Jump to Content
Home
Guides
Recipes
Discussions
v1.0
Log In
Guides
Log In
v1.0
Home
Guides
Recipes
Discussions
Device Hardware Info
All
Pages
Start typing to search…
Welcome
Welcome to Query!
Product Architecture
Security & Privacy
Search & Results
Getting Started
Search Progress and Results
Summary Insights (Federated Dashboards)
Searching in the Query UI
Administration
Team Management
Connectors
Connectors Overview
Cloud Infrastructure and Security
Amazon CloudWatch Logs (for AWS WAFv2)
Lacework (FortiCNAPP)
Microsoft Graph API - Security
Data Lakes and Data Warehouses
Amazon Athena (for Amazon S3)
Amazon Redshift
Amazon Redshift Serverless
Amazon Security Lake
Azure Data Explorer (ADX)
ClickHouse Cloud
Databricks
Google BigQuery
Snowflake
Data Security
Cyera
Developer Security
GitHub Advanced Security (GHAS)
Ox Security
Email Security and Communications
Gmail Messages API
Microsoft Defender for Office 365
Endpoint
Carbon Black Cloud
CrowdStrike Falcon API
CrowdStrike Falcon Identity Protection
CrowdStrike Falcon Spotlight
Microsoft Defender for Endpoint
SentinelOne Singularity Platform
Identity and HR
1Password
Auth0
Google Workspace - Directory API
Microsoft Entra ID (Azure AD)
Okta
Push Security
IT Service Management
Armis Centrix
ServiceNow (Table API)
Mobile Device Management
JAMF Pro
Microsoft Intune
SIEM and Log Management
Amazon OpenSearch Service
Azure Log Analytics
Cribl Search
CrowdStrike Falcon NextGen SIEM
Datadog
Google Security Operations SIEM (Google Chronicle)
Google Workspace - Reports API
Microsoft Sentinel (Azure Sentinel)
Splunk Enterprise & Cloud
Threat Intelligence and Enrichment
AlienVault OTX
CISA Known Exploited Vulnerabilities (KEV) Catalog
ip-api (Geolocation API)
MISP (Malware Information Sharing Project)
Shodan
Tégo
VirusTotal
WhoisXML API
Query APPS
Query Splunk App
Splunk App Setup and Administration
Running Federated Search from Splunk
Splunk App Quick Reference Guide
Running FSQL from Splunk
Query Chrome Extension
Configure Schema
Configure Schema (classic)
Query Agents
Query Agents
Asset Information Agent
Detection Finding Triage Agent
File Hash Agent
Network Activity Agent
Threat Research Agent
Vulnerability Intelligence Agent
Query Security Data Pipelines
Security Data Pipelines
➡️
Destinations
Amazon S3 Destination
Azure Blob Destination
Cribl Stream - HTTP Destination
Google Cloud Storage (GCS) Destination
Splunk HEC Destination
Federated Detections
Federated Detections
Creating Detections
Managing Detections
Alert Destinations
Amazon SNS Destination Setup
Azure Sentinel Destination Setup
Google Pub/Sub Destination Setup
Google SecOps Destination Setup
Jira Destination Setup
Microsoft Teams Destination Setup
PagerDuty Destination Setup
ServiceNow Incidents Destination Setup
Slack Destination Setup
Tines Cases Destination Setup
Tines Webhook Destination Setup
Webhook Destination Setup
Query Data Model Reference
About the Query Data Model
Events
Account Change
Admin Group Query
API Activity
Application Lifecycle
Authentication
Authorize Session
Base Event
Compliance Finding
Device Config State
Data Security Finding
Datastore Activity
Detection Finding
Device Config State Change
DHCP Activity
DNS Activity
Email Activity
Email File Activity
Email URL Activity
Entity Management
File System Activity
File Hosting Activity
File Query
File Remediation Activity
Folder Query
FTP Activity
Group Management
HTTP Activity
Incident Finding
Device Inventory Info
Job Query
Kernel Activity
Kernel Object Query
Memory Activity
Module Activity
Module Query
Network Activity
Network Connection Query
Network File Activity
Network Remediation Activity
Networks Query
NTP Activity
OSINT Inventory Info
Operating System Patch State
Peripheral Device Query
Prefetch Query
Process Activity
Process Query
Process Remediation Activity
RDP Activity
Registry Key Activity
Registry Key Query
Registry Value Activity
Registry Value Query
Remediation Activity
Scan Activity
Scheduled Job Activity
Security Finding
Service Query
User Session Query
SMB Activity
Software Inventory Info
SSH Activity
Tunnel Activity
User Access Management
User Inventory Info
User Query
Vulnerability Finding
Web Resource Access Activity
Web Resources Activity
Cloud Resources Inventory Info
Startup Item Query
Kernel Extension Activity
Event Log Activity
Script Activity
Airborne Broadcast Activity
Drone Flights Activity
Application Error
Windows Service Activity
Windows Resource Activity
Live Evidence Info
Application Security Posture Finding
IAM Analysis Finding
Objects
Account
Actor
Affected Code
Affected Software Package
Agent
Analytic
API
MITRE ATT&CK® & ATLAS™
Authentication Factor
Authorization Result
Autonomous System
Digital Certificate
CIS Benchmark
CIS Benchmark Result
CIS Control
CIS CSC
Cloud
Compliance
Container
CVE
CVSS Score
CWE
MITRE D3FEND™ Tactic
MITRE D3FEND™ Technique
MITRE D3FEND™
Data Classification
Data Security
Database
Databucket
DCE/RPC
Device
Device Hardware Info
Digital Signature
Display
DNS Answer
DNS Query
Domain Contact
Domain Threat Intelligence
Email
Email Authentication
Endpoint
Endpoint Connection
Enrichment
EPSS
Windows Evidence Artifacts
Schema Extension
Feature
File
File Threat Intelligence
Finding
Finding Information
Fingerprint
Firewall Rule
Group
HASSH
HTTP Cookie
HTTP Header
HTTP Request
HTTP Response
Identity Provider
Image
IP Threat Intelligence
JA4+ Fingerprint
Job
KB Article
Kernel Resource
Kernel Extension
Keyboard Information
Kill Chain Phase
LDAP Person
Load Balancer
Geo Location
Logger
Malware
Managed Entity
Metadata
Metric
Module
Network Connection Information
Network Endpoint
Network Interface
Network Proxy Endpoint
Network Traffic
Object
Observable
Organization
Operating System (OS)
OSINT
Software Package
Peripheral Device
Policy
Linux Process
Product
Query Information
Registry Key
Registry Value
Related Event/Finding
Remediation
Reputation
Request Elements
Resource
Resource Details
Response Elements
RPC Interface
Rule
Subject Alternative Name
Scan
Security State
Service
Session
MITRE Sub-technique
Table
MITRE Tactic
MITRE Technique
Threat Intelligence
Ticket
Time Span
Transport Layer Security (TLS)
TLS Extension
Unmapped
Uniform Resource Locator
URL Threat Intelligence
User
Vulnerability Details
Web Resource
WHOIS
Windows Resource
Windows Service
Encryption Details
Trace
Span
Software Component
Assessment
Script
Occurrence Details
Software Bill of Materials
SSO
Process Entity
Key:Value object
Advisory
Classifier Details
Aircraft
Unmanned Aerial System
Vendor Attributes
Discovery Details
Unmanned System Operating Area
Startup Item
Environment Variable
Long String
SCIM
Analysis Target
Anomaly
Anomaly Analysis
Application
Authentication Token
Baseline
Campaign
Check
Edge
Graph
Malware Scan Info
MITRE Mitigation
Node
Observation
Query Evidence
Threat Actor
Trait
Transformation Info
Access Analysis Result
Additional Restriction
Identity Activity Metrics
Permission Analysis Result
Port Information
Programmatic Credential
Data Types
Event Categories
FSQL: Federated Search Query Language
Introduction to FSQL
FSQL User Guide for Security Analysts
From SPL to FSQL: A Security Analyst's Guide
FSQL Technical Reference
Query's Federated Search Platform
Attribute Selectors
Dates and Times
Search Filter Operators
Other Commands
Entities
Analytics Functions
Subqueries
FAQL
The FSQL API
Hunting Library
APT28 Operation Phantom Net Voxel
Proactive Defense: A Guide to Hunting the BRICKSTORM Espionage Campaign
Device Hardware Info
Updated 3 months ago
Device
Digital Signature
Ask AI