Raw Log Search
Updated Sep 19, 2023Raw Log Search
Raw Log Search is a licensed Managed Detection and Response (MDR) add-on feature that lets you search the Arctic Wolf platform, which stores an aggregation of raw log data from your on-premises systems and cloud services. This feature allows you to retrieve logs in raw format for operational and security-related tasks, such as validating a configuration change or investigating a security alert.
Tip: You can also search the Arctic Wolf observation pipeline for parsed and analyzed event logs. See View event logs in the Arctic Wolf Unified Portal User Guide for details.
Run a search
Tip: You can run a concurrent search in a new tab or window.
-
From the Arctic Wolf Unified Portal menu bar, click Data Exploration > Raw Log Search.
-
(Optional) Limit your search to log sources that have a specific tag:
-
Click the Log Source field.
-
Add one or more tags from the list. For example, select active directory and auth to only include log sources with the
active directory
tag and log sources with theauth
tag.Tip: See Log source tags for more information.
-
-
(Optional) Set the desired time range.
Notes:
- You can search up to 31 days of log data at a time.
- The earliest log data that you can search is based on your data retention policy.
- By default, data sent to Arctic Wolf prior to January 2019 is not searchable. If your data retention period begins before January 2019 and you would like to search your full history, contact your Concierge Security® Team (CST).
-
(Optional) Choose from a list of frequently run searches:
-
From the Query Template list, select a frequently run search.
-
If prompted, enter the value that completes the search expression. For example, in the Login Successes for User template, enter a user ID.
-
Click Apply to add the search expression the Search field.
-
-
(Optional) In the Search field, enter or modify the search expression.
Tip: See the Raw Log Search Expression Syntax Guide for more information about syntax.
-
Select or deselect the Case sensitive option.
-
Click Search.
A timeline graph and a table of matching log sources loads when the search is complete.
Search results
The search results table includes these columns:
Column | Description |
---|---|
Timestamp | The timestamp for when this log line was sent to the Arctic Wolf platform. |
Sensor | The Arctic Wolf appliance or cloud sensor that sent the log data to the Arctic Wolf platform. |
Source | The source of the log data. |
Event | The log data that matched your search criteria. |
Tips:
- Click a table entry to view the complete log data.
- When a search is complete, the results are saved for 14 days. Retrieving saved search results is faster than running the same search again. See View past search results for steps.
Export search results
After running a search:
- Click Export, and then select an export option:
- Single CSV file — Download all results into a single zipped file.
- One CSV file per day — Download multiple zipped files, one for each day included in the time range.
- When compression is complete, click Download Results.
Notes:
- You can export up to 500,000 raw log entries. To export a larger dataset, contact your CST.
- In exported CSV files, dates are in UTC.
Drill down into data
After running a search, do one or both of the following:
- (Optional) Narrow the time range of your search:
- Click and drag the end points of the timeline graph to modify the date range.
- Click Update time range.
- (Optional) Narrow the scope of your search.
-
In the Search field, add conditional logic to your search expression.
Tip: See the Raw Log Search Expression Syntax Guide for more information about syntax.
-
Click Search.
-
If you need further assistance drilling into data, contact your CST.
View past search results
-
From the Arctic Wolf Unified Portal menu bar, click Data Exploration > Raw Log Search History.
-
(Optional) Apply any of the following filters to narrow the list of saved searches:
- In the Filter field, enter a keyword that might be in the search expression.
- From the Run by list, select the user who ran the search.
-
Review the log search history for your organization. This history includes searches that your CST runs on your behalf. The Search History table has these columns:
Column Description Search - Search: The search expression.
- Time: The date and time range that the search was limited to.
- Sources: The log sources included in the search.
Run by Who ran the search and when. Details The number of logs that matched the search expression and the volume of data. Actions The actions that you can take on a saved search. -
To load the results of a past search, click View Search.
View Log Sources
-
From the Arctic Wolf Unified Portal menu bar, Data Exploration > Raw Log Sources.
-
(Optional) To narrow the list of log sources, enter the keyword or the name of a tag in the Filter box.
Tip: See Log source tags for more information.
Log source tags
Tags are a convenient way to organize your log sources for future searches. You can create custom tags to group log sources. For example, you might group log sources by:
- The role of the server or the type of device, such as,
database server
,web server
,switch
,router
,access point
. - Location, such as country, city, or site.
- Cluster name or high availability pair.
- Environment, such as, development, test, or production.
- Cost center, business unit, or department.
There are also system-assigned tags that you use to refine your search. These tags are automatically assigned to your log sources based on the parser configured in the Arctic Wolf system.
Tags are listed in the Assigned Tags column.
Notes:
- If the tag is a custom tag, you can click the X to remove the tag from a log source.
- If the tag is system-assigned, you cannot remove or duplicate it.
- You cannot manually add a system-assigned tag to a log source. If there are log sources that are missing firewall or Active Directory log sources that do not have the respective
firewall
oractive directory tags
, contact your CST.
Add a tag to multiple log sources
-
From the Arctic Wolf Unified Portal menu bar, Data Exploration > Raw Log Sources.
-
(Optional) To narrow the list of log sources, enter the keyword or the name of a tag in the Filter box.
Tip: See Log source tags for more information.
-
Select the log sources that you want to tag.
-
Click the Select or Create a Custom Tag field to enter the name of a new custom tag or select an existing custom tag.
Note: You cannot manually add a system-assigned tag to a log source. If there are log sources that are missing firewall or Active Directory log sources that do not have the respective
firewall
oractive directory tags
, contact your CST. -
Click Add Tag.
The custom tag appears in the Assigned Tags column for the log sources that you selected.
Remove a tag from multiple log sources
-
From the Arctic Wolf Unified Portal menu bar, Data Exploration > Raw Log Sources.
-
(Optional) To narrow the list of log sources, enter the keyword or the name of a tag in the Filter box.
Tip: See Log source tags for more information.
-
Click the Delete a Custom Tag field and enter the name of the tag that you want to remove.
-
Select the log sources that you want to remove the tag from.
-
Click Delete Tag.