Preview Dashboards overview

Supported in:

You can use the Preview Dashboards feature of Google Security Operations to build visualizations over different data sources. It is composed of different charts, which are populated using YARA-L 2.0.

Before you begin

Ensure that your Google SecOps instance has the following enabled:

YARA-L 2.0 has the following unique properties when used in Preview Dashboards

  • Additional data sources, such as entity graph, ingestion metrics, rule sets, and detections are available in dashboards. Some of these data sources are not yet available in YARA-L rules and UDM search.

  • See YARA-L 2.0 functions for Google Security Operations Preview Dashboards and aggregate functions that include statistical measures.

  • The query in YARA-L 2.0 must must contain a match or an outcome section or both.

  • The events section of a YARA-L rule is implied and does not need to be declared in queries.

  • The condition section of a YARA-L rule is not available for dashboards.

Data sources supported by Preview Dashboards

The following data sources are available in Preview Dashboards with the following YARA-L prefix.

Data source Query time interval YARA-L prefix Schema
Events 90 days no prefix Fields
Entity graph 365 days graph Fields
Ingestion metrics 365 days ingestion Fields
Rule sets 365 days ruleset Fields
Detections 365 days detection Fields
IOCs 365 days ioc Fields

Impact of data RBAC for Preview Dashboards

Data role-based access control (data RBAC) is a security model that uses individual user roles to restrict user access to data within an organization. With data RBAC, administrators can define scopes and assign them to users to help ensure that users can access only the necessary data for their job functions. All the queries executed in Preview Dashboards are supported by data RBAC. For more information on access controls and scopes, see Access controls and scopes in data RBAC.

Events, entity graph, and IOC matches

The data returned from these sources aligns with the user's data access scopes. Users only see results from data within their assigned scopes. If a user has multiple scopes, queries run across the combined data of all authorized scopes. Data outside the user's accessible scopes doesn't appear in search results.

Detection and rulesets with detections

Detections are generated when incoming security data matches the criteria defined in a rule. Users can only see detections that originate from rules associated with their assigned scopes.

Ingestion metrics

Ingestion components are services or pipelines that ingest logs into the platform from source log feeds. Each ingestion component collects a different set of log fields into its own ingestion metrics schema. These metrics are only visible to global users.