Finds Attack discoveries that match the search criteria
Finds Attack discoveries that match the search criteria. Supports free text search, filtering, pagination, and sorting.
Query parameters
-
Filter results to Attack discoveries that include any of the provided alert IDs
-
Filter results to Attack discoveries created by any of the provided human readable connector names. Note that values must match the human readable
connector_name
property of an Attack discovery, e.g. "GPT-5 Chat", which are distinct fromconnector_id
values used to generate Attack discoveries. -
Enables a markdown syntax used to render pivot fields, for example
{{ user.name james }}
. When disabled, the same example would be rendered asjames
. This is primarily used for Attack discovery views within Kibana. Defaults tofalse
.Default value is
false
. -
End of the time range for the search. Accepts absolute timestamps (ISO 8601) or relative date math (e.g. "now", "now-24h").
-
Filter results to the Attack discoveries with the specified IDs
-
If
true
, the response will includeunique_alert_ids
andunique_alert_ids_count
aggregated across the matched Attack discoveries -
Page number to return (used for pagination). Defaults to 1.
Minimum value is
1
. Default value is1
. -
Number of Attack discoveries to return per page (used for pagination). Defaults to 10.
Minimum value is
1
. Default value is10
. -
Free-text search query applied to relevant text fields of Attack discoveries (title, description, tags, etc.)
-
Field used to sort results. See
AttackDiscoveryFindSortField
for allowed values.Value is
@timestamp
. -
Sort order direction
asc
for ascending ordesc
for descending. Defaults todesc
.Values are
asc
ordesc
. -
Start of the time range for the search. Accepts absolute timestamps (ISO 8601) or relative date math (e.g. "now-7d").
-
Filter by alert workflow status. Provide one or more of the allowed workflow states.
Values are
acknowledged
,closed
, oropen
. -
When true, return the created Attack discoveries with text replacements applied to the detailsMarkdown, entitySummaryMarkdown, summaryMarkdown, and title fields. Defaults to
true
.Default value is
true
.
curl \ --request GET 'http://localhost:5601/api/attack_discovery/_find?end=now&include_unique_alert_ids=false&page=1&per_page=10&search=&sort_field=%40timestamp&sort_order=desc&start=now-24h&status=open&status=acknowledged' \ --header "Authorization: $API_KEY" \ --header "Content-Type: application/json"