Investigations
Note
This feature is in the Preview stage. To get access, contact tech support
An investigation is the core entity for security event analysis in Yandex Cloud Detection and Response. An investigation comprises one or more queries enabling you to search and analyze events within the past 90 days.
YCDR instance binding
Each investigation is associated with a specific YCDR instance. Each instance maintains its own investigations, templates, and datasets. Access to investigations can be granted to:
- Individual users.
- User groups.
- All instance users.
Investigation metadata
Each investigation includes the following metadata:
- Name: Brief description of the investigation's objective.
- Description: Detailed information about the investigation.
- Creation date: Timestamp when the investigation was created.
- Last modified date: Timestamp of the most recent modification.
- Tags: Keywords to group and search for investigations.
Tags help group investigations by categories, e.g., threat type, event source, investigation phase, or any other relevant criteria.
Collaboration
Multiple analysts can co-edit an investigation in real-time. Changes are saved automatically and synchronized across users. Here is what you can do:
- Create an investigation copy for independed work.
- Rename the investigation.
- Modify its description and tags.
- Delete the investigation.
Access to investigations is governed by user roles. For more information, see Access management in YCDR.
Query templates
A query template is a KQL query saved for reuse. Templates enable you to streamline and optimize analyst workflows.
You can choose from the following template types:
|
Type |
Description |
|
Personal |
Templates created by the user and available across investigations. |
|
Instance |
Available to all users, but restricted to a specific investigation. |
|
General |
Available to all users across all investigations. |
You can group templates into folders for easier navigation. Folders are created and named by the user and help organize templates by threat type, event source, investigation phase, etc. For example, a Frequent queries folder can be used to store the most frequently used templates.
You can add a template to your current query, use it to create a new query, or save an existing query as a new template.
Datasets and database schema
Query data is derived from datasets and the database schema.
Datasets
A dataset consolidates events of a specific type. Each dataset includes:
- Name.
- Description.
- List of fields with data types.
Dataset fields support the following data types:
- String: Textual data.
- Number: Numeric values.
- Array: List of values.
- Object: Nested data structure.
- JSON: Data in JSON format.
Lookup tables
Lookup tables are reference tables used for data enrichment. They enable adding contextual information to events, for example:
- Service names by ID.
- Geodata by IP address.
- User details.
Database schema
Database schema contains a hierarchical structure of all available fields. When working with a schema, you can do the following:
- Search by field.
- View data types.
- Insert fields into a query.
To add a field from a dataset or the database schema into a query, select the field and click Insert into query.