Skip to main content

Active Directory Search Query

You can search domain activity that has been monitored and recorded to a File output. When you select Active Directory from the magnifying glass drop-down menu, a New Search tab opens with the applicable query filters.

Search - Active Directory New Search Tab

The filters are separated into the following categories:

  • General
  • Object Changes
  • LSASS Guardian
  • LDAP Queries
  • Authentication

By default, the query is set to return all event activity for the past day. Configuring query filters will scope results returned.

Set the filters as desired and click Search. The application searches through the appropriate activity log files and returns the events that match the filters. You can Filter and Sort the results using the column headers. Below the Search button is the Export option.

Filter Value Entry

When the drop-down menu is in front of a query filter, it is used to show or hide the filter entry field. Field options vary based on the selected query filter:

  • Textbox – Enter the filter value. If the field has a drop-down arrow, then you can select from values known to the application.

  • Gray drop-down menu – Provides options to match the value against on of the following, which vary based on the filter:

    • Selected values – Filters by the value selected from the drop-down menu for the textbox
    • Simple string with wildcards – Filters by the value entered into the textbox, which contains an asterisk (*) as the wildcard
    • Regular expression – Filters by the Regex entered into the textbox

General Category

The General category addresses who, what, where, and when an object, user, host, or domain controller is affected by the events selected in the other categories. The time frame filter must be configured for every search query.

Active Directory Search - General Filter

This section has the following filters:

  • From – Set the date and timestamp for the start of the activity range. The drop-down menu opens a calendar.

  • To – Set the date and timestamp for the end of the activity range. The drop-down menu opens a calendar.

  • Event Source – Set which query categories will be used. The drop-down menu displays a checkbox list of categories.

  • Event Result – Filter the data for a specific event result: Any, Success, or Failure

  • Event Block – Filter the data for a specific event result related to blocking: Any, Allowed, or Blocked

  • Agent Hosts – Filter the data for a specific agent

  • Agent Domains – Filter the data for a specific domain

  • Affected Object Name – Filter the data for a specific affected object name

  • Affected Object Class – Filter the data for a specific affected object class

  • User – Filter the data for a specific user, or perpetrator of the event

    • Specify account or group (...) – The ellipsis button beside the User textbox opens the Specify account or group window. Use this window to resolve the account for the user. See the Specify Account or Group Window topic for additional information.
  • From Hosts – Filter the data for a specific originating host of the event

  • Search Limit – Set the maximum number of rows returned in the search results. The default is 10,000 rows.

Object Changes Category

The Object Changes category scopes the query by objects with change activity.

Object Changes Filter

This section has the following filters:

  • Account Changes – Filter the data by the type of account change: All, Account Locked, Account Unlocked, Account Disabled, Account Enabled, Password Changed
  • Membership Changes – Filter the data by the type of group membership change: All, Group Members Added, Group Members Removed, Group Members Changed
  • Object Changes – Filter the data by the type of group membership change: All, Object Moved, Object Renamed, Object Added, Object Modified, Object Deleted
  • New Object Name – Filter the data for a specific new object name
  • Old Object Name – Filter the data for a specific old object name
  • Attribute Name – Filter the data for a specific attribute name
  • Attribute Value – Filter the data for a specific attribute value

LSASS Guardian Category

The LSASS Guardian category scopes the query by LSASS Guardian activity.

LSASS Guardian Filters

This section has the following filters:

  • Process Name – Filter the data for a specific process name
  • Process ID – Filter the data for a specific process ID
  • Events – Filter the data by the type of event: All, Create Handle, Duplicate Handle

LDAP Queries Category

The LDAP Queries category scopes the query by LDAP query activity.

LDAP Queries Filter

This section has the following filters:

  • Query – Filter the data for a specific LDAP query
  • Connection – Filter the data by the type of connection : Any, Secure, Nonsecure

Authentication Category

The Authentication category scopes the query by authentication activity.

Authentication Filters

This section has the following filters:

  • Target Host – Filter the data for a specific host
  • Authentication – Filter the data by the type of authentication: All, Kerberos, NTLM
  • NTLM Logon Type – Filter the data by the type of NTLM Logon: All, Interactive, Network, Service, Generic, Transitive Interactive, Transitive Network, Transitive Service
  • NTLM Version – Filter the data by the type of NTLM version: Any, V1, V2
  • Encryption – Filter the data for a specific encryption
  • SPN – Filter the data for a specific service principal name (SPN)
  • Accounts – Filter the data by the type of account: Any, Existing, Nonexistent
  • Ticket Type – Filter the data by the type of ticket type: Any, AS, TGS
  • Search For – Filter the data by the selected item: Previous passwords usage only, Forged PAC only

Microsoft Entra ID Search Query

You can search activity in Microsoft Entra ID (Azure AD) that has been monitored and recorded to a File output. When you select Azure AD / Entra ID from the magnifying glass drop-down menu, a New Search tab opens with the applicable query filters.

Search Query - Entra ID

The filters are separated into the following categories:

  • General
  • User
  • Audit Events
  • Target Resource
  • Sign-in Events
  • Location

By default, the query is set to return all event activity for the past day. Configuring query filters will scope results returned.

Set the filters as desired and click Search. The application searches through the appropriate activity log files and returns the events that match the filters. You can Filter and Sort the results using the column headers. Below the Search button is the Export option.

Filter Value Entry

When the drop-down menu is in front of a query filter, it is used to show or hide the filter entry field. Field options vary based on the selected query filter:

  • Textbox – Enter the filter value. If the field has a drop-down arrow, then you can select from values known to the application.

  • Gray drop-down menu – Provides options to match the value against on of the following, which vary based on the filter:

    • Selected values – Filters by the value selected from the drop-down menu for the textbox
    • Simple string with wildcards – Filters by the value entered into the textbox, which contains an asterisk (*) as the wildcard
    • Regular expression – Filters by the Regex entered into the textbox

General Category

The General category scopes the query by the most common types of filters. The time frame filter must be configured for every search query.

Search Query - General Filter

This section has the following filters:

  • From – Set the date and timestamp for the start of the activity range. The drop-down menu opens a calendar.
  • To – Set the date and timestamp for the end of the activity range. The drop-down menu opens a calendar.
  • Source – Set which query categories will be used. The drop-down menu displays a checkbox list of categories.
  • Event Result – Filter the data for a specific event result: Any, Success, or Failure
  • Reason
  • Agent Hosts – Filter the data for a specific agent
  • Search Limit – Set the maximum number of rows returned in the search results. The default is 10,000 rows.

User Category

The User category scopes the query by the user, or perpetrator of the activity.

Search Query - User

This section has the following filters:

  • Name or ID
  • IP Address
  • Client App or Browser
  • Client OS

Audit Events Category

The Audit Events category scopes the query by the event type of the activity.

Search Query - Audit Events

This section has the following filters:

  • Service – Filter the data by the Microsoft Entra ID service: All, AAD Management UX, Access Reviews, Account Provisioning, Application Proxy, Authentication Methods, B2C, Conditional Access, Core Directory, Device Registration Service, Entitlement Management, Hybrid Authentication, Identity Protection, Invited Users, MIM Service, MyApps, PIM, Self-service Group Management, Self-service Password Management, Terms of Use
  • Category – Filter the data by the category type of activity: All, AdministrativeUnit, ApplicationManagement, Authentication, Authorization, AuthorizationPolicy, Contact, Device, DeviceConfiguration, DirectoryManagement, EntitlementManagement, GroupManagement, IdentityProtection, KerberosDomain, KeyManagement, Label, Other, PermissionGrantPolicy, Policy, PolicyManagement, ResourceManagement, RoleManagement, UserManagement
  • Type – Filter the data by the type of activity: All, Add, Delete, Update, Assign, Unassign
  • Operation

Target Resource Category

The Target Resource category scopes the query by the target of the activity.

Search Query - Target Resource

This section has the following filters:

  • Target
  • Property
  • Modifications – Filter the data to a specific type of modification: All, No changes, Has attribute changes

Sign-in Events Category

The Sign-in Events category scopes the query by the sign-in event.

Search Query - Sign-in Events

This section has the following filters:

  • Risk
  • Conditional Access

Location Category

The Location category scopes the query by the location of the user.

Search Query - Location

This section has the following filters:

  • City
  • State
  • Country

Exchange Online Search Query

You can search Exchange Online activity that has been monitored and recorded to a File output. When you select Exchange Online from the magnifying glass drop-down menu, a New Search tab opens with the applicable query filters.

Exchange Online - Search Quary Bar

The filters are separated into the following categories:

By default, the query is set to return all event activity for the past day. Configuring query filters will scope results returned.

Set the filters as desired and click Search. The application searches through the appropriate activity log files and returns the events that match the filters.You can Filter and Sort the results using the column headers. Below the Search button is the Export option.

Filter Value Entry

When the drop-down menu is in front of a query filter, it is used to show or hide the filter entry field. Field options vary based on the selected query filter:

  • Textbox – Enter the filter value. If the field has a drop-down arrow, then you can select from values known to the application.

  • Gray drop-down menu – Provides options to match the value against on of the following, which vary based on the filter:

    • Selected values – Filters by the value selected from the drop-down menu for the textbox
    • Simple string with wildcards – Filters by the value entered into the textbox, which contains an asterisk (*) as the wildcard
    • Regular expression – Filters by the Regex entered into the textbox

General Category

The General category scopes the query by the most common types of filters. The time frame filter must be configured for every search query.

Exchange Online - General Category

This section has the following filters:

  • From – Set the date and timestamp for the start of the activity range. The drop-down menu opens a calendar.

  • To – Set the date and timestamp for the end of the activity range. The drop-down menu opens a calendar.

  • Source – Filter the data by the source type: All, Admin Audit, Mailbox Access, DLP, Sensitivity Label, Other

    NOTE: Disabling a source that is also a category will hide that category from the query options.

  • Agent Hosts – Filter the data for a specific agent

  • Search Limit – Set the maximum number of rows returned in the search results. The default is 10,000 rows.

User Category

The User category scopes the query by the user, or perpetrator of the activity.

Exchange Online Search - User Filter

This section has the following filters:

  • Name or UPN – Filter the data by name or User Principal Name (UPN)
  • User Type – Filter the data by the type of user: All, Regular, Reserved, Admin, DcAdmin, System, Application, ServicePrincipal, CustomPolicy, SystemPolicy, Unknown
  • IP Address – Filter the data by IP address.
  • Client App or Browser – Filter the data by specified client application or browser.

Target Category

The Target category scopes the query by the target of the file.

Exchange Online Search - Target Filter

This section has the following filters:

  • Object
  • Mailbox
  • Accessed Mail

DLP Category

The DLP category scopes the query by the DLP policy.

Exchange Online Search - DLP Filter

This section has the following filters:

  • Policy Name

File Search Query

You can search Windows file server and NAS device activity that has been monitored and recorded to a File output. When you select File from the magnifying glass drop-down menu, a New Search tab opens with the applicable query filters.

Search UI Options Toolbar

By default, the query is set to return all event activity for the past day. Configuring query filters will scope results returned.

Set the filters as desired and click Search. The application searches through the appropriate activity log files and returns the events that match the filters. You can Filter and Sort the results using the column headers. Below the Search button is the Export option.

Filter Value Entry

Field options vary based on the selected query filter:

  • Textbox – Enter the filter value. If the field has a drop-down arrow, then you can select from values known to the application.

  • Gray drop-down menu – Provides options to match the value against on of the following, which vary based on the filter:

    • Selected values – Filters by the value selected from the drop-down menu for the textbox
    • Simple string with wildcards – Filters by the value entered into the textbox, which contains an asterisk (*) as the wildcard
    • Regular expression – Filters by the Regex entered into the textbox

Query Filter Options

The sections have the following filters:

  • Events time range – The time frame filter must be configured for every search query:

    • From – Set the date and timestamp for the start of the activity range. The drop-down menu opens a calendar.
    • To – Set the date and timestamp for the end of the activity range. The drop-down menu opens a calendar.
  • File Path – Filter the data for a specific file path where activity has occurred

  • Hosts – Filter the data for a specific target host of the event

  • Source – Filter the data for a specific source of the activity:

    • For local Windows activity, filter by a process name like notepad.exe
    • For network Windows activity, filter by the IP Address of the user
    • For NAS device activity, filter by the IP Address for the NAS device of the user
  • User/Group – Filter the data for a specific user, or perpetrator of the event. You can also filter by a group.

    • Specify account or group (...) – The ellipsis button beside the User textbox opens the Specify account or group window. Use this window to resolve the account for the user. See the Specify Account or Group Window topic for additional information.
  • GID

  • Types – Filter the data for a specific event result: All, Success, Fail

  • Operations – Filter the data by the type of file operation: Read, Add, Update, Delete, Rename, Permissions. The Operations checkbox at the top acts as select/deselect all option.

  • I/O Type – Filter the data by the type of input/output: Filesystem, Shadow copy (VSS). The I/O Type checkbox at the top acts as select/deselect all option.

  • Object Type – Filter the data by the type of file object: File, Folder, Link, Share. The Object Types checkbox at the top acts as select/deselect all option.

  • Search limit – Set the maximum number of rows returned in the search results. The default is 10,000 rows.

Linux Search Query

You can search Linux file server and NAS device activity that has been monitored and recorded to a File output. When you select Linux from the magnifying glass drop-down menu, a New Search tab opens with the applicable query filters.

Linux Search Query

By default, the query is set to return all event activity for the past day. Configuring query filters will scope results returned.

Set the filters as desired and click Search. The application searches through the appropriate activity log files and returns the events that match the filters. You can Filter and Sort the results using the column headers. Below the Search button is the Export option.

Filter Value Entry

Field options vary based on the selected query filter:

  • Textbox – Enter the filter value. If the field has a drop-down arrow, then you can select from values known to the application.

  • Gray drop-down menu – Provides options to match the value against on of the following, which vary based on the filter:

    • Selected values – Filters by the value selected from the drop-down menu for the textbox
    • Simple string with wildcards – Filters by the value entered into the textbox, which contains an asterisk (*) as the wildcard
    • Regular expression – Filters by the Regex entered into the textbox

Query Filter Options

The sections have the following filters:

  • Events time range – The time frame filter must be configured for every search query:

    • From – Set the date and timestamp for the start of the activity range. The drop-down menu opens a calendar.
    • To – Set the date and timestamp for the end of the activity range. The drop-down menu opens a calendar.
  • File Path – Filter the data for a specific file path where activity has occurred

  • Hosts – Filter the data for a specific target host of the event

  • Source – Filter the data for a specific source of the activity

  • User/Group – Filter the data for a specific user, or perpetrator of the event. You can also filter by a group.

    • Specify account or group (...) – The ellipsis button beside the User textbox opens the Specify account or group window. Use this window to resolve the account for the user. See the Specify Account or Group Window topic for additional information.
  • GID

  • Types – Filter the data for a specific event result: All, Success, Fail

  • Operations – Filter the data by the type of file operation: Read, Add, Update, Delete, Rename, Permissions. The Operations checkbox at the top acts as select/deselect all option.

  • I/O Type – Filter the data by the type of input/output: Filesystem, Shadow copy (VSS). The I/O Type checkbox at the top acts as select/deselect all option.

  • Object Type – Filter the data by the type of file object: File, Folder, Link, Share. The Object Types checkbox at the top acts as select/deselect all option.

SharePoint Search Query

You can search SharePoint activity that has been monitored and recorded to a File output. When you select SharePoint from the magnifying glass drop-down menu, a New Search tab opens with the applicable query filters.

SharePoint New Search Tab

The filters are separated into the following categories:

  • General
  • Audit
  • Move/Delete/Copy/Checkin
  • Delete
  • Search
  • Permissions

By default, the query is set to return all event activity for the past day. Configuring query filters will scope results returned.

Set the filters as desired and click Search. The application searches through the appropriate activity log files and returns the events that match the filters.You can Filter and Sort the results using the column headers. Below the Search button is the Export option.

Filter Value Entry

When the drop-down menu is in front of a query filter, it is used to show or hide the filter entry field. Field options vary based on the selected query filter:

  • Textbox – Enter the filter value. If the field has a drop-down arrow, then you can select from values known to the application.

  • Gray drop-down menu – Provides options to match the value against on of the following, which vary based on the filter:

    • Selected values – Filters by the value selected from the drop-down menu for the textbox
    • Simple string with wildcards – Filters by the value entered into the textbox, which contains an asterisk (*) as the wildcard
    • Regular expression – Filters by the Regex entered into the textbox

General Category

The General category addresses who, what, where, and when an object, user, host, or domain controller is affected by the events selected in the other categories. The time frame filter must be configured for every search query.

General Category - SharePoint

This section has the following filters:

  • From – Set the date and timestamp for the start of the activity range. The drop-down menu opens a calendar.

  • To – Set the date and timestamp for the end of the activity range. The drop-down menu opens a calendar.

  • Event Type – Filter the data by the event type: All, CheckOut, CheckIn, View, Delete, Update, ProfileChange, ChildDelete, SchemaChange, Undelete, Workflow, Copy, Move, AuditMaskChange, Search, ChildMove, FileFragmentWrite, SecGroupCreate, SecGroupDelete, SecGroupMemberAdd, SecGroupMemberDel, SecRoleDefCreate, SecRoleDefDelete, SecRoleDefModify, SecRoleDefBreakInherit, SecRoleBindUpdate, SecRoleBindInherit, SecRoleBindBreakInherit, EventsDeleted, AppPermissionGrant, AppPermissionDelete, Custom

    NOTE: Disabling an event type that is also a category will hide that category from the query options.

  • Item Type – Filter the data by the type of SharePoint item: All, Document, ListItem, List, Folder, Web, Site

  • Protocol – Filter the data by the protocol: Any, HTTP, HTTPS

  • Agent Hosts – Filter the data for a specific agent

  • Agent Domains – Filter the data for a specific domain

  • Item

  • Source Name

  • Site – Filter the data for a specific SharePoint site

  • Document Location

  • Web Application – Filter the data for a specific SharePoint web application

  • Web Title

  • User – Filter the data for a specific user, or perpetrator of the event

    • Specify account or group (...) – The ellipsis button beside the User textbox opens the Specify account or group window. Use this window to resolve the account for the user. See the Specify Account or Group Window topic for additional information.
  • Search Limit – Set the maximum number of rows returned in the search results. The default is 10,000 rows.

  • Event Source – Filter the data by the source: Any, SharePoint, ObjectModel

  • Location Type – Filter the data by the type of location: Any, Url, ClientLocation

Audit Category

The Audit category scopes the query by audit mask activity.

SharePoint Search - Audit filter section

This section has the following filters:

  • Audit Mask – Filter the data by the audit mask type: All, None, CheckOut, CheckIn, View, Delete, Update, ProfileChange, ChildDelete, SchemaChange, SecurityChange, Undelete, Workflow, Copy, Move, Search

Move/Delete/Copy/Checkin Category

The Move/Delete/Copy/Checkin category scopes the query by file move and version activity.

SharePoint Search Query - Move/Delete/Copy/Checkin Filters

This section has the following filters:

  • Child Document Location
  • New Child Document Location
  • Version

Delete Category

The Delete category scopes the query by type of delete activity.

SharePoint Search Query - Delete FIlters

This section has the following filters:

  • Delete Type – Filter the data by the type of deletion: Any, MovedToRecycle, DeletedCompletely

Search Category

The Search category scopes the query by search activity.

SharePoint Search Query - Search Filters

This section has the following filters:

  • Search Query
  • Search Constraint

Permissions Category

The Permissions category scopes the query by permission change activity.

SharePoint Search Query - Permissions Filters

This section has the following filters:

  • Group
  • Trustee
  • Trustee Type – Filter the data by the type of trustee: Any, Group, User
  • Role
  • Update Type – Filter the data by the type of update: All, Added, Removed, Updated
  • Permission – Filter the data by the permission: All, EmptyMask, ViewListItems, AddListItems, EditListItems, DeleteListItems, CancelCheckout, ManagePersonalViews, ManageLists, AnonymousSearchAccessList, AnonymousSearchAccessWebLists, Open, ViewFormPages, ViewPages, AddAndCustomizePages, ApplyThemeAndBorder, ApplyStyleSheets, ViewUsageData, CreateSSCSite, ManageSubwebs, ManagePermissions, BrowseDirectories, BrowseUserInfo, AddDelPrivateWebParts, UpdatePersonalWebParts, ManageWeb, FullMask, UseClientIntegration, UseRemoteAPIs, ManageAlerts, CreateAlerts, EditMyUserInfo, EnumeratePermissions, ApproveItems, OpenItems, ViewVersions, DeleteVersions, CreateGroups

SharePoint Online Search Query

You can search SharePoint Online activity that has been monitored and recorded to a File output. When you select SharePoint Online from the magnifying glass drop-down menu, a New Search tab opens with the applicable query filters.

SharePoint Online - Search Quary Bar

The filters are separated into the following categories:

  • General
  • User
  • Location
  • Item
  • Sharing
  • DLP
  • Custom

By default, the query is set to return all event activity for the past day. Configuring query filters will scope results returned.

Set the filters as desired and click Search. The application searches through the appropriate activity log files and returns the events that match the filters. You can Filter and Sort the results using the column headers. Below the Search button is the Export option.

Filter Value Entry

When the drop-down menu is in front of a query filter, it is used to show or hide the filter entry field. Field options vary based on the selected query filter:

  • Textbox – Enter the filter value. If the field has a drop-down arrow, then you can select from values known to the application.

  • Gray drop-down menu – Provides options to match the value against on of the following, which vary based on the filter:

    • Selected values – Filters by the value selected from the drop-down menu for the textbox
    • Simple string with wildcards – Filters by the value entered into the textbox, which contains an asterisk (*) as the wildcard
    • Regular expression – Filters by the Regex entered into the textbox

General Category

The General category scopes the query by the most common types of filters. The time frame filter must be configured for every search query.

SharePoint Online Search - General Filters

This section has the following filters:

  • From – Set the date and timestamp for the start of the activity range. The drop-down menu opens a calendar.

  • To – Set the date and timestamp for the end of the activity range. The drop-down menu opens a calendar.

  • Source – Filter the data by the source type: All, File and Page, Folder, List, Sharing and Access Request, Site Permissions, Site Administration, Synchronization, DLP, Sensitivity Label, Content Explorer, Other

    NOTE: Disabling a source that is also a category will hide that category from the query options.

  • Workload

  • Agent Hosts – Filter the data for a specific agent

  • Search Limit – Set the maximum number of rows returned in the search results. The default is 10,000 rows.

User Category

The User category scopes the query by the user, or perpetrator of the activity.

SharePoint Online Search - User Filter

This section has the following filters:

  • Name or ID
  • Login
  • IP Address
  • Client App or Browser
  • User Type – Filter the data by the type of user: All, Regular, Reserved, Admin, DcAdmin, System, Application, ServicePrincipal, CustomPolicy, SystemPolicy, Unknown

Location Category

The Location category scopes the query by the location of the file.

SharePoint Online Search - Location Filter

This section has the following filters:

  • URL
  • File Name
  • File Extension

Item Category

The Item category scopes the query by the item.

SharePoint Online Search - Item Filter

This section has the following filters:

  • Item
  • Item Type – Filter the data by the type of item: All, Unknown, File, Folder, Web, Site, Tenant, DocumentLibrary, Page
  • Modifications – Filter the data by the type of item: All, No Changes, Has attribute changes

Sharing Category

The Sharing category scopes the query by the type of sharing.

SharePoint Online Search - Sharing Filter

This section has the following filters:

  • Target Account
  • Access
  • Target Type – Filter the data by the type of target: All, Member, Guest, SharePointGroup, SecurityGroup, Partner, Unknown

DLP Category

The DLP category scopes the query by the DLP policy.

SharePoint Online Search - DLP Filter

This section has the following filters:

  • Policy Name

Custom Category

The Custom category scopes the query by custom event activity.

SharePoint Online Search - Custom Filter

This section has the following filters:

  • Event Data
  • Custom Event

SQL Server Search Query

You can search SQL Server activity that has been monitored and recorded to a File output. When you select SQL Server from the magnifying glass drop-down menu, a New Search tab opens with the applicable query filters.

SQL Server Search Query

The filters are separated into the following categories:

  • General
  • User
  • SQL

By default, the query is set to return all event activity for the past day. Configuring query filters will scope results returned.

Set the filters as desired and click Search. The application searches through the appropriate activity log files and returns the events that match the filters. You can Filter and Sort the results using the column headers. Below the Search button is the Export option.

Filter Value Entry

When the drop-down menu is in front of a query filter, it is used to show or hide the filter entry field. Field options vary based on the selected query filter:

  • Textbox – Enter the filter value. If the field has a drop-down arrow, then you can select from values known to the application.

  • Gray drop-down menu – Provides options to match the value against on of the following, which vary based on the filter:

    • Selected values – Filters by the value selected from the drop-down menu for the textbox
    • Simple string with wildcards – Filters by the value entered into the textbox, which contains an asterisk (*) as the wildcard
    • Regular expression – Filters by the Regex entered into the textbox

General Category

The General category scopes the query by the most common types of filters. The time frame filter must be configured for every search query.

General Filters

This section has the following filters:

  • From – Set the date and timestamp for the start of the activity range. The drop-down menu opens a calendar.
  • To – Set the date and timestamp for the end of the activity range. The drop-down menu opens a calendar.
  • Event Result – Filter the data for a specific event result: Any, Success, or Failure
  • Reason
  • Agent Hosts – Filter the data for a specific agent
  • Search Limit – Set the maximum number of rows returned in the search results. The default is 10,000 rows.

User Category

The User category scopes the query by the user, or perpetrator of the activity.

userfilter

This section has the following filters:

  • Name or ID
  • IP Address

SQL Category

The SQL category scopes the query by SQL Server activity.

SQL Filters

This section has the following filters:

  • Server name
  • Database
  • Operation – Filter the data by the type of Operation: All, Select, Insert, Update, Delete, merge, Execute, Login, Logout, Grant, Revoke, Deny, Error, AlterRole
  • Application
  • Object
  • SQL Text

Active Directory Search Results

When a search has been started, the Search Status table at the bottom displays the percentage complete according to the size and quantity of the activity log files being searched per AD agent. You can Filter and Sort the results using the column headers. Below the Search button is the Export option.

Active Directory Search Results

The results data grid columns display the following information for each event:

  • Event Time – Date timestamp of the event
  • Agent – Server where the Agent is deployed
  • Host – Target host where the event was recorded
  • Host Name – Name of the target host
  • Host IP – IP address of the target host
  • Host MAC – Network adapter identifier
  • User – Security principal of the account that triggered the event
  • User SID – Security Identifier of the account used in the event
  • User Name –  Name for the security principal that triggered the event
  • User Class – Active Directory class of the affected object
  • Blocked – Indicates the Agent blocked the event from occurring
  • Success – Indicates the event completed successfully
  • Event Source – Location of Monitored host where event occurred
  • Event Type – Indicates the type of event
  • Affected Object – Active Directory distinguished name for the affected object
  • Affected Object SID – Security Identifier of the object/account affected by the event
  • Affected Object Name – Name of the Affected Object
  • Protocol – Protocol(s) used for the monitored operation
  • Query Filter – LDAP filter used in the operation
  • Secured Query – Indicates if LDAP connection is secured or not
  • Query Objects – Number of returned objects produced by the LDAP request
  • Process Name – Contains process name that is monitored. Currently this is only lsass.exe.
  • PID – Process Identifier generated for each active process
  • Old Name – Value prior to the monitored change
  • New Name – Value after the monitored change
  • Authentication Type – Indicates type of authentication event. Possible values: Kerberos, NTLM.
  • Target Host – Name of the originating host
  • Target IP – IP address of the originating host
  • Authentication Protocol – Indicates authentication protocol. Possible values: Unknown, Kerberos, KerberosTgs, KerberosAs, NTLM, NTLMv1, NTLMMixed, NTLMv2.
  • NTLM Logon Type – Indicates type of protocol used to authenticate a connection between client and server
  • Ticket Encryption – Indicates encryption type used in request part of the Kerberos ticket
  • PAC – RID for the group that does not have access
  • SPN – Detects attempts to obtain a list of Service Principal Name values
  • User Exists –  Indicates if user exists
  • N2 Password – Indicates if an invalid password matches the user’s password history

At the bottom of the search interface, additional information is displayed for selected events in the data grid. The Attribute Name, Operation, Old Value, and New Value for the logged event (as applicable to the event) are displayed.

Microsoft Entra ID Search Results

When a search has been started, the Search Status table at the bottom displays the percentage complete according to the size and quantity of the activity log files being searched per activity agent. You can Filter and Sort the results using the column headers. Below the Search button is the Export option.

Azure Active Directory - Search Results

The results data grid columns display the following information for each event:

  • Event Time – Date timestamp of the event
  • Agent – Agent which monitored the event
  • Source – Indicates the source of the activity event
  • Result – Indicates whether the event resulted in a Success or Failure
  • Result Reason – If an event resulted in a Failure, the reason for it will be listed in the Result Reason column
  • User – Indicates user account associated with the event
  • IP Address – Indicates the IP Address associated with the event
  • Application – Indicates the Application associated with the event
  • Service – Indicates the Service associated with the event
  • Category – Indicates the Category associated with the event. Categories returned from search queries can be configured using the Category filter drop-down.
  • Operation - Indicates the Operation associated with the event. Operations returned from search queries can be configured using the Operation filter drop-down.
  • Type – Indicates the Type associated with the event. Types returned from search queries can be configured using the Type filter drop-down.
  • Target(s) – Indicates the Target(s) of the event
  • Modified – Indicates modifications associated with the event
  • Client App – Indicates the Client App associated with the event
  • OS – Indicates the OS associated with the event
  • Browser – Indicates the browser associated with the event
  • City – Indicates the City associated with the event
  • State – Indicates the State associated with the event
  • Country – Indicates the Country associated with the event
  • Coordinates – Indicates the Coordinates associated with the event
  • Interactive – Indicates whether the event was an Interactive event
  • Risk – Indicates the level of Risk associated with events
  • Conditional Access – Indicates whether Conditional Access was applied to the event
  • Conditional Policy – Indicates whether a Conditional Policy was applied to the event
  • Details – If applicable, provides additional information associated with the event that is not provided by the other Results columns

At the bottom of the search interface, additional information is displayed for selected events in the data grid. The Attribute Name, Operation, Old Value, and New Value for the logged event (as applicable to the event) are displayed.

Exchange Online Search Results

When a search has been started, the Search Status table at the bottom displays the percentage complete according to the size and quantity of the activity log files being searched per activity agent. You can Filter and Sort the results using the column headers. Below the Search button is the Export option.

Exchange Online - Search Results

The results data grid columns display the following information for each event:

  • Event Time – Date timestamp of the event
  • Agent – Agent which monitored the event
  • Source – Indicates the source of the activity event
  • Operation - Operation associated with event
  • User – Indicates user account associated with the event
  • User Type - Type of user associated with event
  • External – Indicates whether external sharing is associated with the event
  • IP Address – Indicates the IP Address associated with the event
  • Object - Object associated with event
  • Mailbox - The mailbox associated with the event
  • Modified - Indicates whether a modification is associated with the event
  • DLP Policy - If applicable, indicates the DLP Policy associated with the event

At the bottom of the search interface, additional information is displayed for selected events in the data grid. The Attribute Name, Operation, Old Value, and New Value for the logged event (as applicable to the event) are displayed.

File Search Results

When a search has been started, the Search Status table at the bottom displays the percentage complete according to the size and quantity of the activity log files being searched per activity agent. You can Filter and Sort the results using the column headers. Below the Search button is the Export option.

File Search Results UI

The results data grid columns display the following information for each event:

  • Event Time – Date timestamp of the event

  • Agent – Agent which monitored the event

  • Host – Monitored host where the event occurred

  • Operation – Type of the activity event which was monitored

  • User – User account that performed the activity event

  • Object – Type of object the activity event occurred upon:

    • File
    • Folder
    • Unknown
  • Path – Path where the operation occurred

  • New Path – For rename operation events only, the path’s new location/name

  • UNC Path – UNC path employed by a remote user to access the share, folder, and/or file

  • New UNC Path – For rename operation events only, the UNC path’s new location/name employed by a remote user

  • Source – Indicates the source of the activity event

    • For local Windows activity – Process name (e.g. notepad.exe)
    • For network Windows activity – IP Address of the user
    • For NAS device activity – IP Address for the NAS device of the user
  • Share Name – Name of share where the activity event occurred. This includes NFS.

  • I/O Type – Displays the input/output type

  • Protocol – Communication protocol used to access the share, folder, and/or file:

    • CIFS
    • NFS
    • VSS
    • HTTP
  • Protocol Version – Displays the Protocol Version for NetApp Data ONTAP Cluster-Mode device. This field is empty for all other servers/devices.

  • File Size — Displays the file size

  • Tags — (Windows Only) Operation tags. Reports 'Copy' for events that are probably copies.

  • Group — Displays the Group Name or ID (GID)

At the bottom of the search interface, additional information is displayed for selected events in the data grid. The Attribute Name, Operation, Old Value, and New Value for the logged event (as applicable to the event) are displayed.

Permissions Changes

When the results data grid displays information about permissions changes, additional information is made available.

Search Results with Permissions listed in the Operations Column

A link displays in the Operation column of the results data grid. Click the Permissions Change link to open the Permissions Change Details window.

File Search Results Permissions link popup window

The window displays details about the changes of the security descriptor with information from the new line added to a DACL:

  • Change – Type of change which occurred (Added, Removed, etc.)
  • Trustee – SAM account name of the affected object
  • Type – Type of permission applied (Allow/Deny)
  • Access Rights – Rights associated with the type of permission change
  • Inheritance – Indicates how the permission change is inherited

Linux Search Results

When a search has been started, the Search Status table at the bottom displays the percentage complete according to the size and quantity of the activity log files being searched per Linux agent. You can Filter and Sort the results using the column headers. Below the Search button is the Export option.

linuxsearchresults

The results data grid columns display the following information for each event:

  • Event Time – Date timestamp of the event

  • Agent – Agent which monitored the event

  • Host – Monitored host where the event occurred

  • Operation – Type of the activity event which was monitored

  • User – User account that performed the activity event

  • Object – Type of object the activity event occurred upon:

    • File
    • Folder
    • Unknown
  • Path – Path where the operation occurred

  • New Path – For rename operation events only, the path’s new location/name

  • UNC Path – UNC path employed by a remote user to access the share, folder, and/or file

  • New UNC Path – For rename operation events only, the UNC path’s new location/name employed by a remote user

  • Source – Indicates the source of the activity event

  • Share Name – Name of share where the activity event occurred. This includes NFS.

  • I/O Type – Displays the input/output type

  • Protocol — Will be LOCAL for Linux Activity

  • Protocol Version — This field is empty for Linux Activity

  • GID — Group ID associated with event

At the bottom of the search interface, additional information is displayed for selected events in the data grid. The Attribute Name, Operation, Old Value, and New Value for the logged event (as applicable to the event) are displayed.

SharePoint Search Results

When a search has been started, the Search Status table at the bottom displays the percentage complete according to the size and quantity of the activity log files being searched per activity agent. You can Filter and Sort the results using the column headers. Below the Search button is the Export option.

SharePoint Search - Results

The results data grid columns display the following information for each event:

  • Event Time – Date timestamp of the event
  • Agent Host – Agent used to collect event information
  • Event Type – Indicates the type of event
  • User – User account that performed the activity event
  • User Login – User login associated with the event
  • Protocol – Protocol used for the monitored operation
  • Absolute URL - Indicates the Absolute URL associated with the event
  • Web Application – Indicates the web application associated with the event
  • Site URL – Site URL associated with the event
  • Web Title - If applicable, indicates the Web Title associated with the event
  • Doc Location – If applicable, indicates the location of the document associated with the event
  • New Doc Location – If applicable, indicates the new location of the document associated with the event

At the bottom of the search interface, additional information is displayed for selected events in the data grid. The Attribute Name, Operation, Old Value, and New Value for the logged event (as applicable to the event) are displayed.

SharePoint Online Search Results

When a search has been started, the Search Status table at the bottom displays the percentage complete according to the size and quantity of the activity log files being searched per activity agent. You can Filter and Sort the results using the column headers. Below the Search button is the Export option.

SharePoint Online Search Results

The results data grid columns display the following information for each event:

  • Event Time – Date timestamp of the event
  • Agent – Agent which monitored the event
  • Source – Indicates the source of the activity event
  • Operation - Operation associated with event
  • User – User account that performed the activity event
  • User Type - Type of user associated with event
  • External – Indicates whether external sharing is associated with the event
  • IP Address - IP Address associated with event
  • Object Url - Object Url associated with event
  • Item Type - The type of the item associated with the event
  • Item Title - The title of the item associated with the event
  • Modified - Indicates whether a modification is associated with the event
  • Site - Site where the event occurred
  • List - Indicates which list the event is associated with
  • Relative URL - Indicates the Relative URL associated with the event
  • File Name - The name of the file associated with the event
  • Extension - If applicable, indicates the extension of the file associated with the event
  • New Relative URL - If applicable, indicates the new relative URL of the file associated with the event
  • New File Name - If applicable, indicates the new name for the file associated with the event
  • New Extension - If applicable, indicates the new extension of the file associated with the event
  • Workload - Workload associated with the event
  • Access - If applicable, indicates what level of access is associated with the event
  • Target Account - If applicable, indicates the recipient of the event
  • Target Type - If applicable, indicates the type of account of the recipient of the event
  • DLP Policy - If applicable, indicates the DLP Policy associated with the event
  • Event Data – Data associated with the event
  • Custom Event - If the Custom Event filter was configured in the Query bar, it will appear here

At the bottom of the search interface, additional information is displayed for selected events in the data grid. The Attribute Name, Operation, Old Value, and New Value for the logged event (as applicable to the event) are displayed.

SQL Server Search Results

When a search has been started, the Search Status table at the bottom displays the percentage complete according to the size and quantity of the activity log files being searched per activity agent. You can Filter and Sort the results using the column headers. Below the Search button is the Export option.

SQL Server Search Results

The results data grid columns display the following information for each event:

  • Event Time – Date timestamp of the event
  • Agent – Agent which monitored the event
  • Result – Indicates whether the event type was a success
  • User – User account that performed the activity event
  • IP Address – IP Address of the client host associated with the event
  • Client Host – Name of the client host associated with the event
  • Application Name – Name of the application associated with the event
  • Operation – The type of operation associated with the event
  • Database – The type of database associated with the event
  • SQL – The SQL Server Query text associated with the event
  • Error – Indicates SQL Server Error Code associated with the event
  • Message – Description of the error associated with the event
  • Category – Category of the error associated with the event

At the bottom of the search interface, additional information is displayed for selected events in the data grid. The Attribute Name, Operation, Old Value, and New Value for the logged event (as applicable to the event) are displayed.