Query Parameters and Attributes

A complete list of query parameters and attributes

Query Parameters

The Query Builder has four main parameters that can be used to assemble a query.

Source Attributes

The Attribute parameters allow you to select the what data attribute(s) you would like to build your query around. Select the Attribute field to begin defining this parameter.

The attributes menu is broken down into several areas:

  1. At the top of the menu, there are Devices and User tabs. The tab corresponding to the Live Inventory page you are in is selected by default. These tabs are primarily used for cross-asset searches, which will be covered in a later section.

  2. The left-panel contains a list Sources. If needed, use this section to specify if you would only like to include assets from a specific Source in your rule's condition.

  3. The right-panel is where you will select what data Attribute(s) you would like to build your query around.

Condition

The Condition parameter is used to define the condition an attribute must meet to meet a rule's requirements. Only assets and telemetry events that satisfy your conditions will be displayed in your results.

User selects is after from Condition Dropdown

Value

Once you've selected an attribute and condition, you will need to define the Value you will be using to determine if a condition is satisfied. Please note that this field will not display when the Exists or Does not exist condition is selected, as the value is already defined in the condition itself.

ℹ️

In some instances, you may be asked to select a value from a pre-defined list of values. This is dependent on the attribute you have chosen.

User selects date from Date Picker

Source Attribute Definitions

ℹ️

This Attributes list excludes Source-specific attributes. For questions about these attributes, please contact our Support team.

Please review the tables below for a list of Source attributes for each query builder in the Sevco platform. You will also find every possible condition and value that can be applied to an attribute.

Live Inventory

Devices

Identify

AttributeDefinitionExample
Correlation IDA unique ID assigned to a Device asset that is used to correlate it with other assetsCorrelation ID equals 8a580770-6ec9-480b-b5dc-50508fbc6749
Distinguished NameThe name typically associated with or issued by Directory Service Source integrations.Distinguished Name equals cn=fcfdlfs,ou=dpnqvufst oz,ou=bluth dpnqvufst,dc=bluth-dp,dc=com
HostnameAny device name associated with a Device asset. Unlike an Object ID this attribute can changeHostname equals victorias-macbook-pro
HostnamesAny device names associated with a Device asset. Unlike Hostname this attribute can have multiple values per Device.Hostnames equals victorias-macbook-pro

Hostnames equals victorias-laptop
IDThe unique asset ID used to identify a Device assetID equals ec1652be6765fd1d34394255c1c9c1ee
MAC AddressesAny MAC address associated with a Device assetMAC Address equals 02:FF:00:BA:C0:39
MAC ManufacturersThe MAC manufacturer who manufactured a piece of network hardware on a Device assetMAC Manufacturer equals Intel Corporate
Serial NumberThe serial number corresponding to a Device assetSerial Number equals 3N326311QW-01

Describe

AttributeDefinitionExample
Associated UsernamesAny usernames associated with a Device asset_Associated Usernames is like john_*
CategoryThe Category that a Source integration falls underCategory equals Enterprise Endpoint
ControlsThe Enterprise Endpoint subcategory that identifies the type of source control present for a Device assetControls equals Configuration Management
Exposure StatusThe remediation status of an Device asset that has been impacted by an Exposure vulnerability. Learn moreExposure ID equals Open
Number of SourcesThe total number of Sources that have identified a Device assetNumber of Sources equals 3
OSThe operating system of a Device assetOS Release equals Windows 11 Professional (x64)
OS PlatformThe operating system platform of a Device assetOS Platform equals Windows
OS ReleaseThe specific identity of a Device asset's operating system (if available)OS Release equals Windows 11 Professional
OS VersionThe specific version of a Device asset's operating system.OS Platform equals MacOS
_OS Version is like 12.6_*
SourceThe name of the Source Integration that has detected a Device assetSource equals Crowdstrike
Source ConfigurationThe configuration ID of a Source Integration that has detected a Device assetSource Configuration equals Microsoft Azure(01234567-0123-abcd-abcd-0123456789ab)
TagAny Tag that has been applied to a Device assetTag equals Password Expired

Locate

AttributeDefinitionExample
Active Directory DomainThe specific Active Directory domain name assigned to a Device asset.Active Directory Domains equals company.com
CityThe City corresponding to a Device asset's External IP addressCity equals Brooklyn
CountryThe Country corresponding to a Device asset's External IP addressCountry equals Italy
Country CodeThe Country Code of the country corresponding to a Device asset's External IP addressCountry Code equals DE
External IPsThe External IP Address associated with any network a Device asset has connected toIP Address between 192.158.1.10 (and) 192.158.1.40
GeoIP Associated IPAn IP Address that has been mapped to a specific physical or geolocation using IP geolocation data services.GeoIP Associated IP equals 142.250.0.0
Internal IPsThe Internal IP Address associated with any network a Device asset has connected to.IP Address equals 192.168.1.1
IPThe IP Address of the Device asset on a network.IP Address equals 10.10.4.217
IPsThe IP Addresses of the Device asset on a network. Unlike IP Address this attribute can have multiple values per Device.IP Address equals 10.10.4.217

IP Address equals 10.10.4.218
LatitudeThe latitude corresponding to a Device asset's External IP addressLatitude equals 37.4221° N
LocalityThe city or town associated with a Device asset's geolocation record, determined by a Geolocation Associated IPLocality equals Pittsburg
LongitudeThe longitude corresponding to a Device asset's External IP addressLongitude equals 122.0841° W
Network LocationThe Network type a Device asset is associated with: On Premise, Cloud, or Unknown (typically listed as a location if available)Network Location does not equal Cloud
RegionThe world region corresponding to a Device asset's External IP addressRegion equals Europe

Time

AttributeDefinitionExample
First Observed TimestampThe first time a Device asset was identified as present in your environment by a Source IntegrationFirst Observed Timestamp is before 05/17/23 12:00 AM
Last Activity TimestampThe last time a Device asset was identified as active on a networkLast Activity Timestamp is after 05/18/23 12:00 AM
Last Observed TimestampThe last time a Device asset was identified as present in your environment by a Source IntegrationLast Observed is before 3 days ago
OS End of Life TimestampThe date and time that a Device asset's operating system enters an end-of-life state (is no longer supported by its vendor)OS End of Life Timestamp is on or before 30 days ago

Users

Identify

AttributeDefinitionExample
Correlation IDA unique ID assigned to a User asset that is used to correlate it with other assetsCorrelation ID equals 8a580770-6ec9-480b-b5dc-50508fbc6749
EmailsAny Emails associated with a User assetEmail equals [email protected]
First NameThe first name associated with a User assetFirst Name equals John
IDThe unique asset ID used to identify a User assetID equals ec1652be6765fd1d34394255c1c9c1ee
Last NameThe last name associated with a User assetLast Name equals Smith
UsernamesAny usernames associated with a User assetUsernames equals janesmith

Describe

AttributeDefinitionExample
Number of SourcesThe total number of Sources that have identified a User assetNumber of Sources equals 3
SourceThe name of the Source Integration that has detected an User assetSource equals Crowdstrike
Source ConfigurationThe configuration ID of a Source Integration that has detected an User assetSource Configuration equals Microsoft Azure(01234567-0123-abcd-abcd-0123456789ab)
TagAny Tag that has been applied to a User assetTag equals Password Expired

Time

AttributeDefinitionExample
First Observed TimestampThe first time a User asset was identified as present in your environment by a Source IntegrationFirst Observed Timestamp is before 05/17/23 12:00 AM
Last Activity TimestampThe last time a User asset was identified as active on a networkLast Activity is after 05/18/23 12:00 AM
Last Observed TimestampThe last time a User asset was identified as present in your environment by a Source IntegrationLast Observed is before 3 days ago

Vulnerabilities

Identify

AttributeDefinitionExample
Correlation IDA unique ID assigned to softwareVulnerabilities to correlate them with the assets they are impactingCorrelation ID equals 8a580770-6ec9-480b-b5dc-50508fbc6749
CVEAny Common Vulnerabilities and Exposures (CVE) codes associated with a software Vulnerability. Please note that some vulnerabilities may contain multiple CVEs or none at all.CVE equals CVE-2018-17456
IDThe unique asset ID used to identify a software VulnerabilityID equals 9e9d7ceab5ef9972ba54f926ff08d146
NameThe name of a potential software Vulnerability that a Source integration has identified on a Device asset_Vulnerability is like Adobe Flash_*
Vuln ID[Couldn't query for this in product][Couldn't query for this in product]

Score

AttributeDefinitionExample
CVSS ScoreA numerical rating from 0.0-10.0 that indicates the severity of a known software Vulnerability. Learn moreCVSS Score is greater than 4.5
CVSS v2 Base ScoreA numerical rating from 0.0-10.0 that indicates the severity of a known software Vulnerability, using an older version of the Common Vulnerability Scoring System (CVSS). This score is determined when a software Vulnerability is first discovered.
Sevco uses this score in conjunction with other CVSS scores to determine the overall severity of a vulnerability. Learn more
CVSS v2 Base Score is greater than 6.9
CVSS v2 Temporal ScoreA numerical rating from 0.0-10.0 that indicates the severity of a known software Vulnerability, using an older version of the Common Vulnerability Scoring System (CVSS). This score may change depending on factors such as the time a software Vulnerability has been present on a Device asset.
Sevco uses this score in conjunction with other CVSS scores to determine the overall severity of a vulnerability. Learn more
CVSS v2 Temporal Score is greater than or equal to 7.0
CVSS v3 Base ScoreA numerical rating from 0.0-10.0 that indicates the severity of a known software Vulnerability, using the most recent version of the Common Vulnerability Scoring System (CVSS). This score is determined when a software Vulnerability is first discovered.
Sevco uses this score in conjunction with other CVSS scores to determine the overall severity of a vulnerability. Learn more
CVSS v3 Base Score is greater than 6.9
CVSS v3 Temporal ScoreA numerical rating from 0.0-10.0 that indicates the severity of a known software Vulnerability, using the most recent version of the Common Vulnerability Scoring System (CVSS). This score may change depending on factors such as the time a software Vulnerability has been present on a Device asset.
Sevco uses this score in conjunction with other CVSS scores to determine the overall severity of a vulnerability. Learn more
CVSS v3 Temporal Score is greater than 8.9
EPSS PercentileThe relative ranking from 0.0 - 1.0 of a software Vulnerability's EPSS score compared to all other scored vulnerabilities.EPSS Percentile is greater than .75
EPSS ScoreA score from 0.0 - 1.0 that indicates the likelihood of a specific software Vulnerability (CVE) being exploited within the next 30 days (Learn more)EPSS Score is greater than .5
SeverityThe severity of a software Vulnerability on a Device asset, determined by a Source integration's software vendorSeverity equals High

Describe

AttributeDefinitionExample
CategoriesThe Category(ies) that represents the area of security hygiene that a software Vulnerability negatively impactsCategories equals MacOS X Local Security Checks
CWE IDThe Common Weakness Enumeration ID assigned to a specific type of software or hardware security weakness in the CWE catalog. Learn moreCWE ID equals CWE-89
CWE NameThe name of a Common Weakness Enumeration. Learn moreCWE Name equals Password in Configuration File
Number of SourcesThe total number of Sources that have identified a software VulnerabilityNumber of Sources equals 3
NVD StatusThe status of a software Vulnerability in the National Vulnerability Database. (Learn more)NVD Status equals Received
PortThe port that is being impacted by a software VulnerabilityPort equals 445
ProductThe product name of a piece of hardware or software that is being impacted by a software VulnerabilityProduct equals 1password
Product TypeThe category that an impacted piece of hardware or software falls under.Product Type equals Application
ProtocolThe network protocol used by a software Vulnerability to gain access to a Device assetProtocol equals TCP
SourceThe name of the Source Integration that has detected software VulnerabilitySource equals Qualys AssetView
Source ConfigurationThe configuration ID of a Source Integration that has detected a software VulnerabilitySource Configuration equals Crowdstrike 3c8f8b45-06d1-40ba-a162-0414196caa8a
TagAny Tag that has been applied to a software VulnerabilityTag equals Adobe
VendorThe name of the Vendor who supplies a piece of hardware of software that is being impacted by a software VulnerabilityVendor equals Adobe

Exploit

AttributeDefinitionExample
Botnets CountThe number of botnets (networks of compromised devices) associated with a software VulnerabilityBotnets Count is greater than 0
CAPEC Attack Pattern IDThe ID of a CAPEC Attack Pattern. Learn moreCAPEC Attack Pattern ID equals CAPEC-233
CAPEC Attack Pattern NameThe Name of a CAPEC Attack Pattern. Learn moreCAPEC Attack Pattern Name equals Privilege Escalation
Commercial Exploit FoundAn exploit that is often developed and sold by a company for penetration testing and other professional contextsCommercial Exploit Found equals True
Exploit AvailabilityHow an exploit can be obtainedExploit Availability equals publically-available
Exploit MaturityThe maturity of an exploitExploit Maturity equals POC
Exploit TypeAn exploit's type_Exploit Type equals ``
Exploits CountThe number of exploits carried out on a software VulnerabilityExploits Count equals 1
Max Exploit MaturityThe maturity of the most mature exploit carried out on a software VulnerabilityMax Exploit Maturity equals POC
MITRE ATT&CK TacticsThe Tactics used in a MITRE ATT&CK Technique. [Learn more](The Name of a MITRE ATT&CK Technique. Learn moreMITRE ATT&CK Tactics equals privilege-escalation
MITRE ATT&CK Technique IDThe ID of a MITRE ATT&CK Technique. Learn moreMITRE ATT&CK Technique ID equals T1068
MITRE ATT&CK Technique NameThe Name of a MITRE ATT&CK Technique. Learn moreMITRE ATT&CK Technique Name equals Exploitation for Privilege Escalation
Public Exploit FoundAn exploit that is publicly-available, often as a proof-of-conceptPublic Exploit Found equals True
Ransomware Families CountThe number of Ransomware Families associated with a software VulnerabilityRansomware Families Count equals 1
Threat Actor NameThe name of the individual, group, or entity trying to exploit a software VulnerabilityThreat Actor Name equals Cozy Bear
Threat Actors CountThe number of Threat Actors trying to exploit a software VulnerabilityThreat Actors Count equals 1
Weaponized Exploit FoundIdentifies software Vulnerabilities that have known exploits that have been weaponized.Weaponized Exploit Found equals True

Time

AttributeDefinitionExample
CISA KEV AddedWhen a software Vulnerability was first added to CISA's Known Exploited Vulnerability list. Learn moreCISA KEV Added is on or before 08/25/25 12:00 AM
First Found TimestampWhen a software Vulnerability was first identified on a Device asset by a Source IntegrationFirst Found is on or before 06/07/23 12:00 AM
First Observed TimestampThe first time a software Vulnerability was identified as present in your environment by a Source IntegrationFirst Observed Timestamp is before 05/17/23 12:00 AM
Last Found TimestampThe last time a software Vulnerability was identified on a Device asset by a Source IntegrationLast Found is on or after 06/10/23 12:00 AM
Last Observed TimestampThe last time a software Vulnerability was identified as present in your environment by a Source IntegrationLast Observed is before 3 days ago
VulnCheck KEV AddedWhen a software Vulnerability was first added to VulnCheck's Known Exploited Vulnerability list. Learn moreVulnCheck KEV Added is on or before 08/25/25 12:00 AM

Exposure

Identify

AttributeDefinitionExample
IDThe unique ID used to identify an Exposure vulnerabilityID equals 38f03959-baa1-420a-b43d-9bdccc25194c
NameThe Name of an Exposure vulnerabilityName equals US Government Banned Devices

Score

AttributeDefinitionExample
SeverityThe level of Severity assigned to an Exposure vulnerability. Learn moreSeverity equals Critical

Describe

AttributeDefinitionExample
Asset TypeThe asset class that is impacted by an Exposure vulnerabilityAsset Type equals Devices
CategoriesThe Category(ies) that represents the area of security hygiene that an Exposure vulnerability negatively impactsCategories equals Control Configuration
ClassThe Class that an Exposure vulnerability falls under. Learn moreClass equals ASCA
Exposure StatusThe remediation status of an asset that has been impacted by an Exposure vulnerability. Learn moreExposure Status equals Open
ImpactThe description of how an Exposure vulnerability impacts your attack surfaceImpact is like The Microsoft Office Products are missing security updates*
Number of Accepted Risk AssetsThe number of assets with an Exposure Status of Accepted Risk for a particular Exposure vulnerabilityNumber of Accepted Risk Assets is greater than 10
Number of In Progress AssetsThe number of assets with an Exposure Status of In Progress for a particular Exposure vulnerabilityNumber of In Progress Assets is less than 10
Number of Open AssetsThe number of assets with an Exposure Status of Open for a particular Exposure vulnerabilityNumber of Open Assets is greater than 0
Number of Snoozed AssetsThe number of assets with an Exposure Status of Snoozed for a particular Exposure vulnerabilityNumber of Snoozed Assets is greater than 0
Number of Total AssetsThe total number of assets impacted by an Exposure vulnerabilityNumber of Total Assets is greater than 50
ObservationThe Observation of a specific Exposure vulnerabilityObservation is like A software vulnerability (CVE) was found*
RecommendationThe Recommendation for remediating assets impacted by an Exposure vulnerabilityRecommendation is like Microsoft has released the following security updates to address this issue*

Time

AttributeDefinitionExample
Exposure Updated TimestampThe last time an Exposure Status was updatedExposure Updated Timestamp is before 3 days ago


Telemetry

Devices

AttributeDefinitionExample Query
AttributeA piece of information that corresponds to a Device assetAttribute equals hostnames
HostnameAny device name associated with a Device asset. Unlike an Object ID this attribute can change.Hostname equals victorias-macbook-pro
Event TimestampThe date and time that a telemetry event took placeEvent Timestamp is after 05/09/23 12:00 AM
Event TypeThe type of telemetry event that has taken place. This includes changes to attributes as well as observation times by Sources.Event Type equals AttributeValueAdd
Object IDA permanent ID number that is assigned by a Source integration to identify a Device asset. Each Source assigns its own Object ID.SentinelOne Object ID equals 0123456789101112131

ManageEngine Object ID equals 1312111019876543210
SourceThe name of the Source Integration that has detected a Device assetSource equals Crowdstrike
Source ConfigurationThe configuration ID of a Source Integration that has detected a Device assetSource Configuration equals Microsoft Azure(01234567-0123-abcd-abcd-0123456789ab)
Valid Until TimestampFor AttributeValueAdd telemetry events, the time when the attribute was removed.Valid Until Timestamp is after 3 days ago
ValueAn attribute Value that has changed during a telemetry event. For example: a Device asset's MAC Address changing.Value equals 00:50:56:8A:69:73

Users

AttributeDefinitionExample Query
AttributeA piece of information that corresponds to a User assetAttribute equals emails
Event TimestampThe date and time that a telemetry event took placeEvent Timestamp is after 05/09/23 12:00 AM
Event TypeThe type of telemetry event that has taken place. This includes changes to attributes as well as observation times by Sources.Event Type equals AttributeValueAdd
Object IDA permanent ID number that is assigned by a Source integration to identify a User asset. Each Source assigns its own Object ID.SentinelOne Object ID equals 0123456789101112131

ManageEngine Object ID equals 1312111019876543210
SourceThe name of the Source Integration that has detected a User assetSource equals Crowdstrike
Source ConfigurationThe configuration ID of a Source Integration that has detected a User assetSource Configuration equals Microsoft Azure(01234567-0123-abcd-abcd-0123456789ab)
Valid Until TimestampFor AttributeValueAdd events, the time when the attribute was removed.Valid Until Timestamp is after 3 days ago
ValueAn attribute Value that has changed during a telemetry event. For example: a User asset's corresponding email being updated.Value equals [email protected]

Source Inventory

Devices

AttributeDefinitionExample Query
Duplicate Group IDThe Group ID of one or more Source Records that have been identified as a duplicate of a Source record that has been successfully processed, aggregated, and correlated with other Source records to form a unified asset. Learn moreDuplicate Group ID equals 4b4653f7-672e-4c7e-8c23-3cef83839158
First CollectedWhen a Source Device was first collected by a specific Source integrationFirst Collected is on or before 07/31/22 12:00 AM
FQDNThe fully qualified domain name associated with a Source DeviceFQDN exists
HostnameAny device name associated with a Source Device. Unlike an Object ID this attribute can change.Hostname equals victorias-macbook-pro
IP AddressThe IP Address of the Source Device on a network.IP Address equals 10.10.4.217
Last ActivityThe last time a Source Device was identified as active on a networkLast Activity is after 05/18/23 12:00 AM
Last ObservedThe last time a Source Device was identified as present in your environment by a Source integrationLast Observed is before 3 days ago
MAC AddressAny MAC Address associated with a Source DeviceMAC Address equals 02:FF:00:BA:C0:39
Object IDA permanent ID number that is assigned by a Source integration to identify a Source Device. Each Source assigns its own Object ID.SentinelOne Object ID equals 0123456789101112131

ManageEngine Object ID equals 1312111019876543210
OS PlatformThe operating system platform of a Source DeviceOS Platform equals Windows
OS ReleaseThe specific identity of a Source Device's operating system (if available)OS Release equals Windows 10 Enterprise
Record StateA state that indicates whether or not a Source Record has been successfully processed, aggregated, and correlated with other Source records to form a unified asset. Learn moreRecord State equals Active
Serial NumberThe serial number corresponding to a Source DeviceSerial Number equals 3N326311QW-01

Users

AttributeDefinitionExample Query
Duplicate Group IDThe Group ID of one or more Source Records that have been identified as a duplicate of a Source record that has been successfully processed, aggregated, and correlated with other Source records to form a unified asset. Learn moreDuplicate Group ID equals 4b4653f7-672e-4c7e-8c23-3cef83839158
EmailsThe Email(s) that have been identified in a Source Record with a Source UserEmails equals [email protected]
First CollectedWhen a Source User was first collected by a specific Source integrationFirst Collected is on or before 07/31/22 12:00 AM
First NameThe first name associated with a Source UserFirst Name equals John
Last ActivityThe last time a Source User was identified as active on a networkLast Activity is after 05/18/23 12:00 AM
Last NameThe last name associated with a Source UserLast Name equals Smith
Last ObservedThe last time a Source User was identified as present in your environment by a Source integrationLast Observed is before 3 days ago
Last UpdatedWhen information about a Source User was last updated by a Source integrationLast Updated is before 30 days ago
Object IDA permanent ID number that is assigned by a Source integration to identify a Source User. Each Source assigns its own Object ID.Object ID equals S-1-5-21-0490701075-1614801754-3360177619-3252
Password ChangedWhen a Source integration last identified a password change by a userPassword Change is less than 30 days ago
Record StateA state that indicates whether or not a Source Record has been successfully processed, aggregated, and correlated with other Source records to form a unified asset. Learn moreRecord State equals Active
UsernamesThe username(s) associated with a Source User for a specific Source integrationUsername equals janesmith

Software

AttributeDefinitionExample Query
HostnameAny device name associated with a Source Device. Unlike an Object ID this attribute can change.Hostname equals victorias-macbook-pro
Software NameThe name of a piece of software that has been installed on a Source DeviceSoftware Name equals 1Password
VendorThe vendor of a piece of software that has been installed on a Source DeviceSoftware Vendor equals WindowsUpdate
VersionThe version of a piece of software that has been installed on a Source DeviceSoftware Name equals 1Password, and
Software Version is like 7.*

Vulnerabilities

AttributeDefinitionExample Query
VulnerabilityThe name of a Source software vulnerability that has been identified by a Source integrationVulnerability is like CVE-2013*
CVEAny Common Vulnerabilities and Exposures (CVE) codes associated with a Source software Vulnerability. Please note that some software vulnerabilities may contain multiple CVEs or none at all.CVE equals CVE-2018-17456
OS PlatformThe operating system platform associated with a Device asset impacted by a software VulnerabilityOS Platform equals Windows
OS ReleaseThe specific operating system release installed on a Device asset that is being impacted by a Source software VulnerabilityOS Release equals Windows 10 Enterprise
SeverityThe severity of a Source software Vulnerability on a Device asset. Sevco determines severity of software vulnerabilities using the CVSS3 and CVSS2 scores assigned to it by your Source integration's software vendor.Severity equals High
CategoriesThe Category(ies) that represents the area of security hygiene that a Source software Vulnerability negatively impactsCategories equals MacOS X Local Security Checks
First FoundWhen a Source software Vulnerability was first identified on a Device asset by your Source integrationFirst Found is on or before 06/07/23 12:00 AM
Last FoundThe last time a Source software Vulnerability was identified on a Device asset by your Source integrationLast Found is on or after 06/10/23 12:00 AM
CVSS v3 BaseA numerical rating from 0.0-10.0 that indicates the severity of a known software Vulnerability, using the most recent version of the Common Vulnerability Scoring System (CVSS). This score is determined when a software Vulnerability is first discovered.
Sevco uses this score in conjunction with other CVSS scores to determine the overall severity of a vulnerability. Learn more
CVSS v3 Base is greater than 6.9
CVSS v3 TemporalA numerical rating from 0.0-10.0 that indicates the severity of a known software Vulnerability, using the most recent version of the Common Vulnerability Scoring System (CVSS). This score may change depending on factors such as the time a software Vulnerability has been present on a Device asset.
Sevco uses this score in conjunction with other CVSS scores to determine the overall severity of a vulnerability. Learn more
CVSS v3 Temporal is greater than 8.9
CVSS v2 BaseA numerical rating from 0.0-10.0 that indicates the severity of a known software Vulnerability, using an older version of the Common Vulnerability Scoring System (CVSS). This score is determined when a software Vulnerability is first discovered.
Sevco uses this score in conjunction with other CVSS scores to determine the overall severity of a vulnerability. Learn more
CVSS v2 Base is greater than 6.9
CVSS v2 TemporalA numerical rating from 0.0-10.0 that indicates the severity of a known software Vulnerability, using an older version of the Common Vulnerability Scoring System (CVSS). This score may change depending on factors such as the time a software Vulnerability has been present on a Device asset.
Sevco uses this score in conjunction with other CVSS scores to determine the overall severity of a vulnerability. Learn more
CVSS v2 Temporal is greater than or equal to 7.0

Control Attributes

Control State Awareness and Tracking is Sevco’s ability to normalize control attributes to a common field in order to monitor and provide context about a critical control states that affects its ability to deliver the function of the control.

AttributeDefinitionExample
Encryption StatusThe current status and level of encryption being provided by a ControlEncryption Status equals [status]
Management StateThe state or condition of a specific Control that indicates whether a device can be managed or how it is currently being managedRapid7 InsightVM``Management State equals Agent
Protection StateThe state or condition of a Control that indicates the level of or how a device is being controlledMicrosoft Defender for Endpoints``Protection State equals Prevention
StatusThe state or condition of a specific Control that indicates whether a device is online, active, or able to be controlledMicrosoft Defender for Endpoints``Status equals Active

Query Conditions

Qualitative

ConditionDefinitionQuery Example
containsAn attribute value contains a string of alphanumeric characters somewhere within itUsernames contains tori
does not containAn attribute value does not contain a string of alphanumeric characters somewhere within itVendor does not contain Adobe
existsAn attribute exists for an asset, regardless of its valueMAC Address exists
does not existAn attribute value does not exist for an assetHostname does not exist
is likeSpecifies that an attribute value must begin with certain combination of alphanumeric charactersCrowdstrike Agent Version is like 6.4_

Note: This field requires the use of at least one wildcard (_)
is not likeSpecifies that an attribute value must not start with certain combination of alphanumeric charactersCrowdstrike Agent Version is not like 6.42_

Note: This field requires the use of at least one wildcard (_)

Quantitative

ConditionDefinitionQuery Example
betweenAn attribute value is between two specified numerical valuesIP Address between 192.158.1.10 (and) 192.158.1.40
equalsAn attribute value is equal (identical) to a specified valueFirst Name equals John
does not equalAn attribute value is not equal (identical) to a specified valueLast Name does not equal Smith
is greater thanAn attribute value is greater than a numerical value specified by the userCVSS3 Base is greater than 9.1
is greater than or equal toAn attribute value is greater than or equal to a numerical valueCVSS3 Base is greater than or equal to 9.1
is less thanAn attribute value is less than a numerical valueCVSS3 Temporal is less than 8.8
is less than or equal toAn attribute value is less than or equal to a numerical valueCVSS3 Base is less than or equal to 8.8

Time

ConditionDefinitionQuery Example
is afterAn event has taken place after a specified timeLast Activity is after 3 days ago
is on or afterAn event took place at or after a specified time. We recommend using this if you are trying to identify an event that may have taken place at a specific time of day.Last Activity is on or after 05/18/23 12:00 AM
is beforeAn event took place before a specified timeLast Observed is before 3 days ago
is on or beforeAn event took place at or before a specified time. We recommend using this if you are trying to identify an event that may have taken place at a specific time of day.Last Observed is on or before 05/18/23 12:00 AM