Home

Searching for Secret Detectors

Use the search tokens below to search for secret detectors. Looking for help with writing your query? click here

container.secretDetector.namecontainer.secretDetector.name

Use a text value ##### to specify the name of the secret detector.

Example

Show secret detectors with this name.

container.secretDetector.name: 'AWS Access Key Id'

container.secretDetector.categorycontainer.secretDetector.category

Use a text value ##### to specify the category of the secret detector.

Example

Show secret detectors associated with this category.

container.secretDetector.category: AsymmetricPrivateKey

container.secretDetector.statuscontainer.secretDetector.status

Use a text value ##### to specify the status of the secret detectors. The valid values are "Active" and "Inactive".

Example

Show secret detectors with this status.

container.secretDetector.status: active

container.secretDetector.typecontainer.secretDetector.type

Use a text value ##### to specify the type of the secret detector. The valid values are "system" and "custom".

Example

Show system-defined secret detectors.

container.secretDetector.type: 'system'

container.secretDetector.severitycontainer.secretDetector.severity

Use a test value ##### to specify the severity of the secret detector. The valid values are "LOW", "MEDIUM", "HIGH", and "CRITICAL".

Examples

Show secret detectors of this severity.

container.secretDetector.severity: "HIGH"

andand

Use a boolean query to express your query using AND logic.

Example

Show events with type Standard and with action Allow

eventType: STANDARD and action: ALLOW

notnot

Use a boolean query to express your query using NOT logic.

Example

Show events that don't have Deny action

not action: DENY

oror

Use a boolean query to express your query using OR logic.

Example

Show events with one of these actions

action: ALLOW or action: MONITOR