*:
33
+
. Filter events that can be visually analyzed by entering one of the following queries in the KQL search bar, then selecting *Enter*:
26
34
** `agent.type:"endpoint" and process.entity_id :*`
27
-
+
28
-
Or
29
-
+
30
35
** `agent.type:"winlogbeat" and event.module: "sysmon" and process.entity_id : *`
36
+
** `agent.type:"filebeat" and event.module: "crowdstrike" and process.entity_id : *`
37
+
** `agent.type:"filebeat" and event.module: "sentinel_one_cloud_funnel" and process.entity_id : *`
31
38
32
39
. Events that can be visually analyzed are denoted by a cubical **Analyze event** icon. Select this option to open the event in the visual analyzer. The event analyzer is accessible from the **Hosts**, **Alerts**, and **Timelines** pages, as well as the alert details flyout.
33
40
@@ -53,7 +60,7 @@ Within the visual analyzer, each cube represents a process, such as an executabl
53
60
54
61
To understand what fields were used to create the process, select the **Process Tree** to show the schema that created the graphical view. The fields included are:
55
62
56
-
* `SOURCE`: Can be either `endpoint` or `winlogbeat`
63
+
* `SOURCE`: Indicates the data source—for example, `endpoint` or `winlogbeat`
57
64
* `ID`: Event field that uniquely identifies a node
58
65
* `EDGE`: Event field which indicates the relationship between two nodes
0 commit comments