The following sets of fields are searchable on the Triage Alerts and Threat Report Search pages.
As with process and binary searches, if no field is specified for a term, the search is executed on all default fields. In the following table, default fields are indicated by (def).
Field |
Field Type |
Description |
---|---|---|
alert_severity |
float |
Overall score of the alert (combines report score, feed rating, sensor criticality). For more information, see Threat Intelligence Feeds. |
alert_type |
keyword |
Type of the alert: one of "watchlist.hit.ingress.binary", "wathclist.hit.ingress.process", "watchlist.hit.query.process", "watchlist.hit.query.binary", "watchlist.hit.ingress.host" |
assigned_to |
keyword (def) |
Name of the Carbon Black EDR administrator who changed the alert status. |
create_time |
datetime |
Date and time this feed report was created. |
created_time |
datetime |
Creation time of the alert. |
description |
text (def) |
Description of the feed report, whitespace tokenized so each term is individually searchable. |
domain |
domain (def) |
A domain IOC value in the feed report. |
feed_category |
text (def) |
Category of this report/feed, whitespace tokenized. |
feed_id |
int |
Numeric value of the feed id (-1 for watchlists). |
feed_name |
keyword (def) |
Name of the feed that triggered the alert. All user-created watchlists have the feed name "My Watchlists" as a special case. |
group |
keyword |
Sensor group name of the endpoint on which the process/binary that triggered the alert was observed. |
hostname |
keyword (def) |
Hostname of endpoint that the process/binary that triggered the alert was observed on. |
ioc_value |
keyword (def) |
Value (IP address, MD5, or SHA-256) of the IOC that caused the alert to be triggered. |
ipaddr |
ipaddr |
An IP address IOC value in the feed report. |
ipv6addr |
ipv6addr |
An IPv6 address IOC value in the feed report. |
is_ignored |
bool |
Indicates whether the report has been marked to be ignored on this server. |
md5 |
md5 (def) |
MD5 of the process that triggered the alert, or an MD5 IOC value in the feed report. |
observed_filename |
keyword (def) |
Full path name of the process triggered the alert (not tokenized). |
process_name |
keyword (def) |
Filename of the process that triggered the alert. |
process_path |
path (def) |
Full path to the executable backing the process. |
report_id |
keyword |
Name or unique identifier of the threat report that is part of the field. |
report_score |
float |
Report score of the feed that triggered the alert. For more information, see Threat Intelligence Feeds. |
resolved_time |
datetime |
Time this alert was triaged by a resolution action. |
sha256 |
sha256 (def) |
SHA-256 of the process that triggered the alert (if available), or a SHA-256 IOC value in the feed report. |
status |
keyword |
Status of the alert: one of "resolved", "unresolved", "in progress", "false positive". |
tags |
text (def) |
Tags related to this report/feed, whitespace tokenized. |
title |
text |
Text title of the feed report, whitespace tokenized. |
update_time |
datetime |
Date and time this feed report was last updated. |
username |
keyword (def) |
Username in whose context the process that triggered the alert event was executed. |
watchlist_id |
int (def) |
Numeric value of the watchlist id (not applicable to feeds). |
watchlist_name |
keyword (def) |
Name of the watchlist or the report (for feeds). |