Review potential security issues with Google Security Operations

This document describes how to conduct searches when investigating alerts and potential security issues using Google Security Operations.

Before you begin

Google Security Operations is designed to work exclusively with the Google Chrome or Mozilla Firefox browsers.

Google recommends upgrading your browser to the most current version. You can download the latest version of Chrome from https://www.google.com/chrome/ .

Google SecOps is integrated into your single sign-on solution (SSO). You can log in to Google SecOps using the credentials provided by your enterprise.

  1. Launch Chrome or Firefox.

  2. Ensure you have access to your corporate account.

  3. To access the Google SecOps application, where customer_subdomain is your customer-specific identifier, navigate to: https:// customer_subdomain .backstory.chronicle.security.

Viewing Alerts and IOC Matches

  1. In the navigation bar, select Detections > Alerts and IOCs.

  2. Click the IOC Matchestab.

Searching for IOC matches in Domainview

The Domaincolumn in the IOC Domain Matchestab contains a list of suspect domains. Clicking on a domain in this column opens Domainview, as shown in the following figure, providing detailed information about this domain.

Domain View Domainview

Using the Google Security Operations Search field

Initiate a search directly from the Google Security Operations home page, as shown in the following figure.

Search FieldGoogle Security Operations Searchfield

On this page, you can enter the following search terms:

  • Hostname displays Domainview
(for example, plato.example.com)
  • Domain displays Domainview
(for example, altostrat.com)
  • IP address displays IP Addressview
(for example, 192.168.254.15)
  • URL displays Domainview
(for example, https://new.altostrat.com)
  • Username displays Assetview
(for example, betty-decaro-pc)
  • File hash displays Hashview
(for example, e0d123e5f316bef78bfdf5a888837577)

You do not have to specify which type of search term you are entering, Google Security Operations determines it for you. The results are shown in the appropriate investigative view. For example, typing a username in the search field displays Assetview.

Searching raw logs

You have the option of searching the indexed database or searching raw logs. Searching raw logs is a more comprehensive search, but takes longer than an indexed search.

To further pinpoint your search, you can use regular expressions, make the search entry case sensitive, or select log sources. You can also select the timeline you want using the Startand Endtime fields.

To conduct a raw log search, complete the following steps:

  1. Type in your search term, and then select Raw Log Scanin the dropdown menu, as shown in the following figure.

    Raw Log Scan menuDropdown menu showing Raw Log Scanoption

  2. After setting your raw search criteria, click the Searchbutton.

  3. From Raw Log Scanview, you can further analyze your log data.

Create a Mobile Website
View Site in Mobile | Classic
Share by: