Edition: This feature is available in the Standard and Premium editions of USM Anywhere.
USM Anywhere enables you to use the LevelBlue Agent data source to filter the LevelBlue Agent-related . These data sources are related to the agent:
  • LevelBlue Agent: This data source parses events from the agent except for Microsoft Windows events.
  • LevelBlue Agent - Windows EventLog: This data source parses Windows events sent through the agent.
To search events using the filter related to the agent
  1. Go to Activity > Events.
  2. Locate the Data Source section.
  3. Click an event and the result of your search displays.

LevelBlue Agent Queries

USM Anywhere enables you to run a user-initiated LevelBlue Agent query based on the events sent by connected agents. There are several ad-hoc queries, which are in your environment by default. These queries, listed below, generate events that can be used for a forensic investigation, so you can focus on fast response and remediation.
Note: Regardless of agent status, an agent query may fail if connectivity to the agent was interrupted since the last heartbeat was received.
The full list of queries are available in the following table. Available LevelBlue Agent Queries
Query NamePlatformDescription
Get Docker container running processesLinux, macOSGet the list of processes running in each Docker container.
Get Docker containers detailsLinux, macOSGet a list of details for each Docker container.
Get Docker containers open portsLinux, macOSGet a list with open ports and network information for each Docker container.
Get file informationLinux, macOS, and WindowsGet information from the file specified in the first parameter. You must include the file path of the file.
Get files downloaded in the systemmacOSGenerate a list of all files downloaded in the system.
Get IE typed URLsWindowsGet the list of Microsoft Internet Explorer (IE)‘s entered URLs.
Get firewall configurationWindowsGet a list of firewall configurations for different profiles and rules.
Get installed packages historymacOSGet the list of the latest installed packages in the system.
Get logged-in usersLinux, macOS, and WindowsGet the list of currently logged-in users.
Get listening processesLinux, macOS, and WindowsGet the list of the processes with listening sockets.
Get network connectionsLinux, macOS, and WindowsGet the list of the current network connections.
Get network connection informationLinuxGet information from a network connection based on the remote address (first parameter) and the remote port (second parameter). You must include the port and the IP address.
Get network sharesWindowsGet the list of network-shared resources from the system.
Get persistence registry keysWindowsGet registry key values commonly used for persistence by attackers.
Get recent filesWindowsGet the list of recent files.
Get recent itemsmacOSGet the list of recently opened files.
Get running processesLinux, macOS, and WindowsGet the list of running processes.
Get running servicesWindowsGet the list of running services.
Get SSH authorized keysLinux, macOSGet the list of SSH-authorized keys allowed in the system.
Get users launched servicesmacOSGet the list of LaunchAgents and LaunchDaemons services installed in the system.
Get Wi-Fi connection statusmacOSGet information from the current Wi-Fi connection.
Get Wi-Fi preferred connectionsmacOSGet information from the preferred Wi-Fi connections.
Hunt for potential library injection - .so deleted from diskLinuxHunt for the potential library injection of a memory map with a deleted shared object on disk and rwxp memory.
Hunt for potential library injection - no .so on disk and rwxp memoryLinuxHunt for the potential library injection of a memory map with no shared object on disk and rwxp memory.
Hunt for potential library injection - no common .so isolationLinuxHunt for the potential library injection of a shared library loaded from an uncommon location.
Hunt for running processes with no binary on diskLinux, macOS, and WindowsHunt for running processes that do not have a matching binary on disk.
Hunt for traffic to remote IPLinux, macOS, and WindowsHunt for non-web traffic to remote IP addresses not using port 0, 80, or 443.