Com a filtragem procedural, é possível filtrar ainda mais as informações relacionadas a um recurso, incluindo por tipo de evento, origem do registro, status da conexão de rede e domínio de nível superior (TLD). As opções do menu de filtragem procedural mudam dependendo da visualização das operações de segurança do Google e da amplitude e dos tipos de dados de segurança exibidos na UI.
Isso descreve como acessar e usar a filtragem procedural ao investigar um alerta usando o Google SecOps nas seguintes visualizações:
[[["Fácil de entender","easyToUnderstand","thumb-up"],["Meu problema foi resolvido","solvedMyProblem","thumb-up"],["Outro","otherUp","thumb-up"]],[["Difícil de entender","hardToUnderstand","thumb-down"],["Informações incorretas ou exemplo de código","incorrectInformationOrSampleCode","thumb-down"],["Não contém as informações/amostras de que eu preciso","missingTheInformationSamplesINeed","thumb-down"],["Problema na tradução","translationIssue","thumb-down"],["Outro","otherDown","thumb-down"]],["Última atualização 2025-08-21 UTC."],[[["\u003cp\u003eProcedural Filtering allows for detailed filtering of asset information by event type, log source, network connection status, and Top Level Domain (TLD).\u003c/p\u003e\n"],["\u003cp\u003eThe available filtering options in the Procedural Filtering menu will adapt based on the specific Google Security Operations view and the security data displayed.\u003c/p\u003e\n"],["\u003cp\u003eProcedural Filtering is accessible within various Google Security Operations views, including User, Rule Detections, Asset, Domain, IP Address, Hash, and Raw Log Scan.\u003c/p\u003e\n"],["\u003cp\u003eProcedural filtering is supported in Google SecOps.\u003c/p\u003e\n"]]],[],null,["# Overview of procedural filtering\n================================\n\nSupported in: \nGoogle secops [SIEM](/chronicle/docs/secops/google-secops-siem-toc)\n\nProcedural Filtering enables you to further filter information pertaining to an asset, including by event type, log source, network connection status, and Top Level Domain (TLD). The Procedural Filtering menu options change depending on the Google Security Operations view and the breadth and types of security data currently displayed in the UI.\n\nThis describes how to access and use Procedural Filtering when investigating an alert using Google SecOps for the following views:\n\n- [User view](/chronicle/docs/investigation/filter-data-user-view)\n- [Rule Detections view](/chronicle/docs/investigation/filter-data-rule-detections)\n- [Asset view](/chronicle/docs/investigation/filter-data-asset-view)\n- [Domain view](/chronicle/docs/investigation/filter-data-domain-view)\n- [IP Address view](/chronicle/docs/investigation/filter-data-ipaddress-view)\n- [Hash view](/chronicle/docs/investigation/filter-data-hash-view)\n- [Raw Log Scan view](/chronicle/docs/investigation/filter-data-raw-log-scan-view)\n\n**Need more help?** [Get answers from Community members and Google SecOps professionals.](https://security.googlecloudcommunity.com/google-security-operations-2)"]]