Understand the System Searches
Search includes the following out-of-the-box system searches that contain a query plus specific criteria. All of these system searches are set in Normalized Event Time. For more information about how to use these queries and criteria, see Load a Saved Search.
| Category | Name | Use as | Description |
|---|---|---|---|
| Application Monitoring | Windows New Service Created | Query |
Lists events indicating new windows services were created from the following event sources:
|
| Configuration Monitoring | Configuration changes |
Query |
Lists configuration changes based on ArcSight categorization. |
| Entity Monitoring | Failed logins | Query | Lists events indicating failed login activity based on ArcSight categorization. |
| Failed Login Events |
Criteria |
Lists failed login activity events based on ArcSight categorization for the last 30 minutes by default. | |
| Failed logins for $username | Query | Lists events indicating failed login activity based on ArcSight categorization for a specific user. The user should be specified before running the search. | |
| Windows account creation | Query |
Lists events indicating new windows accounts created based on the following event sources:
|
|
| Event Monitoring | ESM Correlation Events | Query | Lists ESM correlation events. |
| Malware Monitoring | Malicious code activity | Query | Lists events indicating malicious code activity based on ArcSight categorization. |
| MITRE Monitoring | MITRE ATT&CK Events |
Criteria |
Lists correlation events reported from Arcsight ESM content package: https://marketplace.microfocus.com/cyberres/content/esm-default-content. These events are forwarded to the ArcSight Database using ArcSight Forwarding connector, or any other flex connector which reports this information, using the following mapping: deviceCustomString6Label=’MITRE ID’ Where deviceCustomString6 contains the actual MITRE ATT&CK technique. |
| Network Monitoring | DGA Events |
Criteria |
Lists DGA-related events based on Microsoft Trace Log. |
| DNS Events |
Query |
Lists DNS-related events. | |
| DoS Events |
Criteria |
Lists events indicating denial of service based on ArcSight categorization. | |
| Firewall drop | Query | Lists Drop Firewall events based on Arcsight categorization for a specific IP address. The IP address should be provided at runtime. | |
| Firewall drop for $ip | Lists Drop Firewall events based on Arcsight categorization. | ||
| Firewall Events |
Criteria |
Lists Firewall events based on ArcSight categorization. | |
| Proxy Events |
Criteria |
Lists Proxy events based on ArcSight categorization. | |
| SSH authentication | Query | Lists events indicating SSH Authentication events based on ArcSight categorization. | |
| VPN connections | Query | Lists events indicating VPN connections based on ArcSight Categorization. | |
| Vulnerability Monitoring | Vulnerabilities Events |
Criteria |
Lists events indicating vulnerabilities based on ArcSight categorization and Vulnerability Scanner events. |