Skip to content

Data fields for Search

You must join the EAP to use this feature.

You can search the Data Lake for indicators of compromise (IOCs) or for other data such as IP addresses or usernames. See Search.

The Schema pane on the Search page shows the data fields you can include in your search.

Each data field has a symbol next to it:

  • T is a text field. This is indexed when it reaches the Data Lake. You can search these fields without wildcards.

  • # is a number field. You must use wildcards when you search these fields.

Here's a full list of the data fields.

Field type Description
src_ip IP address that started a connection to a secondary system
dest_ip IP address to which a system connected
logon_type Authentication method used to log on to an account
logon_process Process used to log on to an account
logon_protocol Protocol used to log on to an account
dest_username Name of account that was invoked to take an action
password_last_set Date of the most recent password reset
task_name Name of the Windows Scheduled Task
file_path File path of the file involved in the event
process_path File path of the process that was run
url URL that was accessed by the device
domain_name Name of the domain that was accessed
command_line Command line entry
parent_process_path File path of the process that created this child process
parent_command_line Previous command-line entry
win_src_domain Name of Windows domain from which an account logon originated
win_dest_domain Name of Windows domain that an account accessed
registry_path File path of the registry file involved
dest_server Target server that was accessed or changed
service_name Name of the service involved
service_start_type Startup type for the Windows service
service_type Name of the service type involved
run_as_username Username invoked to run a specific process
parent_process_id Process ID of the process that created this child process
file_name Name of the file involved
process_name Name of the process involved
protocol Protocol used to connect to a system or domain
dest_port Port number used to receive data
event_id Windows Event ID number
process_id Process ID of the executed process
device_id Device ID of the device on which activity occurred
device_make Manufacturer OS type
device_type Endpoint or server
device_ip IP address on which activity occurred
device_mac MAC address of device on which activity occurred
hostname Hostname of device involved
username User who is logged into the device
customer_id Sophos Customer ID
sha1 SHA-1 file hash
sha256 SHA-256 file hash
sophos_process_id Sophos Process ID of the process that was run
sophos_parent_process_id Sophos Process ID of the process that created this child process
file_pua_score File risk score based on the probability of the file being a Potentially Unwanted Application, as assessed by deep learning on the device
file_ml_score File risk score based on the probability of the file being malware, as assessed by deep learning on the device
file_global_reputation File risk score obtained from a SophosLabs file analysis
file_local_reputation File risk score obtained from the local reputation data stored on the disk
data_source Name of the vendor that generated the event
category Type of activity the event is associated with
activity_type OS Query Name
category_description Description of the type of activity the event is associated with
time Time at which the event occurred
signature_status Status indicating whether or not code is signed
process_sid Security ID of the account used to run the process
process_uid User ID of the account used to run the process
process_gid Group ID to which the account that ran the process belongs
file_created_by Name of the original creator of the Microsoft Office file
product_name Name of the Microsoft Office product involved
file_description Description of the Microsoft Office file
file_version Version number of the file involved
process_username User name of the account used to run the process
original_filename File name before a file name change
file_size Size of the file involved
src_username Username that invoked a secondary account to take an action
event_description Description of the Windows event
parent_process_name Name of the process that created this child process