- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
06-20-2024 12:28 AM
Hi Community,
I have a query. I am interested in retrieving the user access history for a specific URL in the browser for the last 3 months. Is it possible to run a Python script to retrieve this information?
06-24-2024 07:15 AM
Hi @Vinothkumar_SBA , thanks for reaching us using the Live Community.
Take a look at this XQL Queries that should work for the data stored in the xdr_data dataset:
dataset = xdr_data
| filter actor_effective_username contains "insert user here"
| filter actor_process_image_name in ("msedge.exe","chrome.exe","firefox.exe") and action_external_hostname != null
| fields agent_hostname, agent_ip_addresses, actor_effective_username, actor_process_image_name, action_external_hostname
| sort desc _time
preset = network_story
| filter actor_effective_username contains "insert user here"
| filter actor_process_image_name in ("msedge.exe","chrome.exe","firefox.exe") and dst_action_external_hostname != null
| fields agent_hostname, agent_ip_addresses, actor_effective_username, actor_process_image_name, dst_action_external_hostname
| sort desc _time
You can add the filters for the external hostname as you need.
If you need older information than the stored in the dataset, the answer is yes, you can create a Python script to retrieve that information from the Endpoint.
If this post answers your question, please mark it as the solution.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!