Home

Searching for Malwares

Use the search tokens below to search for malwares detected in a container image. Looking for help with writing your query? click here

layerHashlayerHash

Use a text value ##### to specify the layer hash value.

Example

Show malwares detected in this image layer.

layerHash: 3b2c25e647d295b746d012311351909c2cef09a60b2f956024733451cd2124cd

layerMalwareInfo.categorylayerMalwareInfo.category

Use a text value ##### to specify a malware category.

Example

Show malwares of this category.

layerMalwareInfo.category: Pua

layerMalwareInfo.familylayerMalwareInfo.family

Use a text value ##### to specify the malware family.

Example

Show malwares associated with this family.

layerMalwareInfo.family: Suspicious

layerMalwareInfo.predictionlayerMalwareInfo.prediction

Specify the prediction on the nature of the malware. Select a value from the list.

Example

Show malwares predicted to be malicious.

layerMalwareInfo.prediction: Malicious

layerMalwareInfo.severitylayerMalwareInfo.severity

Specify the severity of the malware. Select a value from the list.

Example

Show malwares of this severity.

layerMalwareInfo.severity: 1

layerMalwareInfo.scorelayerMalwareInfo.score

Use a float value #####to specify the score of the malware.

Example

Show malwares with this score.

layerMalwareInfo.score: 1

andand

Use a boolean query to express your query using AND logic.

Example

Show events with type Standard and with action Allow

eventType: STANDARD and action: ALLOW

notnot

Use a boolean query to express your query using NOT logic.

Example

Show events that don't have Deny action

not action: DENY

oror

Use a boolean query to express your query using OR logic.

Example

Show events with one of these actions

action: ALLOW or action: MONITOR


 

 

Was this topic helpful?

success Thank you! We're glad to hear that this topic was useful.
success We appreciate your feedback. We'll work to make this topic better for you in the future.