Pemfilteran Prosedural memungkinkan Anda memfilter lebih lanjut informasi yang berkaitan dengan aset, termasuk menurut jenis peristiwa, sumber log, status koneksi jaringan, dan Domain Tingkat Teratas (TLD). Opsi menu Pemfilteran Prosedural berubah bergantung pada tampilan Google Security Operations serta luas dan jenis data keamanan yang saat ini ditampilkan di UI.
Bagian ini menjelaskan cara mengakses dan menggunakan Pemfilteran Prosedural saat menyelidiki pemberitahuan menggunakan Google SecOps untuk tampilan berikut:
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-08-21 UTC."],[[["\u003cp\u003eProcedural Filtering allows for detailed filtering of asset information by event type, log source, network connection status, and Top Level Domain (TLD).\u003c/p\u003e\n"],["\u003cp\u003eThe available filtering options in the Procedural Filtering menu will adapt based on the specific Google Security Operations view and the security data displayed.\u003c/p\u003e\n"],["\u003cp\u003eProcedural Filtering is accessible within various Google Security Operations views, including User, Rule Detections, Asset, Domain, IP Address, Hash, and Raw Log Scan.\u003c/p\u003e\n"],["\u003cp\u003eProcedural filtering is supported in Google SecOps.\u003c/p\u003e\n"]]],[],null,["# Overview of procedural filtering\n================================\n\nSupported in: \nGoogle secops [SIEM](/chronicle/docs/secops/google-secops-siem-toc)\n\nProcedural Filtering enables you to further filter information pertaining to an asset, including by event type, log source, network connection status, and Top Level Domain (TLD). The Procedural Filtering menu options change depending on the Google Security Operations view and the breadth and types of security data currently displayed in the UI.\n\nThis describes how to access and use Procedural Filtering when investigating an alert using Google SecOps for the following views:\n\n- [User view](/chronicle/docs/investigation/filter-data-user-view)\n- [Rule Detections view](/chronicle/docs/investigation/filter-data-rule-detections)\n- [Asset view](/chronicle/docs/investigation/filter-data-asset-view)\n- [Domain view](/chronicle/docs/investigation/filter-data-domain-view)\n- [IP Address view](/chronicle/docs/investigation/filter-data-ipaddress-view)\n- [Hash view](/chronicle/docs/investigation/filter-data-hash-view)\n- [Raw Log Scan view](/chronicle/docs/investigation/filter-data-raw-log-scan-view)\n\n**Need more help?** [Get answers from Community members and Google SecOps professionals.](https://security.googlecloudcommunity.com/google-security-operations-2)"]]