Find Attack discoveries that match the search criteria
Technical Preview; added in 9.2.0
Spaces method and path for this operation:
Refer to Spaces for more information.
Find Attack discoveries that match the search criteria. Supports free text search, filtering, pagination, and sorting. Technical preview
Query parameters
-
Filter results to Attack discoveries that include any of the provided alert IDs
-
Filter results to Attack discoveries created by any of the provided human readable connector names. Note that values must match the human readable
connector_nameproperty of an Attack discovery, e.g. "GPT-5 Chat", which are distinct fromconnector_idvalues used to generate Attack discoveries. -
Enables a markdown syntax used to render pivot fields, for example
{{ user.name james }}. When disabled, the same example would be rendered asjames. This is primarily used for Attack discovery views within Kibana. Defaults tofalse.Default value is
false. -
End of the time range for the search. Accepts absolute timestamps (ISO 8601) or relative date math (e.g. "now", "now-24h").
-
Filter results to the Attack discoveries with the specified IDs
-
If
true, the response will includeunique_alert_idsandunique_alert_ids_countaggregated across the matched Attack discoveries -
Page number to return (used for pagination). Defaults to 1.
Minimum value is
1. Default value is1. -
Number of Attack discoveries to return per page (used for pagination). Defaults to 10.
Minimum value is
1. Default value is10. -
Free-text search query applied to relevant text fields of Attack discoveries (title, description, tags, etc.)
-
Field used to sort results. See
AttackDiscoveryFindSortFieldfor allowed values.Value is
@timestamp. -
Sort order direction
ascfor ascending ordescfor descending. Defaults todesc.Values are
ascordesc. -
Start of the time range for the search. Accepts absolute timestamps (ISO 8601) or relative date math (e.g. "now-7d").
-
Filter by alert workflow status. Provide one or more of the allowed workflow states.
Values are
acknowledged,closed, oropen. -
When true, return the created Attack discoveries with text replacements applied to the detailsMarkdown, entitySummaryMarkdown, summaryMarkdown, and title fields. Defaults to
true.Default value is
true.
curl \
--request GET 'http://localhost:5601/api/attack_discovery/_find?end=now&include_unique_alert_ids=false&page=1&per_page=10&search=&sort_field=%40timestamp&sort_order=desc&start=now-24h&status=open&status=acknowledged' \
--header "Authorization: $API_KEY" \
--header "Content-Type: application/json"