Assets Search Tokens

This section includes the Assets and the Anti-malware specific search tokens that you can run on the Assets tab:

Generic Tokens

andand

Use a boolean query to express your query using AND logic.

Example

To show file created events on certain date and asset name, see the following example:

file.name: MWP_MALICIOUSJ.exe and response.status: success

notnot

Use a boolean query to express your query using NOT logic.

Example

To show events that are not on a certain asset name, see the following example:

not asset.hostName: `WIN-BU2-5555`

oror

Use a boolean query to express your query using OR logic.

Example

To show events on files created by jsmith or kwang, see the following example:

file.creator: jsmith or file.creator: kwang

Assets Tokens

agent.idagent.id

Use a text value to find an agent ID.

Example

To show events for a certain agent ID, see the following example:

agent.id:f0c8e682-e9cc-4e7d-b92a-0c905d81ec74

asset.createdDateasset.createdDate

Type your dropdown text here

asset.hostnameasset.hostname

Use quotes or backticks with value to find assets with the hostname.

Examples

To show any events related to name see the following example:

asset.hostname: WIN-BU2-4322

To show any events that contain parts of name see the following example:

asset.hostname: "WIN-BU2-4322"

To show events that match exact name see the following example:

asset.hostname: `WIN-BU2-4322`

asset.lastReportedTimeasset.lastReportedTime

Use this token to show last reported time of the asset, before the specific date and time.

Example

To show assets with the last reported time before 6:30 on 10th February 2023 see the following example:

asset.lastReportedTime>"2023-02-10T06:30:12Z"

asset.lastUpdatedDateasset.lastUpdatedDate

Use this token to show last updated time of the asset.

Example

To show assets with the last updated time as 10:30 on 2nd April 2023

asset.lastUpdatedDate:2023-04-02T10:30:12Z

operatingSystem.nameoperatingSystem.name

Use an integer value to find events by their agent id.

Example

To show events with an agent id see the following example:

operatingSystem.name: `Microsoft Windows 10 Pro 10.0.18363 64-bit N/A Build 18363`

agent.platformagent.platform

Use quotes or backticks with value to find events with the platform.

Examples

To show any events related to platform WINDOWS see the following example:

agent.platform: `WINDOWS`

To show any events related to platform WINDOWS and LINUX see the following example:

agent.platform: ["WINDOWS", "LINUX"]

asset.criticalityScoreasset.criticalityScore

Use an integer value to filter assets based on criticality score.

Example

To show assets based on criticality score see the following example:

asset.criticalityScore: 2

asset.tag.nameasset.tag.name

Use quotes or backticks within values to help you find the asset with the tag name. Quotes can be used when the value has more than one word.

Examples

To show any findings related to this tag name see the following example:

asset.tag.name: Cloud Agent

To show any findings that contain "Cloud" or "Agent" in name see the following example:

asset.tag.name: "Cloud Agent"

To show any findings that match exact value see the following example:

asset.tag.name: `Cloud Agent`

asset.tag.idasset.tag.id

Use a string value to filter the list of assets based on the tag id.

Example

To show any findings related to this tag id see the following example:

asset.tag.id: 43954857

asset.typeasset.type

Use the string value to filter the assets that are of the type Hosts. You can select the asset type from the drop-down of the token in the EDR UI.

Example

To show any findings related to this asset of the type HOST see the following example:

asset.type: HOST

asset.avProfile.nameasset.avProfile.name

Use the string value to filter the assets for which you have assigned an Anti-malware profile name.

Example

To show any findings related to this anti-malware profile name see the following example:

asset.avProfile.name: EDR-assets

agent.versionagent.version

Use an integer value to filter assets based on the Agent Version.

Example

To show any findings related to this anti-malware profile name see the following example:

agent.version: 4.6.1

Anti-malware Tokens

antiMalware.engineVersionantiMalware.engineVersion

Use an integer value to filter assets based on the antimalware engine version.

Example

To show assets based on the antimalware engine version, see the following example:

antiMalware.engineVersion:1.2

antiMalware.lastScanDateantiMalware.lastScanDate

Use this token for filtering assets based on the last Antimalware scan time.

Example

To show assets that were last scanned on 10th April see the following example:

antiMalware.lastScanDate:2023-04-10

antiMalware.lastReportedTimeantiMalware.lastReportedTime

Use this token to show last reported time of the antimalware, before specific date and time. You can also view the last reported time in the Asset Details in EDR under the Security section as Last Signature Update Time. 

Example

To show assets that have last reported time as 6:30 on 10th February 2023 see the following example:

antiMalware.lastReportedTime < "2023-02-10T06:30:12Z"

antiMalware.productVersionantiMalware.productVersion

Use this token to filter assets based on the antimalware product version.

Example

To show assets based on the antimalware product version, see the following example:

antiMalware.productVersion:1.2.3

antiMalware.scanStatusantiMalware.scanStatus

Use this token to filter assets based on the antimalware scan status.

Example

To show assets based on antimalware scan see the following example:

antiMalware.scanStatus:Pass

antiMalware.statusantiMalware.status

Use this token to filter assets based on their antimalware status.

Example

To show assets based on antimalware status, see the following example:

antiMalware.status:Downloading

antiMalware.statusCategoryantiMalware.statusCategory

Use this token to filter assets based on their antimalware status category.

Example

To show assets based on their antimalware status category, see the following example:

antiMalware.statusCategory:Enabled

antiMalware.errorCodeantiMalware.errorCode

Use this token to filter assets based on the antimalware error code.

Example>

To show assets based on their antimalware error code, see the following example:

antiMalware.errorCode:Success

antiMalware.workflowantiMalware.workflow

Use the string values to get asset(s) with the Anti-Malware Status Workflow type. You can select the workflow type from the drop-down in the EDR UI. The anti-malware workflow values include the following:

  • APP_REMOVER
  • DOWNLOAD: The anti-malware is downloaded. 
  • DOWNLOADING: The anti-malware is in the process of getting downloaded.
  • ENABLEMENT: The anti-malware is in the process of getting uninstall.
  • INSTALLATION: The anti-malware is installed.
  • INSTALLING: The anti-malware is in the process of getting installing.
  • UNINSTALLATION: The anti-malware is uninstalled.
  • UPDATE: The anti-malware is updated.
  • UPDATING: The anti-malware is in the process of getting updated. 

antiMalware.profileIdantiMalware.profileId

Use the string value to filter assets based on the anti-malware profile id.

Example

To show assets based on their antimalware profile, see the following example:

antiMalware.profileId:0b59cdac-814e-4f26-ac6f-f804e7c8d632

antiMalware.profileNameantiMalware.profileName

Use this token to filter assets based on the antimalware profile name.

Example

To show assets based on their antimalware profile, see the following example:

antiMalware.profileName:Qualys EDR

antiMalware.isEnabledantiMalware.isEnabled

Use a boolean value to find assets that have Antimalware enabled.

Example

To show the list of assets that have antimalware enabled see the following example:

antiMalware.isEnabled: true

antiMalware.isUpToDateantiMalware.isUpToDate

Use a boolean value to find if the asset has latest antimalware installed.

Example

To show the list of assets that have latest antimalware see the following example:

antiMalware.isUpToDate: true

response.actionresponse.action

Use a string value to find assets with response action (Anti-malware Install, Delete File, Kill Process, Quarantine File or Unquarantine File, Quarantine Asset or Unquarantine Asset).

Example

To show assets with a response action see the following example:

response.action:Kill Process

response.statusresponse.status

Use a string value to find assets with response status (failed, in_progress, success).

Example

To show assets with a response status see the following example:

response.status:success

antiMalware.isRemovedByTPRTantiMalware.isRemovedByTPRT

Use this token to filter out assets where the agent has successfully removed third-party antimalware.

Example

To show the list of assets where the agent has successfully removed third-party antimalware, see the following example:

antiMalware.isRemovedByTPRT: true

antiMalware.isUninstallSupportedByTPRTantiMalware.isUninstallSupportedByTPRT

Use this token to filter out assets where the agent has detected third-party anti-malware products that can be uninstalled.

Example

To show the list of assets where the agent has detected an unsupported third-party antimalware product that can be uninstalled, see the following example:

antiMalware.isUninstallSupportedByTPRT: true

antiMalware.supportedProductNameByTPRTantiMalware.supportedProductNameByTPRT

Use this token to filter out assets based on third-party antimalware product name.

Example

To show the list of assets based on third-party antimalware product names, see the following example:

antiMalware.supportedProductNameByTPRT: Qualys EDR

antiMalware.supportedProductVendorByTPRTantiMalware.supportedProductVendorByTPRT

Use this token to filter out assets based on third-party antimalware product's vendor name.

Example

To show the list of assets based on third-party antimalware product's vendor name, see the following example:

antiMalware.supportedProductVendorByTPRT: EDR

antiMalware.supportedProductVersionByTPRTantiMalware.supportedProductVersionByTPRT

Use this token to filter out assets based on third-party antimalware product version.

Example

To show the list of assets based on third-party antimalware product version, see the following examples:

Use backtick to search for the exact version:

antiMalware.supportedProductVersionByTPRT: '1.2.3'

Use double quotes to search asset that contains the given version:

antiMalware.supportedProductVersionByTPRT: "1.2"

state state

Use the text value to filter asset state.

Example

To show assets with a specific state see the following example:

state: ACTIVE