Run a search
Tip: You can run a concurrent search in a new browser tab or window.
- Sign in to the Arctic Wolf Unified Portal.
- In the navigation menu, click
Data Exploration > Raw Log Search.
- Optional: Limit your search to log sources that have a specific tag:
- Click the Log Source field.
- Add one or more tags from the list. For example, select active directory and auth to only include log sources with the
active directorytag and log sources with theauthtag.See Log source tags for more information.
- Optional: Set the desired time range.
Note:
- You can search up to 31 days of log data at a time.
- The earliest log data that you can search is based on your data retention policy.
- By default, data sent to Arctic Wolf prior to January 2019 is not searchable. If your data retention period begins before January 2019 and you would like to search your full history, contact your Concierge Security® Team (CST) at security@arcticwolf.com.
- Optional: Select a frequently run search:
- In the Query Template list, select a frequently run search.
- If prompted, enter the value that completes the search expression. For example, in the Login Successes for User template, enter a user ID.
- Click Apply to add the search expression to the Search field.
- Optional: In the Search field, enter or modify the search expression.
Tip: See Raw Log Search query syntax for more information.
- Select or deselect the Case sensitive option.
- Click Search.
A timeline graph and a table of matching log sources loads when the search is complete.