Documentation Index
Fetch the complete documentation index at: https://docs.contraforce.com/llms.txt
Use this file to discover all available pages before exploring further.
Sentinel, DefenderXDR, QRadar, Splunk, CrowdStrike, SentinelOne The entity's kind property as it appears on the incident (e.g. 'Account', 'Host', 'File', 'FileHash', 'Ip', 'Mailbox').
Main matching property of the entity — the hash for File/FileHash, device name or ID for Host, UPN/email/object ID for Account, IP string for Ip. Wrong choices return zero matches; refer to the entity's primary identifier on the incident.
Time window for related-incident search. Allowed values: ThreeHours, SixHours, TwelveHours, TwentyFourHours, FourtyEightHours, Custom. Default: TwentyFourHours.
ThreeHours, SixHours, TwelveHours, TwentyFourHours, FourtyEightHours, Custom, null UTC start instant for Custom windows. Required when TimeFilteringType is Custom; ignored otherwise.
UTC end instant for Custom windows. Required when TimeFilteringType is Custom; ignored otherwise.
Display name of the entity being investigated. Surfaced in the audit trail and the result's human-readable summary.
Internal entity type enum — more granular than EntityKind (e.g. EntityType.Account vs EntityType.User). Use the value present on the entity in the incident.
User, IP, File, Process, Device, Malware, CloudApplication, DomainName, AzureResource, FileHash, RegistryKey, RegistryValue, SecurityGroup, URL, IoTDevice, Mailbox, MailCluster, MailMessage, Submission, SentinelEntities, DnsResolution, Registry, OAuthApplication, AmazonResource, BlobContainer, Blob, Container, ContainerRegistry, ContainerImage, GoogleCloudResource, KubernetesCluster, KubernetesController, KubernetesNamespace, KubernetesPod, KubernetesService, KubernetesSecret, KubernetesServiceAccount, AnalyzedMessage, DNS, Unknown