Searching for Events

Cisco appliances generate information that is stored as events in database tables. Events contain multiple fields that describe the activity that caused the appliance to generate the event.

The FireSIGHT System provides predefined searches that serve as examples and can provide quick access to important information about your network. You can modify fields within the predefined searches for your network environment, then save the searches to reuse later. You can also use your own search criteria.

The search criteria you can use depends on the type of search, but the mechanics are the same. See the following sections for more information on how to perform a search and on the correct syntax to use in search fields:

Performing and Saving Searches

License: Any

You can create and save searches for any of the different event types. When you create a search you give it a name and specify whether the search will be available to you alone or to all users of the appliance. If you want to use the search as a data restriction for a custom user role, you must save it as a private search.

For more information, see the following sections:


Note To search a custom table, follow a slightly different procedure; see Searching Custom Tables.


Performing a Search

License: Any

For some event types, the FireSIGHT System provides predefined searches that serve as examples and can provide quick access to important information about your network. You can modify fields within the predefined searches for your network environment, then save the searches to reuse later. You can also use your own search criteria.

To perform a search:

Access: Admin/Any Security Analyst


Step 1 Select Analysis > Search .

The Search page appears.

Step 2 From the table drop-down list, select the type of event or data to search.

The page updates with the appropriate search constraints.

Step 3 Enter your search criteria in the appropriate fields:

    • All fields accept negation ( ! ).
    • All fields accept comma-separated lists of search values. Records that contain any of the listed values in the specified field match that search criteria.
    • All fields accept comma-separated lists enclosed in quotation marks as search values.

– For fields that may contain only a single value, records with the specified field containing the exact string specified within the quotation marks match the search criteria. For instance, a search for A, B, "C, D, E" will match records where the specified field contains "A" or "B" or "C, D, E" . This permits matching on fields that include the comma in possible values.

– For fields that may contain multiple values at the same time, records with the specified fields containing all of the values in the quote-enclosed comma-separated list match that search criteria.

– For fields that may contain multiple values at the same time, search criteria may include single values as well as quote-enclosed comma-separated lists. For instance, a search for A, B, "C, D, E" on a field that may contain one of more of these letters matches records where the specified field contains A or B , or all of C , D , and E .

    • Searches return only records that match the search criteria specified for all fields.
    • Many fields accept one or more asterisks ( * ) as wild cards.
    • Specify n/a in any field to identify events where information is not available for that field; use !n/a to identify the events where that field is populated.
    • Click the add object icon (
    ) that appears next to a search field to use an object as a search criterion.

Step 4 See the following sections for detailed information on the search criteria you can use:

Step 5 Optionally, if you plan to save the search, you can select the Private check box to save the search as private so only you can access it. Otherwise, leave the check box clear to save the search for all users.


Tip If you want to use the search as a data restriction for a custom user role, you must save it as a private search.


Step 6 Optionally, you can save the search to be used again in the future. You have the following options:

    • Click Save to save the search criteria.

For a new search, a dialog box appears prompting for the name of the search; enter a unique search name and click Save . If you save new criteria for a previously-existing search, no prompt appears. The search is saved (and visible only to your account if you selected Private ) so that you can run it at a later time.

    • Click Save As New to save a new search or assign a name to a search you created by altering a previously-saved search.

A dialog box appears prompting for the name of the search; enter a unique search name and click Save . The search is saved (and visible only to your account if you selected Private ) so that you can run it at a later time.

Step 7 Click Search to start the search.

Your search results appear in the default workflow for the table you are searching, constrained by time (if applicable). To use a different workflow, including a custom workflow, click (switch workflow) by the workflow title. For information on specifying a different default workflow, see Configuring Event View Settings. Note that you cannot use a different workflow for scan results.


 

Loading a Saved Search

License: Any

If you previously saved a search, you can load it, make any necessary modifications, and then start the search.

To load a saved search:

Access: Admin/Any Security Analyst


Step 1 You have the following options:

    • From any page on a workflow, click Search .
    • Select Analysis > Search , then select the type of events you want to search for.

The Search page appears.

Step 2 Select the search you want to load from the Custom Searches list or the Predefined Searches list.

Settings from the saved search populate the search constraints.

Step 3 Optionally, change the search constraints.

Step 4 Click Search .

The events that match your search constraints appear.


 

Deleting a Saved Search

License: Any

If you have saved searches, you can delete them from the Search page.

To delete a saved search:

Access: Admin/Any Security Analyst


Step 1 You have the following options:

    • From any page on a workflow, click Search .
    • Select Analysis > Search , then select the event type for the search that you want to delete.

The Search page appears.

Step 2 From the Custom Searches list, select the search you want to delete and click the delete icon ( ) that appears next to the search name.

The search is deleted.


 

Using Wildcards and Symbols in Searches

License: Any

Many text fields on search pages allow you to use an asterisk (*) to match characters in a string. For example, specifying net* matches network , netware , netscape , and so on.

If you want to search for non-alphanumeric characters (including the asterisk character), enclose the search string in quotation marks. For example, to search for the string:

Find an asterisk (*)

enter:

"Find an asterisk (*)"

Note that in text fields that allow a wildcard, you must use the wildcard if you want to match a partial string. For example, if you are searching the audit log for all audit records that involve page views (that is, the message is Page View), searching for Page returns no results. Instead, specify Page* .

Using Objects and Application Filters in Searches

License: Any

The FireSIGHT System allows you to create named objects, object groups, and application filters that can be used as part of your network configuration. You can use these objects, groups, and filters as search criteria when performing or saving searches.

When you perform a search, objects, object groups, and application filters appear in the format, ${object_name} . For example, a network object with the object name ten_ten_network appears as ${ten_ten_network} in a search.

You can click the add object icon ( ) that appears next to a search field where you can use an object as a search criterion.

Specifying Time Constraints in Searches

License: Any

You can use a number of formats for specifying time search constraints. You can enter a time you want to match, and, optionally, a less than ( < ) or greater than ( > ) operator to match times before or after the time you enter.

The formats accepted by search criteria fields that take a time value are shown in the following table.

 

Table 60-1 Time Specification in Search Fields

Time Formats
Example

today [at HH:MMam|pm]

today

today at 12:45pm

YYYY-MM-DD HH:MM:SS

2006-03-22 14:22:59

You can precede a time value with one of the following operators/keyword.

 

Table 60-2 Time Specification Operators

Operator
Example
Explanation

<

< 2006-03-22 14:22:59

Returns events with a timestamp before 2:23 PM, March 22, 2006.

>

> today at 2:45pm

Returns events with a timestamp later than today at 2:45 PM.

Specifying IP Addresses in Searches

License: Any

When specifying IP addresses in searches, you can enter an individual IP address, a comma-separated list of addresses, an address block, or a range of IP addresses separated with a hyphen (-). You can also use negation.

For searches that support IPv6 (such as intrusion event, connection data, and correlation event searches) you can enter IPv4 and IPv6 addresses and CIDR/prefix length address blocks in any combination.

When you use CIDR or prefix length notation to specify a block of IP addresses, the FireSIGHT System uses only the portion of the network IP address specified by the mask or prefix length. For example, if you type 10.1.2.3/8 , the FireSIGHT System uses 10.0.0.0/8 .

The following table contains examples of valid ways to enter IP addresses. Because IP addresses can be represented by network objects, you can also click the add network object icon ( ) that appears next to an IP address search field to use a network object as an IP address search criterion. For more information, see Using Objects and Application Filters in Searches.

 

Table 60-3 Acceptable IP Address Syntax

To specify...
Type...
For example...

a single IP address

the IP address.

192.168.1.1

2001:db8::abcd

multiple IP addresses using a list

a comma-separated list of IP addresses. Do not add a space before or after the commas.

192.168.1.1,192.168.1.2

2001:db8::b3ff,2001:db8::0202

a range of IP addresses that can be specified with a CIDR block or prefix length

the IP address block in IPv4 CIDR or IPv6 prefix length notation.

192.168.1.0/24

This specifies any IP in the 192.168.1.0 network with a subnet mask of 255.255.255.0, that is, 192.168.1.0 through 192.168.1.255. For more information, see IP Address Conventions.

a range of IP addresses that cannot be specified with a CIDR block or prefix

the IP address range using a hyphen. Do not add a space before or after the hyphen.

192.168.1.1-192.168.1.5

2001:db8::0202-2001:db8::8329

negation of any of the other ways to specify IP addresses or ranges of IP addresses

an exclamation point in front of the IP address, block, or range.

192.168.0.0/32,!192.168.1.10

!2001:db8::/32

!192.168.1.10,!2001:db8::/32

Specifying Devices in Searches

License: Any

When creating a search using a managed device as a constraint, you can specify any of the following in the Device search criteria field:

  • A managed device name, IP address, or host name
  • A device group name
  • A device stack name
  • A device cluster name

If the system finds a match for a group, cluster, or stack, it replaces the group, cluster, or stack name with the appropriate member device names for the purpose of performing the search. When you save a search that uses a device group, cluster, or stack in the device field the system saves the name specified in the device field and performs the device name replacement again each time the search is executed.

See the following sections for more information:

Specifying Ports in Searches

License: Any

The FireSIGHT System accepts specific syntax for port numbers in searches. You can enter:

  • a single port number
  • a comma-separated list of port numbers
  • two port numbers separated by a dash to represent a range of port numbers
  • a port number followed by a protocol abbreviation, separated by a forward slash (only when searching for intrusion events)
  • a port number or range of port numbers preceded by an exclamation mark to indicate a negation of the specified ports

Note Do not use spaces when specifying port numbers or ranges.


The following table contains examples of valid ways to enter ports as search constraints.

\

Table 60-4 Port Syntax Examples

Example
Description

21

Returns all events on port 21, including TCP and UDP events.

!23

Returns all events except those on port 23.

25/tcp

Returns all TCP-related intrusion events on port 25.

21/tcp,25/tcp

Returns all TCP-related intrusion events on ports 21 and 25

21-25

Returns all events on ports 21 through 25.

Stopping Long-Running Queries

License: Any

Supported Devices: Any Defense Center

System administrators can use a shell-based query management tool to locate and stop long-running queries.


Note Leaving the search page in the web interface does not stop a query. Queries that take a long time to return results impact overall system performance while the query is running.


The query management tool allows you to locate queries running longer than a specified number of minutes and stop those queries. The tool logs an event to the audit log and to syslog when you stop a query.

Note that the only locally-created user with shell access on Defense Centers is the admin user. If you use an external authentication object which grants shell access, users matching the shell access filter can also log into the shell.

Usage:

query_manager [-v] [-l [minutes]] [-k query_id [...]]
[--kill-all minutes]

Options:

-h, --help

Prints a brief help message.

-l, --list [minutes]

Lists all queries taking longer than passed in minutes. By

default it will show all queries taking longer than 1 minute.

-k, --kill query_id [...]

Kills the query with the passed in id. The option can take

multiple ids.

--kill-all minutes

Kills all queries taking longer than passed in minutes.

-v, --verbose

Verbose output including full SQL queries.


Caution Shell access should be limited to system administrators.

To stop a query on the Defense Center:

Access: admin or other user granted shell access


Step 1 Connect to the Defense Center via ssh .

Step 2 Run query_manager under sudo using the syntax described above.