Filter data in Raw Log Search

Supported in:

Raw Log Search lets you examine your raw unparsed logs. When you execute a search, Google Security Operations first examines the security data that has been both ingested and parsed. If the information you are searching for is not found, you can use Raw Log Search to examine your raw unparsed logs.

Use Raw Log Search to investigate artifacts that appear in logs but are not indexed, including:

  • Usernames
  • Filenames
  • Registry keys
  • Command line arguments
  • Raw HTTP request-related data
  • Domain names based on regular expressions
  • Asset names and addresses

To use Raw Log Search in Google SecOps, do the following:

  1. In the search bar, enter your search string or regular expressions, and then click Search.

  2. In the menu, select Raw Log Search to display the search options.

  3. Specify the Start Time and End Time (the default is 1 week) and click Search.

    The Raw Log Search view displays raw data events. You can filter results by DNS, Webproxy, EDR, and Alert.

    You can use regular expressions to search for and match sets of character strings within your security data using Google SecOps. Regular expressions let you narrow your search down using fragments of information, as opposed to using a complete domain name, for example.

    The following Procedural Filtering options are available in the Raw Log Search view:

    • Product Event Type

    • Log Source

    • Network Connection Status

    • TLD

Need more help? Get answers from Community members and Google SecOps professionals.