Use Search and Advanced Search

Use Search and Advanced Search to filter event details. For example, search for events with specific domains but exclude subdomains you are not interested in.

Wildcards are available for some fields (domains, URLs, and file names) to search for varieties within that field. For example, use *.gif in the file name to search for all .gif files.

Table of Contents

👍

Packages and Feature Availability

Features are available based on your Secure Access package. Find your package at Admin > Licensing. For more information, see Determine Your Current Package. If you don't have access to a feature, contact your sales representative.

Prerequisites

  • A minimum user role of Read-only. For more information, see Manage Accounts.

Search

Search the report for domains, identities, or URLs. To search and filter the report by more options, such as threat type or file name, use Advanced Search.

Wildcards

Domains

Domains can be searched in the search bar or advanced search with the wildcard * to include or exclude subdomains.
For example, example.com will search the top-level parent domain of Example, *.example.com will search for only the subdomains of Example, and *example.com will search for both the parent and subdomains of Example.

You can use wildcards to search by top-level domain.
For example, *.example will search for all top-level domains that end in .example.

1440

URLs

The wildcard * can be used in any part of the URL path to search for URLs containing certain terms.
For example, example* will search for URLs containing "example".

File Names

File names can use the wildcard * to search for file types, in Advanced Search only. For example, *.gif will search for all files that are .gifs.

Advanced Search

  1. In the search bar, click Advanced.
  2. In the Advanced Search window, complete the fields:

  • Identity**—Include or exclude sources from your search. Secure Access opens a menu listing sources as soon as you begin typing.
  • Domain—You can search for more than one domain at a time. When you add a domain, a new field appears so that you can add or exclude another domain.
  • SHA256—Search by the hash function.
  • URL—Search by specific URL path.
  • IP Address—Search for events associated with IP addresses on your network (either internal or public egress IP address). This does not provide the capability to search for destination IP addresses.
  • IP Address Port—Search by a firewall port number.
  • Threat—Search by threats.
  • Threat Type—Search by threat type. For more information, see Threat Category Descriptions.
  • Block Reason
  • Transaction ID
  • Public Application
  • Resource/Application
  • Application Group
  • OS Type — Search by operating system from which activity originated.
  • Location — Search by the location from which activity originated.
  • Egress IP Type — Search by the egress IP addresses: shared or reserved.
  • Egress Data Center — Search by the egress data center location from which activity originated.
705
  1. In the Advanced Search pop-up window, add search parameters and click Apply.
    • Identity—Include or exclude sources from your search. Secure Access opens a menu listing sources as soon as you begin typing.
    • Domain—You can search for more than one domain at a time. When you add a domain, a new field appears so that you can add or exclude another domain.
    • SHA256—Search by the hash function.
    • URL—Search by specific URL path.
    • IP Address—Search for events associated with IP addresses on your network (either internal or public egress IP address). This does not provide the capability to search for destination IP addresses.
    • IP Address Port—Search by a firewall port number.
    • Threat—Search by threats.
    • Threat Type—Search by threat type. For more information, see Threat Category Descriptions.
    • File Name—Search by the name of a file.
    • IPS Signature List Names—Search by default and custom IPS Signature List Names. For more information, see Manage IPS.
    • IPS Signatures—Search by IPS signatures. For more information, see Manage IPS Profiles.
    • OS Type — Search by operating system from which activity originated.
    • Location — Search by the location from which activity originated.
    • Egress IP Type —Search by the egress IP addresses: shared or reserved.
    • Egress Data Center —Search by the egress data center location from which activity originated.

Schedule an Activity Search Report < Use Search and Advanced Search > Security Activity Report