Event Searches
The system generates information that is stored as events in database tables. Events contain multiple fields that describe the activity that caused the appliance to generate the event. You can create and save searches customized for your environment for any of the different event types and save them to reuse later.
When you save a search you give it a name and specify whether the search will be available to you alone or to all users of the appliance. If you want to use the search as a data restriction for a custom user role, you must save it as a private search. If you previously saved a search, you can load it, make any necessary modifications, and then start the search. Custom analysis dashboard widgets, report templates, and custom roles can also use saved searches. If you have saved searches, you can delete them from the Search page.
For some event types, the system provides predefined searches that serve as examples and can provide quick access to important information about your network. You can modify fields within the predefined searches for your network environment, then save the searches to reuse later.
The search criteria you can use depends on the type of search, but the mechanics are the same. Searches return only records that match the search criteria specified for all fields.
Note |
Searching a custom table requires a slightly different procedure. |
Search Constraints
Each database table has its own search page where you can enter search constraint values to apply to fields defined for the table. Depending on the type of field, special syntax may be used to specify criteria such as wildcard characters or a range of numeric values.
Search results appear on workflow pages displaying each table field in columnar layout. Some database tables can additionally be searched using fields that are not displayed as columns on workflow pages. To determine whether such a constraint applies to your search results when viewing the results on a workflow page, click Expand Arrow () to view the active search constraints.
General Search Constraints
When searching for events, observe the following general guidelines:
-
Many fields require wildcards for partial-match searches. All fields accept wildcards for these searches.
-
All fields accept negation (
!
). -
All fields accept comma-separated lists of search values. Records that contain any of the listed values in the specified field match that search criteria.
-
All fields accept comma-separated lists enclosed in quotation marks as search values.
-
For fields that may contain only a single value, records with the specified field containing the exact string specified within the quotation marks match the search criteria. For instance, a search for
A, B, "C, D, E"
will match records where the specified field contains"A"
or"B"
or"C, D, E"
. This permits matching on fields that include the comma in possible values. -
For fields that may contain multiple values at the same time, records with the specified fields containing all of the values in the quote-enclosed comma-separated list match that search criteria.
-
For fields that may contain multiple values at the same time, search criteria may include single values as well as quote-enclosed comma-separated lists. For instance, a search for
A, B, "C, D, E"
on a field that may contain one of more of these letters matches records where the specified field containsA
orB
, or all ofC
,D
, andE
.
-
-
Specify
n/a
in any field to identify events where information is not available for that field; use!n/a
to identify the events where that field is populated. -
You can precede many numeric fields with greater than (
>
), greater than or equal to (>=
), less than (<), less than or equal to (<=
), equal to (=
), or not equal to (<>
) operators.
Tip |
When searching a field with long complicated values (such as SHA-256 hash values), you can copy the search criteria value from source material and paste it into the appropriate field on the search page. |
Wildcards and Symbols in Searches
When searching in all text fields in connection and Security Intelligence events and in most text fields in other event types, searches for partial matches in text fields require an asterisk (*) to represent unspecified characters in a string. Searches without an asterisk are exact-match searches in these fields. Even in fields that do not require wildcards, we recommend always using wildcards for partial-match searches.
For example, to find example.com
, www.example.com
, or department.example.com
, search for *.example.com
. Searching for example.com
in most cases returns only example.com
.
If you want to search for non-alphanumeric characters (including the asterisk character), enclose the search string in quotation marks. For example, to search for the string:
Find an asterisk (*)
enter:
"Find an asterisk (*)"
Objects and Application Filters in Searches
The system allows you to create named objects, object groups, and application filters that can be used as part of your network configuration. You can use these objects, groups, and filters as search criteria when performing or saving searches.
When you perform a search, objects, object groups, and
application filters appear in the format,
${object_name}
. For example, a network object with the
object name
ten_ten_network
appears as
${ten_ten_network}
in a search.
You can click Object () that appears next to a search field where you can use an object as a search criterion.
Time Constraints in Searches
The formats accepted by search criteria fields that take a time value are shown in the following table.
Time Formats |
Example |
---|---|
|
|
|
|
You can precede a time value with one of the following operators:
Operator |
Example |
Explanation |
---|---|---|
|
|
Returns events with a timestamp before 2:23 PM, March 22, 2006. |
|
|
Returns events with a timestamp later than today at 2:45 PM. |
IP Addresses in Searches
When specifying IP addresses in searches, you can enter an individual IP address, a comma-separated list of addresses, an address block, or a range of IP addresses separated with a hyphen (-). You can also use negation.
For searches that support IPv6 (such as intrusion event, connection data, and correlation event searches) you can enter IPv4 and IPv6 addresses and CIDR/prefix length address blocks in any combination. When you search for hosts by IP address, the results include all hosts for which at least one IP address matches your search conditions, that is, a search for an IPv6 address may return hosts whose primary address in IPv4.
When you use CIDR or prefix length notation to specify a block
of IP addresses, the system uses
only the portion of the network IP address specified by the
mask or prefix length. For example, if you type
10.1.2.3/8
, the system uses
10.0.0.0/8
.
Because IP addresses can be represented by network objects, you can also click the add network Object () that appears next to an IP address search field to use a network object as an IP address search criterion.
To specify... |
Type... |
For example... |
---|---|---|
a single IP address |
the IP address. |
|
multiple IP addresses using a list |
a comma-separated list of IP addresses. Do not add a space before or after the commas. |
|
a range of IP addresses that can be specified with a CIDR block or prefix length |
the IP address block in IPv4 CIDR or IPv6 prefix length notation. |
This specifies any IP in the 192.168.1.0 network with a subnet mask of 255.255.255.0, that is, 192.168.1.0 through 192.168.1.255. |
a range of IP addresses that cannot be specified with a CIDR block or prefix |
the IP address range using a hyphen. Do not add a space before or after the hyphen. |
|
negation of any of the other ways to specify IP addresses or ranges of IP addresses |
an exclamation point in front of the IP address, block, or range. |
|
hosts that are blocked or monitored (but would have been blocked) See Host Profile Icons. |
In connection and Security Intelligence events, in Initiator IP and Responder IP fields:
|
-- |
URLs in Searches
When searching for URLs, include wildcards. For example, use *example.com* to find all variations of the domain, such as https://example.com and division.example.com and example.com/division/.
Managed Devices in Searches
If you group devices—whether just on the FMC, or as actual high availability or scalability configurations—searching for the name for the group correctly returns results for all devices in the group.
If the system finds a match for a group, it replaces the group name with the appropriate member device names for the purpose of performing the search. When you save a search that uses a device group in the device field the system saves the name specified in the device field and performs the device name replacement again each time the search is executed.
Ports in Searches
The system accepts specific syntax for port numbers in searches. You can enter:
-
a single port number
-
a comma-separated list of port numbers
-
two port numbers separated by a dash to represent a range of port numbers
-
a port number followed by a protocol abbreviation, separated by a forward slash (only when searching for intrusion events)
-
a port number or range of port numbers preceded by an exclamation mark to indicate a negation of the specified ports
Note |
Do not use spaces when specifying port numbers or ranges. |
Example |
Description |
---|---|
|
Returns all events on port 21, including TCP and UDP events. |
|
Returns all events except those on port 23. |
|
Returns all TCP-related intrusion events on port 25. |
|
Returns all TCP-related intrusion events on ports 21 and 25. |
|
Returns all events on ports 21 through 25. |
Event Fields in Searches
-
See Nmap Scan Results Fields in the Firepower Management Center Device Configuration Guide
Performing a Search
You must have Admin or Security Analyst privileges to perform a search.
Procedure
Step 1 |
Select .
|
||
Step 2 |
From the table drop-down list, select the type of event or data to search. |
||
Step 3 |
Enter your search criteria in the appropriate fields. See the following sections for detailed information on the search criteria you can use:
|
||
Step 4 |
If you want to use the search again in the future, save the search as described in Saving a Search. |
||
Step 5 |
Click Search to start the search. Your search results appear in the default workflow for the table you are searching, constrained by time (if applicable). |
What to do next
-
To analyze the search results using workflows, see Using Workflows.
Saving a Search
You must have Admin or Security Analyst privileges to save a search.
In a multidomain deployment, the system displays saved searches created in the current domain, which you can edit. It also displays searches saved in ancestor domains, which you cannot edit. To view and edit searches created in a lower domain, switch to that domain.
Before you begin
-
Establish search criteria as described in Performing a Search, or load a saved search as described in Loading a Saved Search.
Procedure
Step 1 |
From the Search page, if you want to save the search as private so only you can access it, check the Private checkbox.
|
||
Step 2 |
You have two options:
|
Loading a Saved Search
You must have Admin or Security Analyst privileges to load a saved search.
In a multidomain deployment, the system displays saved searches created in the current domain, which you can edit. It also displays searches saved in ancestor domains, which you cannot edit. To view and edit searches created in a lower domain, switch to that domain.
Procedure
Step 1 |
Choose .
|
||
Step 2 |
From the table drop-down list, choose the type of event or data to search. |
||
Step 3 |
Choose the search you want to load from the Custom Searches list or the Predefined Searches list. |
||
Step 4 |
If you want to use different search criteria, change the search constraints. |
||
Step 5 |
If you want to use a changed search again in the future, save the search as described in Saving a Search. |
||
Step 6 |
Click Search. |