A powerful, easily deployable network traffic analysis tool suite for network security monitoring
This document provides user-focused descriptions of all available dashboards and their visualizations. Use it to understand what each dashboard monitors, what data it surfaces, and how to interpret individual panels.
The following fields are used across nearly all dashboards and are not repeated in individual dashboard field lists below.
destination.ipdestination.portevent.actionevent.datasetevent.idevent.ingestedevent.moduleevent.originalevent.providerevent.resulthost.namenetwork.directionnetwork.is_orignetwork.protocolnetwork.transportnetwork.typerelated.ipsource.ipsource.porttagszeek.uidThe Actions and Results dashboard provides a cross-protocol view of operation types and their outcomes across all monitored ICS and IT protocols. It aggregates event action and result fields to show what commands were issued, which succeeded or failed, and which hosts were involved. This is useful for detecting anomalous command patterns, failed authentication attempts, and unauthorized operations across protocols.
The Asset Interaction Analysis dashboard maps the communication relationships between hosts on the network enriched with the context provided by the NetBox asset inventory, providing a behavioral picture of which assets talk to which. It uses connection and protocol data to surface interaction patterns, cross-segment traffic, unusual peer relationships, and potentially unauthorized lateral movement. Security teams use this dashboard to understand normal communication baselines and flag deviations that may indicate compromise or misconfiguration.
destination.device.device_typedestination.device.manufacturerdestination.device.namedestination.device.roledestination.ouidestination.segment.namedestination.segment.siteevent.risk_scoreevent.severity_tagsnetwork.bytesnetwork.namenetwork.packetsrelated.siterule.categorysource.device.device_typesource.device.manufacturersource.device.namesource.device.rolesource.ouisource.segment.namesource.segment.siteThe Connections dashboard covers all network-layer connection records observed on the network, including TCP, UDP, and ICMP flows. It surfaces data on conversation volumes, data transfer sizes, connection durations, geographic origins and destinations, and top talkers by byte count. Users can identify chatty hosts, large data transfers, long-lived connections, and cross-border traffic that may warrant further investigation.
destination.geo.country_namedestination.macdestination.ouinetwork.bytesnetwork.community_idserver.bytessource.geo.country_code2source.macsource.ouizeek.conn.conn_state_descriptionzeek.conn.longzeek.conn.missed_bytesThis country-level map shades destination countries by the volume of bytes sent to them by originators, on a green-to-red scale where green indicates lower volumes and red indicates higher volumes. It gives a geographic overview of where data is being directed at a national level. Useful for quickly spotting countries receiving disproportionately large volumes of traffic.
client.bytesdestination.geo.country_iso_codenetwork.bytesThis coordinate map plots destination locations as dots sized by the volume of bytes sent back by responders, pinned to city-level precision. It highlights specific geographic locations where large volumes of response data are originating. Useful for detecting concentrated sources of response traffic at a granular level.
destination.geo.locationnetwork.bytesserver.bytesThis country-level map shades destination countries by the volume of bytes sent back by responders, on a green-to-red scale where green indicates lower volumes and red indicates higher volumes. It gives a geographic overview of which countries are generating the most response traffic back to monitored hosts. Useful for identifying national-level sources of high-volume response data.
destination.geo.country_iso_codenetwork.bytesserver.bytesThis coordinate map plots destination locations as dots sized by total bytes in both directions, pinned to city-level precision. It highlights specific geographic locations involved in the heaviest overall data exchange. Useful for detecting geographic hotspots of combined traffic volume at a granular level.
destination.geo.locationnetwork.bytesThis country-level map shades destination countries by total bytes exchanged in both directions, on a green-to-red scale where green indicates lower volumes and red indicates higher volumes. It provides a high-level geographic summary of which countries are associated with the most overall network traffic. Useful for identifying countries with disproportionately high combined data volumes.
destination.geo.country_iso_codenetwork.bytesThis coordinate map plots destination locations as dots sized by connection duration, pinned to city-level precision. It highlights specific geographic locations associated with the longest-lived connections. Useful for detecting persistent communication channels to unexpected destinations at a granular level.
destination.geo.locationevent.durationnetwork.bytesThis country-level map shades destination countries by longest connection duration, on a green-to-red scale where green indicates shorter durations and red indicates longer ones. It provides a geographic overview of which nations are associated with the most long-lived outbound connections. Useful for identifying countries linked to persistent communication that may indicate C2 or ongoing exfiltration.
destination.geo.country_iso_codeevent.durationnetwork.bytesThis coordinate map plots source locations as dots sized by the volume of bytes sent as an originator, pinned to city-level precision. It highlights specific geographic locations generating the most outbound data. Useful for detecting high-volume originating sources at a granular geographic level.
client.bytesnetwork.bytessource.geo.locationThis country-level map shades source countries by the volume of bytes sent as originators, on a green-to-red scale where green indicates lower volumes and red indicates higher volumes. It provides a geographic overview of which nations are generating the most outbound traffic. Useful for correlating high-volume originator activity with known threat actor regions or unexpected source countries.
client.bytesnetwork.bytessource.geo.country_iso_codeThis country-level map shades source countries by the volume of bytes received from responders, on a green-to-red scale where green indicates lower volumes and red indicates higher volumes. It provides a geographic overview of which source nations are receiving the most response data. Useful for identifying countries whose hosts are pulling large volumes of data from remote responders.
network.bytesserver.bytessource.geo.country_iso_codeThis coordinate map plots source locations as dots sized by total bytes in both directions, pinned to city-level precision. It highlights specific geographic locations with the highest combined traffic volumes. Useful for surfacing geographic hotspots of overall activity at a granular level.
network.bytessource.geo.locationThis country-level map shades source countries by total bytes exchanged in both directions, on a green-to-red scale where green indicates lower volumes and red indicates higher volumes. It provides a high-level geographic summary of which nations are the most network-active overall. Useful for identifying countries with disproportionately high combined traffic volumes.
network.bytessource.geo.country_iso_codeThis coordinate map plots source locations as dots sized by connection duration, pinned to city-level precision. It highlights specific geographic locations where the most persistent outbound connections originate. Useful for detecting long-running sessions from unexpected locations that may indicate beaconing or C2 activity.
event.durationnetwork.bytessource.geo.locationThis country-level map shades source countries by longest connection duration, on a green-to-red scale where green indicates shorter durations and red indicates longer ones. It provides a geographic overview of which nations are associated with the most persistent originating connections. Useful for identifying countries linked to long-lived communication patterns that may indicate ongoing adversary activity.
event.durationnetwork.bytessource.geo.country_iso_codeThe File Scanning dashboard consolidates results from Malcolm’s automatic file extraction and scanning capability provided by Strelka, including those from YARA, ClamAV, and many others. It tracks files observed in network traffic, their MIME types, the contents of archive files, and signatures and reports generated by the scanners. This dashboard is useful for hunting malware, tracking file transfers across the network, and validating whether transferred files are known-bad or suspicious. For a more general-purpose dashboard dealing with file transfers, see Files.
event.risk_scoreevent.severity_tagsfile.entropyfile.mime_typefile.namefile.sizefile.sourcefilescan.hitsfilescan.tree.depthrule.namerule.rulesetthreat.tactic.namethreat.technique.namezeek.files.extracted_uriThe File Tree dashboard presents a hierarchical breakdown of files observed in network traffic, particularly with regards to archived files such as ZIP files or tarballs, allowing parent/child relationships between nested files to be explored.
file.entropyfile.mime_typefile.namefile.sizefile.sourcefilescan.hitsfilescan.tree.depthfilescan.tree.nodefilescan.tree.parentfilescan.tree.rootfirstPacketrule.namerule.rulesetzeek.files.extracted_urizeek.files.filenameThe Files dashboard provides an overview of all files observed traversing the network as captured by Zeek’s file analysis framework. It covers file types by the context of the transfer (e.g., protocol), MIME type, path and filename (where applicable), transfer volumes, source and destination hosts, and file hashes. When file preservation is enabled, users have download access to the files in question. Analysts can identify unusual file types, large file transfers, and track specific files of interest across the captured traffic.
file.mime_typefile.namefile.pathfile.sizefile.sourcezeek.files.extracted_urizeek.files.seen_bytesTrees are Malcolm analytics designed to be utilized by analysts to assist in tracking lateral movement across a network.
The IP Connections Tree dashboard presents network connection data in a hierarchical tree structure, showing parent-child relationships between communicating hosts. It is designed to help analysts visualize communication chains and identify which hosts serve as hubs or pivots in the network topology. This view is particularly useful during incident investigations to trace lateral movement or identify command-and-control relationships.
network.byteszeek.conn.conn_stateThe Overview dashboard provides a high-level summary of all network traffic and log activity across the monitored environment. It aggregates events from every data source into a single view, showing total log volume, protocol distribution, and top communicating hosts. Analysts use it as a starting point to assess overall activity levels and quickly identify unusual spikes or new protocol traffic before drilling into protocol-specific dashboards.
destination.geo.country_namenetwork.bytesnetwork.protocol_versionzeek.dns.answerszeek.dns.queryThe PE (Portable Executable) dashboard provides visibility into Windows PE file analysis data observed in network traffic, covering OS targets, machine types, subsystems, section names, and capability signatures. It helps analysts understand what executable files have been observed in network traffic and identify suspicious characteristics such as unusual sections or capability flags. This dashboard is particularly useful during malware investigations to quickly characterize executables transferring across the network.
rule.namezeek.pe.machinezeek.pe.oszeek.pe.section_nameszeek.pe.subsystemThe Security Overview dashboard offers a consolidated view of security-relevant events across all monitored protocols. It combines alert data, notice events, and categorized rule hits to give analysts an at-a-glance picture of the threat landscape. This is a useful starting point for daily triage, providing trend lines, category breakdowns, and top event sources to focus attention where it matters most.
destination.geo.country_code2destination.geo.country_namedns.hostevent.freq_score_v1event.freq_score_v2event.severity_tagsfile.mime_typenetwork.bytesnetwork.protocol_versionrelated.userrule.categoryrule.namesource.geo.country_namevulnerability.idzeek.dns.answerszeek.dns.queryThe Severity dashboard organizes all detected events and alerts by their assigned severity level, from informational notices through critical findings. It draws from both Zeek notices and Suricata alert data to present a ranked view of the most impactful activity in the environment. Analysts use it to prioritize response actions and track whether high-severity event counts are increasing or decreasing over time.
destination.geo.country_iso_codedestination.ouievent.risk_scoreevent.severityevent.severity_tagsfile.mime_typefile.pathfile.sourcerule.categoryrule.namesource.geo.country_iso_codesource.ouizeek.notice.msgzeek.notice.noteThe Signatures dashboard focuses on rule-based detections, showing which signatures have fired and how frequently. It covers both Suricata alert rules and Zeek notice signatures, providing a breakdown by rule name, category, and originating host. This dashboard helps tune detection coverage—identifying which signatures generate the most noise versus those that rarely fire but may be highly significant.
rule.categoryrule.nameThe Software dashboard tracks software versions and products observed in network traffic, as identified by Zeek’s Software framework. It surfaces client and server software names, versions, and the hosts running them, enabling asset management and vulnerability correlation. This is particularly useful for identifying outdated or vulnerable software versions in use across the environment.
url.fullzeek.software.namezeek.software.software_typezeek.software.unparsed_versionzeek.software.version_majorzeek.software.version_minorThe Suricata Alerts dashboard surfaces all alerts generated by the Suricata network intrusion detection engine. It presents alert volume over time, rule categories, top alert names, and the source and destination hosts triggering detections. Analysts can use it to identify active threats, track alert trends, and investigate which hosts are most involved in flagged activity.
destination.geo.country_namerule.categoryrule.idrule.namesource.geo.country_namevulnerability.categoryThe Threat Intelligence dashboard presents matches between observed network traffic and threat intelligence indicators, as detected by Zeek’s Intel framework. It shows which indicators have been seen, their types (IP, domain, URL, etc.), the sources providing the intelligence, and which network hosts were involved. Analysts can use this dashboard to identify confirmed IOC matches and prioritize incident response based on indicator severity and frequency.
file.mime_typethreat.indicator.descriptionthreat.indicator.namethreat.indicator.providerthreat.indicator.referencethreat.indicator.typezeek.intel.categoryzeek.intel.seen_whereThe Zeek Known Summary dashboard aggregates data from Zeek’s ‘known’ logs, which track hosts, services, and certificates that have been observed on the network. It provides an inventory-style view of known devices, services, and software in the environment. This is useful for asset discovery, baselining normal behavior, and identifying new or unexpected hosts and services appearing on the network.
destination.device.uninventorieddestination.segment.namenetwork.namerelated.device_namerelated.device_typerelated.manufacturerrelated.rolerelated.sitesource.device.uninventoriedsource.segment.nameurl.fullzeek.known_services.iana_descriptionzeek.known_services.iana_namezeek.software.namezeek.software.software_typezeek.software.unparsed_versionThe Zeek Notices dashboard displays all notice-level events raised by Zeek’s detection framework, which flags potentially significant network behaviors. Notices can represent a wide range of conditions—from scanning activity and SSL anomalies to policy violations and protocol errors. This dashboard helps analysts review what Zeek has flagged, understand the distribution of notice types, and correlate notices with specific hosts.
destination.geo.country_namerule.categoryrule.namesource.geo.country_namezeek.notice.file_desczeek.notice.file_mime_typezeek.notice.msgThe Zeek Weird dashboard captures unusual or unexpected protocol behaviors that Zeek’s ‘weird’ log records—events that don’t fit normal protocol expectations. These entries often indicate malformed packets, protocol misuse, or active reconnaissance, making them valuable early-warning indicators. Analysts can review this dashboard to surface low-level anomalies that may not trigger a full alert but still merit investigation.
rule.nameThe DCE/RPC dashboard provides visibility into Distributed Computing Environment / Remote Procedure Call (DCE/RPC) traffic, which underlies many Windows protocols including DCOM and WMI. It surfaces endpoint UUIDs, operations, named pipes, and the hosts involved in RPC exchanges. Security teams can use this dashboard to detect lateral movement via WMI or DCOM, identify unusual RPC service calls, and spot DCE/RPC-based reconnaissance.
zeek.dce_rpc.endpointzeek.dce_rpc.named_pipezeek.dce_rpc.operationzeek.dce_rpc.rttThe DHCP dashboard tracks Dynamic Host Configuration Protocol (DHCP) activity observed on the network, including IP address assignments, hostname registrations, and lease activity. It provides a real-time picture of which devices are joining the network and what addresses they are receiving. Analysts can use it for asset discovery, detecting rogue DHCP servers, and correlating IP addresses with hostnames at specific points in time.
dhcp.ja4dsource.maczeek.dhcp.assigned_ipzeek.dhcp.client_softwarezeek.dhcp.domainzeek.dhcp.host_namezeek.dhcp.msg_typeszeek.dhcp.server_softwarezeek.dhcp.vendor_class_idThe DNS dashboard provides a comprehensive view of Domain Name System (DNS) activity observed on the network. It covers query volumes over time, top queried domains, response codes, query types, and the hosts generating DNS traffic. Analysts use it to detect DNS-based threats such as data exfiltration via DNS tunneling, domain generation algorithm (DGA) activity, and unusually high query rates.
dns.hostevent.freq_score_v1event.freq_score_v2zeek.dns.answerszeek.dns.qclass_namezeek.dns.qtype_namezeek.dns.queryzeek.dns.rcode_nameThe FTP dashboard covers all File Transfer Protocol (FTP) activity observed on the network, including commands, arguments, reply codes, and transfer participants. It provides insight into file staging, unauthorized file transfers, and FTP authentication patterns. This is a useful dashboard for investigating data exfiltration over FTP and identifying misconfigured FTP servers accessible to unauthorized clients.
related.userzeek.ftp.argzeek.ftp.commandzeek.ftp.reply_codezeek.ftp.reply_msgThe HTTP dashboard covers all HTTP web traffic observed on the network, including request methods, URIs, response codes, user agents, and host headers. It provides insight into web browsing behavior, application traffic, file downloads, and server responses across the monitored network. This is a key dashboard for investigating web-based attacks, unauthorized downloads, and unusual HTTP patterns that may indicate compromise.
destination.geo.country_namefile.mime_typenetwork.protocol_versionrelated.passwordrelated.useruser_agent.originalzeek.http.hostzeek.http.methodzeek.http.referrerzeek.http.status_msgzeek.http.uriThe IRC dashboard covers Internet Relay Chat (IRC) protocol traffic, tracking channels, nicknames, commands, and communication hosts. IRC is frequently used as a command-and-control channel by botnets and malware, making this dashboard a useful tool for detecting C2 communication and bot activity. Analysts can identify unexpected IRC traffic in environments where it is not a legitimate business tool.
destination.geo.city_namedestination.geo.country_namezeek.irc.commandzeek.irc.nickzeek.irc.valueThe Kerberos dashboard surfaces Kerberos authentication traffic, covering ticket requests, error codes, service names, and participating hosts. It is useful for detecting Kerberoasting, AS-REP roasting, ticket forgery, and other Active Directory authentication abuse patterns. Analysts can use the error code breakdown to identify failed authentication spikes and unusual service ticket requests.
zeek.kerberos.cipherzeek.kerberos.cnamezeek.kerberos.error_msgzeek.kerberos.renewablezeek.kerberos.request_typezeek.kerberos.snamezeek.kerberos.successThe LDAP dashboard tracks Lightweight Directory Access Protocol (LDAP) queries and responses, covering bind operations, search queries, object targets, and results. It is particularly useful for identifying Active Directory enumeration, unauthorized directory queries, and LDAP injection attempts. Analysts can review top querying hosts and common search targets to baseline legitimate directory usage against anomalous activity.
network.protocol_versionzeek.ldap.argumentzeek.ldap.message_idzeek.ldap.objectzeek.ldap.versionzeek.ldap_search.base_objectzeek.ldap_search.filterzeek.ldap_search.message_idzeek.ldap_search.result_countzeek.ldap_search.scopeThe MQTT dashboard covers MQ Telemetry Transport (MQTT) protocol traffic, widely used in IoT devices and lightweight machine-to-machine communication. It tracks topic names, QoS levels, client IDs, and broker/client communication patterns observed on the network. This dashboard is useful for asset discovery in IoT environments, detecting unauthorized MQTT brokers, and identifying sensitive topics being published or subscribed to by unexpected clients.
zeek.mqtt_connect.client_idzeek.mqtt_connect.connect_statuszeek.mqtt_connect.proto_namezeek.mqtt_connect.proto_versionzeek.mqtt_publish.from_clientzeek.mqtt_publish.payloadzeek.mqtt_publish.payload_lenzeek.mqtt_publish.statuszeek.mqtt_publish.topiczeek.mqtt_subscribe.ackzeek.mqtt_subscribe.actionzeek.mqtt_subscribe.topicsThe MySQL dashboard provides visibility into MySQL database protocol traffic, including command types, user credentials (where visible), affected rows, and connection metadata. It helps detect unauthorized database access, SQL operations from unexpected hosts, and unusual query patterns. Security teams can use this to enforce database access policies and identify potential data exfiltration over MySQL connections.
zeek.mysql.argzeek.mysql.cmdzeek.mysql.responsezeek.mysql.successThe NTLM dashboard covers NT LAN Manager (NTLM) authentication traffic, including NTLM challenge-response exchanges, domain information, and authentication outcomes. It provides insight into legacy authentication usage and helps detect NTLM relay attacks, credential brute-forcing, and pass-the-hash activity. Security teams can use this dashboard to identify systems still relying on NTLM where Kerberos should be used.
related.userzeek.ntlm.domainzeek.ntlm.hostzeek.ntlm.server_dns_computerzeek.ntlm.server_nb_computerzeek.ntlm.server_treezeek.ntlm.successThe NTP dashboard covers Network Time Protocol (NTP) traffic, providing insight into time synchronization activity across the environment. It tracks NTP stratum levels, reference IDs, version numbers, and communication pairs. Analysts can detect NTP amplification abuse, rogue time sources, and unusual NTP query volumes that could indicate reconnaissance or DDoS preparation.
zeek.ntp.mode_strzeek.ntp.org_timezeek.ntp.pollzeek.ntp.stratumzeek.ntp.versionzeek.ntp.xmt_timeThe OSPF dashboard covers Open Shortest Path First (OSPF) routing protocol traffic. It tracks message types (Hello, DBD, LSR, LSU, LSAck), router IDs, area IDs, and neighbor relationships. Security teams can use this to detect unauthorized OSPF neighbors attempting to inject false routing information, which could redirect traffic or enable man-in-the-middle attacks.
network.protocol_versionzeek.ospf.area_idzeek.ospf.backup_routerzeek.ospf.desig_routerzeek.ospf.interface_idzeek.ospf.link_typezeek.ospf.lsa_typezeek.ospf.neighborszeek.ospf.router_idThe PostgreSQL dashboard covers PostgreSQL database protocol traffic, including connection metadata, command types, and host pairs. It provides visibility into who is accessing PostgreSQL instances and what types of operations they are performing. Analysts can detect unauthorized database access, unexpected client connections, and unusual query volumes that may indicate automated data extraction.
related.userzeek.postgresql.application_namezeek.postgresql.backend_argzeek.postgresql.databasezeek.postgresql.frontend_argzeek.postgresql.rowsThe QUIC dashboard provides visibility into QUIC protocol traffic, a UDP-based transport used by modern HTTPS and HTTP/3 connections. It covers connection metadata, server names, versions, and host communication pairs. This dashboard is useful for tracking QUIC-based web traffic, identifying applications using QUIC, and detecting attempts to bypass inspection by tunneling traffic over QUIC.
quic.hostquic.versionuser_agent.originalzeek.gquic.cyuzeek.gquic.cyutagsThe RADIUS dashboard covers Remote Authentication Dial-In User Service (RADIUS) protocol traffic, tracking authentication requests, results, username attributes, and NAS identifiers. RADIUS is used for centralized network access authentication, and this dashboard helps detect brute-force attempts, authentication bypass, and rogue RADIUS clients. Analysts can correlate failed authentication spikes with specific NAS devices and usernames.
related.userzeek.radius.connect_infozeek.radius.framed_addrzeek.radius.maczeek.radius.resultThe RDP dashboard covers Remote Desktop Protocol (RDP) sessions, including connection metadata, authentication outcomes, security protocols, and host certificates. It provides visibility into remote desktop usage and helps detect unauthorized remote access, brute-force attempts, and RDP-based lateral movement. This is a high-value dashboard during incident response when adversaries frequently leverage RDP for interactive access.
zeek.rdp.client_buildzeek.rdp.cookiezeek.rdp.encryption_levelzeek.rdp.encryption_methodzeek.rdp.keyboard_layoutzeek.rdp.resultzeek.rdp.security_protocolThe Redis dashboard covers Redis in-memory data store protocol traffic, including command types, return values, and communication pairs. Redis is commonly exposed unintentionally without authentication, making it a frequent target for unauthorized access and data manipulation. Analysts can use this dashboard to detect unexpected Redis clients, dangerous commands (FLUSHDB, CONFIG), and unauthorized access to cached data.
zeek.redis.cmd_keyzeek.redis.cmd_valuezeek.redis.successThe RFB dashboard covers Remote Framebuffer (RFB) protocol sessions (used by VNC), including desktop sharing connections, authentication types, and host pairs. It helps identify remote desktop activity outside of expected channels and detect unauthorized VNC access to internal systems. Analysts can use it to baseline legitimate VNC usage and flag unexpected desktop-sharing sessions.
zeek.rfb.authzeek.rfb.authentication_methodzeek.rfb.client_major_versionzeek.rfb.client_minor_versionzeek.rfb.desktop_namezeek.rfb.server_major_versionzeek.rfb.server_minor_versionzeek.rfb.share_flagThe SIP dashboard covers Session Initiation Protocol (SIP) traffic, including call setup, methods, response codes, user agents, and communication pairs. SIP is used for VoIP and unified communications and can be targeted for toll fraud, call hijacking, and reconnaissance of telephony infrastructure. Analysts can detect unusual SIP activity, rogue clients, high volumes of failed authentication, and unauthorized INVITE or REGISTER messages.
destination.geo.country_nameuser_agent.originalzeek.sip.content_typezeek.sip.request_pathzeek.sip.status_codezeek.sip.status_msgzeek.sip.uriThe SMB dashboard provides visibility into Server Message Block (SMB) protocol traffic, covering file sharing, named pipe operations, and authentication activity. It surfaces the commands used, files accessed, share names, and hosts involved in SMB communication. This is a critical dashboard for detecting lateral movement, credential relay attacks, and ransomware staging behavior that frequently leverages SMB.
network.protocol_versionrule.categoryrule.namezeek.notice.msgzeek.smb_files.namezeek.smb_files.pathThe SMTP dashboard covers SMTP email traffic observed on the network. It tracks message senders, recipients, mail servers, attachment details, and transmission metadata. Analysts use it to investigate phishing activity, unauthorized mail relay, and unusual email flow patterns that could indicate account compromise or malware communication.
destination.geo.country_nameuser_agent.originalzeek.smtp.is_webmailzeek.smtp.mailfromzeek.smtp.rcpttozeek.smtp.subjectzeek.smtp.tlszeek.smtp.x_originating_ipThe SNMP dashboard covers Simple Network Management Protocol (SNMP) traffic, including get/set operations, community strings (if visible), and managed device identifiers. It provides insight into network device monitoring activity and helps detect unauthorized SNMP polling, community string brute-forcing, and SNMP-based information gathering. Analysts can identify which hosts are querying network infrastructure devices and flag unexpected management traffic.
network.protocol_versionzeek.snmp.communityzeek.snmp.durationzeek.snmp.versionThe SSH dashboard tracks Secure Shell (SSH) sessions, covering connection counts, authentication outcomes, client and server versions, and geographic origins. It provides visibility into remote access activity and helps detect brute-force attempts, unauthorized access, and unusual geographic sources of SSH connections. Analysts can correlate version data to identify outdated SSH implementations that may be vulnerable.
zeek.ssh.auth_successzeek.ssh.cipher_algzeek.ssh.clientzeek.ssh.hasshzeek.ssh.hasshAlgorithmszeek.ssh.hasshServerzeek.ssh.hasshServerAlgorithmszeek.ssh.mac_algzeek.ssh.serverzeek.ssh.sshkazeek.ssh.versionThe SSL/TLS dashboard presents certificate and connection data from encrypted traffic observed on the network. It surfaces certificate subjects, issuers, validation errors, cipher suites, and TLS versions in use across the environment. Analysts can use it to identify self-signed or expired certificates, weak cipher usage, and potentially malicious use of encryption to hide command-and-control traffic.
destination.geo.country_nameevent.freq_score_v1event.freq_score_v2rule.categoryrule.namezeek.notice.msgzeek.ssl.curvezeek.ssl.establishedzeek.ssl.next_protocolzeek.ssl.server_namezeek.ssl.sni_matches_certzeek.ssl.ssl_historyzeek.ssl.ssl_versionzeek.ssl.validation_statuszeek.x509.fingerprintThe STUN dashboard covers Session Traversal Utilities for NAT (STUN) traffic, which is used by applications like WebRTC to establish peer-to-peer connections through firewalls. It tracks binding requests, responses, software identifiers, and communication pairs. Analysts can use this dashboard to identify applications using STUN-based NAT traversal and flag unexpected STUN traffic that may be used for covert communication channels.
zeek.stun.attr_typezeek.stun.classzeek.stun_nat.lan_addrzeek.stun_nat.wan_addrzeek.stun_nat.wan_portSyslog messages observed in network traffic
The Syslog dashboard presents syslog messages observed in network traffic, covering severity levels, facility codes, originating hosts, and message content summaries. It helps analysts understand what systems are forwarding log data, whether logging pipelines are functioning correctly, and whether any unusual error or critical syslog events are being generated. This dashboard is also useful for detecting log flooding, rogue syslog sources, and syslog-based data exfiltration.
zeek.syslog.facilityzeek.syslog.messagezeek.syslog.severityThe Tabular Data Stream (TDS) dashboard covers Microsoft SQL Server’s Tabular Data Stream (TDS) protocol traffic, including login metadata, query activity, and response codes. It provides visibility into database connections and helps detect unauthorized SQL Server access and unusual database activity. Analysts can identify which clients are connecting to SQL Server instances and detect patterns consistent with SQL injection or data exfiltration.
zeek.tds.commandThe Tabular Data Stream - RPC dashboard focuses on remote procedure call operations within Microsoft SQL Server’s TDS protocol traffic, including stored procedure execution and batch operations. It surfaces the RPC procedure names, parameters, and originating hosts, providing detailed insight into programmatic database interactions. Security teams can use this to detect unauthorized stored procedure execution and unusual RPC-based SQL Server communication.
zeek.tds_rpc.parameterzeek.tds_rpc.procedure_nameThe Tabular Data Stream - SQL dashboard focuses on the SQL statement activity within Microsoft SQL Server’s TDS protocol traffic, capturing query text snippets, affected rows, and communication metadata. It provides a window into the types of SQL queries being executed against SQL Server instances. Analysts can use this to detect data harvesting queries, schema enumeration, and unauthorized or unusual SQL activity from unexpected clients.
zeek.tds_sql_batch.header_typezeek.tds_sql_batch.queryThe Telnet, rlogin, and rsh dashboard covers legacy plaintext remote access protocols — Telnet, rlogin, and rsh — providing visibility into unencrypted interactive sessions. These protocols transmit credentials and session data in cleartext, making them high-risk when observed on modern networks. Analysts can use this dashboard to identify legacy systems still using insecure remote access protocols and investigate any such sessions as potential security incidents.
related.useruserzeek.login.client_userzeek.login.successThe TFTP dashboard covers Trivial File Transfer Protocol (TFTP) traffic, including file names, transfer directions, block counts, and host pairs. TFTP is commonly used for network device firmware updates and PXE boot, but also frequently abused for unauthorized file transfers due to its lack of authentication. Analysts can detect unexpected TFTP activity, unauthorized firmware or configuration file transfers, and TFTP servers that should not be accessible.
file.pathzeek.tftp.modeThe Tunnels dashboard provides visibility into network tunneling activity, covering protocols like GRE, IP-in-IP, and application-layer tunnels. It surfaces tunnel types, encapsulated protocols, and the hosts involved in tunneling activity. Analysts can use this to detect covert communication channels, VPN bypass attempts, and unauthorized encapsulation that may be used to hide malicious traffic.
destination.geo.country_namezeek.tunnel.actionzeek.tunnel.tunnel_typeThe WebSocket dashboard covers WebSocket upgrade sessions and message traffic, tracking the web hosts, URIs, and connection patterns involved in persistent WebSocket connections. WebSocket connections are used by modern web applications for real-time communication and can also be abused for covert C2 channels. Analysts can use this dashboard to identify unexpected WebSocket usage and flag connections to suspicious or unauthorized endpoints.
related.hostsurl.originaluser_agent.nameuser_agent.originalzeek.websocket.client_extensionszeek.websocket.client_protocolszeek.websocket.server_extensionszeek.websocket.subprotocolThe X.509 dashboard focuses on certificate metadata extracted from TLS/SSL sessions, providing a detailed inventory of certificates seen on the network. It covers certificate subjects, issuers, signing algorithms, key lengths, and whether certificates are used for host or client authentication. This dashboard helps identify weak cryptographic configurations, expired or untrusted certificates, and certificate anomalies that may indicate impersonation or MitM attacks.
rule.categoryrule.namezeek.notice.msgzeek.ocsp.certStatuszeek.ocsp.nextUpdatezeek.ocsp.revokereasonzeek.ocsp.revoketimezeek.ocsp.serialNumberzeek.ocsp.thisUpdatezeek.x509.certificate_issuer.CNzeek.x509.certificate_issuer_fullzeek.x509.certificate_key_algzeek.x509.certificate_key_lengthzeek.x509.certificate_sig_algzeek.x509.certificate_subject.CNzeek.x509.certificate_subject_fullzeek.x509.certificate_versionzeek.x509.client_certzeek.x509.fingerprintzeek.x509.host_certANSI C12.22 visualizations
The ANSI C12.22 dashboard covers the ANSI C12.22 smart meter communication protocol traffic, used in advanced metering infrastructure (AMI) and utility environments. It surfaces service types, device identifiers, table data access, and communication pairs between meters and head-end systems. Analysts monitoring utility networks can use this dashboard to detect unauthorized meter access, data manipulation, and rogue devices communicating on the AMI network.
related.passwordrelated.userzeek.c1222.ap_titlezeek.c1222.called_ap_invocation_idzeek.c1222.called_ap_titlezeek.c1222.calling_ap_invocation_idzeek.c1222.calling_ap_titlezeek.c1222.calling_auth_valuezeek.c1222.elementszeek.c1222.epsem_servicezeek.c1222.is_encrypted_epsemzeek.c1222.req_respzeek.c1222_user_information.encrypted_epsemzeek.c1222_user_information.epsem_controlzeek.c1222_user_information.macDashboard for the BACnet (Building Automation and Control Networks) Protocol
The BACnet dashboard covers Building Automation and Control network (BACnet) protocol traffic, targeting building management systems. It tracks service types, instance numbers, vendor IDs, object identifiers, and device communication patterns. Analysts and building automation security teams can use this dashboard to detect unauthorized access to HVAC, lighting, and physical access control systems.
threat.tactic.namethreat.technique.namezeek.bacnet.bvlc_functionzeek.bacnet.instance_numberzeek.bacnet.invoke_idzeek.bacnet.pdu_servicezeek.bacnet.pdu_typezeek.bacnet_discovery.object_typezeek.bacnet_discovery.vendorzeek.bacnet_property.object_typezeek.bacnet_property.propertyzeek.bacnet_property.valuezeek.notice.msgThe BSAP dashboard covers Bristol Standard Asynchronous Protocol (BSAP) traffic used in ABB and Bristol Babcock control systems, common in oil and gas and chemical process environments. It logs function codes, device addresses, and communication pairs observed on the network. Security teams can use this dashboard to detect unauthorized commands to BSAP-enabled field devices and monitor for unexpected communication sources.
zeek.bsap_ip_rdb.app_func_codezeek.bsap_ip_rdb.func_codezeek.bsap_ip_rdb.node_statuszeek.bsap_ip_rdb.variable_countzeek.bsap_ip_rdb.variableszeek.bsap_serial_header.dfunzeek.bsap_serial_header.nsbzeek.bsap_serial_header.sfunzeek.bsap_serial_header.type_namezeek.bsap_serial_rdb.func_codezeek.bsap_serial_rdb.variable_countzeek.bsap_serial_rdb.variablesDashboard for the DNP3 Protocol
The DNP3 dashboard covers Distributed Network Protocol 3 (DNP3) traffic, a common ICS protocol used in electric utility and water treatment environments. It surfaces function codes, object headers, master and outstation addresses, and request/response patterns observed on the network. This dashboard helps security and operations teams detect command injection, unauthorized polling, and anomalous DNP3 traffic that may indicate unauthorized access to field devices.
zeek.dnp3.fc_replyzeek.dnp3.iin_flagszeek.dnp3_control.block_typezeek.dnp3_control.clear_bitzeek.dnp3_control.function_codezeek.dnp3_control.index_numberzeek.dnp3_control.operation_typezeek.dnp3_control.status_codezeek.dnp3_control.trip_control_codezeek.dnp3_objects.object_countzeek.dnp3_objects.object_typezeek.dnp3_objects.range_highzeek.dnp3_objects.range_lowThe EtherCAT dashboard provides visibility into EtherCAT industrial Ethernet traffic, used in high-speed motion control and automation systems. It captures command types, server addresses, working counters, and communication patterns between client and server devices. This dashboard is useful for detecting anomalous EtherCAT traffic that could indicate device tampering or unauthorized access to automation equipment.
destination.macdestination.ouisource.macsource.ouizeek.ecat_registers.register_addrzeek.ecat_registers.register_typezeek.ecat_registers.server_addrDashboard for Ethernet/IP and CIP Protocols
The EtherNet/IP dashboard covers EtherNet/IP and Common Industrial Protocol (CIP) traffic, which is widely used in manufacturing and process control environments. It surfaces CIP service codes, class and instance identifiers, device identity data, and communication pairs. Security teams can use this to monitor for unauthorized PLC access, unusual CIP commands, and unexpected EtherNet/IP device discovery activity.
threat.tactic.namethreat.technique.namezeek.cip.cip_sequence_countzeek.cip.class_idzeek.cip.class_namezeek.cip.directionzeek.cip.instance_idzeek.cip.packet_correlation_idzeek.cip_identity.device_type_namezeek.cip_identity.product_namezeek.cip_identity.revisionzeek.cip_identity.serial_numberzeek.cip_identity.vendor_namezeek.cip_io.connection_idzeek.cip_io.data_lengthzeek.cip_io.sequence_numberzeek.enip.lengthzeek.enip.optionszeek.enip.sender_contextzeek.enip.session_handlezeek.notice.msgDashboard for the GE SRTP Protocol
The GE SRTP dashboard covers the GE Service Request Transport Protocol (SRTP), used to communicate with GE PLCs and automation devices. It captures service request types, memory area access, sequence numbers, and communication pairs. Security teams can use this to detect unauthorized reads or writes to GE PLC memory areas, which could indicate ICS-targeted attacks or insider threats.
zeek.ge_srtp.constant_sweep_modezeek.ge_srtp.data_lengthzeek.ge_srtp.front_panel_enable_switchzeek.ge_srtp.front_panel_run_switchzeek.ge_srtp.io_fault_entry_last_readzeek.ge_srtp.io_fault_entry_presentzeek.ge_srtp.memory_offsetzeek.ge_srtp.oem_protectedzeek.ge_srtp.oversweep_flagzeek.ge_srtp.packet_numberzeek.ge_srtp.plc_fault_entry_last_readzeek.ge_srtp.plc_fault_entry_presentzeek.ge_srtp.plc_statezeek.ge_srtp.programmer_attachmentzeek.ge_srtp.segment_selectorzeek.ge_srtp.sequence_number_1zeek.ge_srtp.sequence_number_2zeek.ge_srtp.srtp_typezeek.ge_srtp.total_packet_numberDashboard for the GENISYS Protocol
The GENISYS dashboard covers network traffic for the GENISYS industrial protocol. It tracks source and destination communication pairs, station addresses, operation directions, and event results. This dashboard gives operators and security teams visibility into GENISYS device communication and helps detect anomalous commands or unexpected participants in protocol exchanges.
zeek.genisys.directionzeek.genisys.payloadzeek.genisys.serverThe HART-IP dashboard covers Highway Addressable Remote Transducer (HART) over IP traffic, used to communicate with smart field instruments in process control environments. It logs command codes, device addresses, response codes, and communication participants. Security teams monitoring process control networks can use this to detect unauthorized read or write commands to smart sensors and field devices.
zeek.hart_ip.direct_pdu_device_status_configuration_changedzeek.hart_ip.direct_pdu_device_status_device_malfunctionzeek.hart_ip.direct_pdu_extended_status_critical_power_failurezeek.hart_ip.direct_pdu_extended_status_device_variable_alertzeek.hart_ip.direct_pdu_extended_status_failurezeek.hart_ip.direct_pdu_extended_status_function_checkzeek.hart_ip.direct_pdu_extended_status_maintenance_requiredzeek.hart_ip.direct_pdu_extended_status_out_of_specificationzeek.hart_ip.header_sequence_numberzeek.hart_ip.header_versionzeek.hart_ip.read_audit_log_server_status_insecure_syslog_connectionzeek.hart_ip.token_passing_pdu_command_numberzeek.hart_ip.token_passing_pdu_contents_response_device_status_configuration_changedzeek.hart_ip.token_passing_pdu_contents_response_device_status_device_malfunctionzeek.hart_ip_session_record.session_log_record_session_status_summary_insecure_sessionzeek.hart_ip_session_record.session_log_record_session_status_summary_writes_occuredzeek.hart_ip_universal_commands.read_message_response_messagezeek.hart_ip_universal_commands.read_unique_identifier_response_device_profilezeek.hart_ip_universal_commands.read_unique_identifier_response_expanded_device_typezeek.hart_ip_universal_commands.read_unique_identifier_response_hart_protocol_major_revisionzeek.hart_ip_universal_commands.write_message_message_stringThe ICS Best Guess dashboard surfaces connections that exhibit characteristics consistent with industrial control system (ICS) or operational technology (OT) protocols, even when not definitively identified. It flags traffic that heuristically resembles ICS protocols based on port, behavior, and tagging logic. This dashboard is a useful tool for discovering shadow ICS/OT devices or unrecognized protocols in environments where all OT traffic should be accounted for.
protocolzeek.bestguess.categoryzeek.bestguess.nameThe ICS/IoT Security Overview dashboard aggregates security-relevant data specific to industrial control and IoT network traffic. It presents ICS log volumes, protocol distribution, external connectivity, ATT&CK for ICS tactic mapping, and unusual actions or results. Security teams use it to monitor the risk posture of OT/ICS environments and quickly surface tactics or techniques that map to known ICS attack patterns.
destination.geo.country_namenetwork.bytesrule.categorysource.geo.country_namethreat.tactic.namethreat.technique.namezeek.notice.msgDashboard for the Modbus Protocol
The Modbus dashboard provides visibility into Modbus industrial protocol traffic, covering function codes, register addresses, unit identifiers, and host communication pairs. Modbus is widely used in SCADA and ICS environments for controlling field devices, making this dashboard critical for OT security monitoring. Analysts can detect unauthorized commands, unusual function codes, and communication with unexpected Modbus devices.
network.byteszeek.known_modbus.device_typezeek.modbus.network_directionzeek.modbus.trans_idzeek.modbus.unit_idzeek.modbus_detailed.addresszeek.modbus_detailed.link_idzeek.modbus_detailed.matchedzeek.modbus_detailed.quantityzeek.modbus_detailed.request_valueszeek.modbus_detailed.response_valueszeek.modbus_mask_write_register.and_maskzeek.modbus_mask_write_register.or_maskzeek.modbus_read_device_identification.conformity_levelzeek.modbus_read_device_identification.device_id_codezeek.modbus_read_device_identification.object_idzeek.modbus_read_device_identification.object_valuezeek.modbus_read_write_multiple_registers.read_registerszeek.modbus_read_write_multiple_registers.read_start_addresszeek.modbus_read_write_multiple_registers.write_registerszeek.modbus_read_write_multiple_registers.write_start_addressThe Omron FINS dashboard provides visibility into the Factory Interface Network Service (FINS) protocol used by Omron PLCs and automation equipment. It tracks command codes, memory area designations, unit addresses, and source/destination host pairs. This dashboard is useful for detecting unauthorized command execution against Omron controllers, including memory reads, writes, and PLC status queries.
file.pathzeek.omron_fins.destination_network_addresszeek.omron_fins.destination_node_numberzeek.omron_fins.destination_unit_addresszeek.omron_fins.icf_data_typezeek.omron_fins.link_idzeek.omron_fins.service_idzeek.omron_fins.source_network_addresszeek.omron_fins.source_node_numberzeek.omron_fins.source_unit_addresszeek.omron_fins_detail.controller_modelzeek.omron_fins_detail.controller_versionThe OPC UA Binary dashboard covers OPC Unified Architecture (OPC UA) binary protocol traffic, the modern standard for industrial data exchange between PLCs, SCADA systems, and enterprise applications. It captures service types, node IDs, security policy, and communication pairs observed on the network. Analysts can use this to detect unauthorized OPC UA connections, unusual browsing or write operations, and unexpected cross-zone OPC UA traffic.
network.protocol_versionrelated.passwordrelated.userurl.originalzeek.opcua_binary.opcua_link_idzeek.software.nameThe PROFINET dashboard covers PROFINET industrial communication protocol traffic, commonly used in manufacturing automation with Siemens and other ICS vendors. It tracks DCP (Discovery and Configuration Protocol), IO (real-time I/O), and DCE/RPC sub-protocol activity between PLCs, HMIs, and I/O devices. Security teams use it to detect unauthorized device discovery, configuration changes, and unusual PROFINET communication patterns.
network.protocol_versionzeek.profinet.block_versionzeek.profinet.indexzeek.profinet.operation_typezeek.profinet.slot_numberzeek.profinet.subslot_numberzeek.profinet_io_cm.operationzeek.profinet_io_cm.packet_typezeek.profinet_io_cm.sequence_numThe ROC Plus dashboard covers the Emerson ROC Plus protocol traffic used to communicate with remote operations controllers commonly found in oil and gas environments. It logs parameter group and logic numbers, operation types, and communication participants. Security teams can use this dashboard to detect unauthorized reads or writes to ROC devices and monitor for unexpected communication patterns in pipeline control systems.
file.directoryfile.namenetwork.byteszeek.roc_plus.link_idzeek.roc_plus.packet_typeThe S7comm dashboard provides visibility into Siemens S7 protocol (S7comm) communication used to program and control Siemens PLCs, a frequent target in ICS attacks. It surfaces function codes, block types, CPU data, and communication pairs between engineering stations and PLCs. This is a critical dashboard for detecting unauthorized PLC programming, reading of sensitive memory areas, and reconnaissance against Siemens control systems.
file.pathnetwork.protocol_versionthreat.tactic.namethreat.technique.namezeek.notice.msgzeek.s7comm.pdu_referencezeek.s7comm_known_devices.automation_system_namezeek.s7comm_known_devices.module_namezeek.s7comm_known_devices.module_serialzeek.s7comm_known_devices.plant_namezeek.s7comm_read_szl.methodzeek.s7comm_read_szl.szl_indexzeek.s7comm_upload_download.block_typezeek.s7comm_upload_download.destination_filesystemDashboard for the DNP3 Protocol
The Synchrophasor dashboard covers IEEE C37.118 synchrophasor protocol traffic used in electric grid monitoring and wide-area measurement systems (WAMS). It tracks frame types (data, header, configuration, command), PMU identifiers, data rates, and communication participants. Grid operators and security teams can use this to detect unauthorized access to phasor measurement units and anomalous configuration or command frames.
network.protocol_versiontotDataByteszeek.synchrophasor.data_frame_countzeek.synchrophasor.data_ratezeek.synchrophasor.data_stream_idzeek.synchrophasor.frame_size_totzeek.synchrophasor.frame_typezeek.synchrophasor.historyzeek.synchrophasor_cfg_detail.annamzeek.synchrophasor_cfg_detail.dgnamzeek.synchrophasor_cfg_detail.phnamzeek.synchrophasor_cfg_detail.station_namezeek.synchrophasor_data_detail.data_modifiedzeek.synchrophasor_data_detail.freq_dev_mhzzeek.synchrophasor_data_detail.rocof