Request for Query to Retrieve Endpoint Security Details.

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Request for Query to Retrieve Endpoint Security Details.

L2 Linker

Hi Team,

I would like to create a query that provides the following information for endpoint security events:

  • Severity

  • Artifact type (e.g., executable files or other relevant artifacts)

  • Endpoint name

  • IP address

  • Windows OS version

  • Action taken (e.g., Block or Alert)

  • Cortex Agent version

    Timeframe:  I will be set manually 

    Cortex XDR 

Please let me know the best way to construct this query or if any additional details are required.

1 REPLY 1

L3 Networker

Hello @Prashanta ,

 

Greetings for the day.

 

To create a query that retrieves security events along with endpoint metadata, you can use the alerts dataset as the primary source. Since details such as the full Windows OS version and Cortex Agent version are most accurately maintained in the endpoints dataset, a left join is recommended to combine these two datasets.

XQL Query
dataset = alerts
| join type = left (dataset = endpoints) as e e.endpoint_name = host_name
| fields
    severity,
    category as artifact_type,
    host_name as endpoint_name,
    host_ip as ip_address,
    e.os_version as windows_os_version,
    action as action_taken,
    e.agent_version as cortex_agent_version
Field Explanations
  • Severity: Retrieved directly from the alerts dataset.

  • Artifact Type: The category field identifies the type of security issue, such as Malware, Exploit, or Behavioral Threat.

  • Action Taken: Displays the outcome of the event, for example ENUM.PREVENTED__BLOCKED_ or Alert.

  • Windows OS Version & Agent Version: Retrieved from the endpoints dataset through the join to ensure the most up-to-date inventory information for the endpoint.

How to Use
  1. Navigate to Investigation > Query Builder.

  2. Switch to the XQL tab.

  3. Paste the query into the editor.

  4. Set the desired Time Range using the manual selector.

  5. Click Run.

Note: If you need to view the specific executable file associated with an alert, you can add action_file_name to the fields list in the query.

 

If you feel this has answered your query, please let us know by clicking like and on "mark this as a Solution".

 

Thanks & Regards,
S. Subashkar Sekar

  • 627 Views
  • 1 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!