Federated Query & Actions Use Cases
Hunt threats, investigate incidents, and take immediate action
Query once across all your security tools, get results from everywhere, and execute responses instantly. No automation can replace what individuals can manually do with unified search and action capabilities.

Code & Configuration Security
Search across all code repositories, infrastructure as code, and configuration files to find security issues before they reach production.
Code Security Search
Search across code repositories for security vulnerabilities
Example Queries:
Available Actions:
Infrastructure as Code
Analyze IaC templates for misconfigurations
Example Queries:
Available Actions:
Dependency Analysis
Search for vulnerable dependencies across projects
Example Queries:
Available Actions:
Threat Hunting & Intelligence
Proactively hunt for threats and investigate indicators of compromise across all your security tools with automatic enrichment.
Threat Hunting Across Tools
Hunt for threats across all security platforms simultaneously
Example Queries:
Available Actions:
IOC Investigation & Enrichment
Investigate indicators of compromise with automatic enrichment
Example Queries:
Available Actions:
Real-Time Alert Investigation
Investigate security alerts with correlated evidence
Example Queries:
Available Actions:
Identity & Access Management
Search and analyze user activities, privileged access, and authentication events across all identity systems.
User Activity Analysis
Track and analyze user behavior across all systems
Example Queries:
Available Actions:
Privileged Access Monitoring
Monitor and audit privileged account usage
Example Queries:
Available Actions:
Authentication Events
Search and analyze authentication patterns
Example Queries:
Available Actions:
Cloud & Container Security
Search across multi-cloud environments and container platforms for security misconfigurations and vulnerabilities.
Cloud Security Posture
Search across AWS, Azure, GCP for misconfigurations
Example Queries:
Available Actions:
Container Security
Search containers and Kubernetes for vulnerabilities
Example Queries:
Available Actions:
Infrastructure as Code
Scan IaC templates for security misconfigurations
Example Queries:
Available Actions:
Network, Endpoint & Email Security
Search across network traffic, endpoint activities, and email communications for threats and anomalies.
Network Traffic Analysis
Search network flows, firewall logs, and proxy data
Example Queries:
Available Actions:
Endpoint Security
Search across all endpoints for threats and vulnerabilities
Example Queries:
Available Actions:
Email Security
Search email logs and analyze phishing attempts
Example Queries:
Available Actions:
Compliance & Governance
Search audit logs, compliance data, security metrics, and data protection policies across your entire security stack.
Compliance Audit Search
Search audit logs and compliance data across all systems
Example Queries:
Available Actions:
Security Metrics & KPIs
Search and analyze security metrics across platforms
Example Queries:
Available Actions:
Data Loss Prevention
Search for sensitive data exposure and policy violations
Example Queries:
Available Actions:
Ready to Query Everything?
Unified search across all your security tools with instant action capabilities - no more tool switching