Skip to content

Filters & Search

Parapet Security provides powerful filtering and search to help you find exactly the alerts you need.

Quick Filters

Quick filters appear above the alert table:

┌─────────────────────────────────────────────────────────────────┐
│  🔍 Search alerts...                                           │
├─────────────────────────────────────────────────────────────────┤
│  Severity: [All ▼]  Category: [All ▼]  Status: [All ▼]         │
│  Date Range: [Last 7 days ▼]                                    │
├─────────────────────────────────────────────────────────────────┤
│  Showing 156 alerts                        [Clear Filters]      │
└─────────────────────────────────────────────────────────────────┘

Filter Types

Severity Filter

Filter by alert severity:

Option Shows
All All severities
Critical Critical only
High High only
Medium Medium only
Low Low only
Critical + High Both critical and high

Category Filter

Filter by threat category:

Category Description
All All categories
Malware Viruses, ransomware, trojans
Authentication Login failures, brute force
Data Exfiltration Data leaving your network
Network Network anomalies, scans
Endpoint Process, file system events
Policy Policy violations

Triage Status Filter

Filter by AI triage status:

Status Description
All All statuses
Pending Waiting for AI triage
Triaged AI analysis complete

Notification Status Filter

Filter by notification status:

Status Description
All All statuses
Below Threshold Didn't trigger notification
Sent Notification delivered
Queued Waiting to send

Date Range Filter

Filter by when alerts were received:

Option Range
Last hour Past 60 minutes
Last 24 hours Past day
Last 7 days Past week
Last 30 days Past month
Custom range Pick specific dates

The search box searches across:

  • Alert title
  • Description
  • Affected entities (hosts, users, IPs)
  • MITRE mappings
  • Raw payload content

Search Syntax

Syntax Example Matches
Plain text brute force Alerts containing "brute force"
Exact phrase "failed login" Exact phrase match
AND ssh AND root Alerts with both terms
OR ssh OR rdp Alerts with either term
NOT ssh NOT test SSH alerts excluding test

Search Examples

Query Finds
192.168.1.100 Alerts involving this IP
user:jsmith Alerts for user jsmith
host:web-server Alerts for web-server
T1110 MITRE technique T1110
powershell -enc Encoded PowerShell

Combining Filters

All filters work together with AND logic:

Example

  • Severity: High
  • Category: Authentication
  • Date Range: Last 7 days
  • Search: root

Shows high-severity authentication alerts from the last week mentioning "root".

Saving Filter Presets

Save frequently used filter combinations:

  1. Set your filters
  2. Click Save Preset
  3. Give it a name (e.g., "Critical malware this week")
  4. Access from the Presets dropdown

Preset Examples

Preset Name Filters
Critical Now Critical + Last hour
High Auth High + Authentication
Review Pending Triaged + Unreviewed
False Positives Dismissed alerts

Exporting Filtered Results

Export your filtered alerts:

  1. Apply your filters
  2. Click Export
  3. Choose format:
  4. CSV - For spreadsheets
  5. JSON - For programmatic use
  6. Choose scope:
  7. Current page - Just visible alerts
  8. All matching - All filtered results

Filter URLs

Filters are reflected in the URL, making them shareable:

https://app.parapetsecurity.com/alerts?severity=high&category=authentication

Share this URL with teammates to show them the same filtered view.

Tips for Effective Filtering

Finding Specific Incidents

  1. Start with a broad date range
  2. Add severity filter for urgency
  3. Use search for specific indicators

Daily Review Workflow

  1. Filter: Last 24 hours + High/Critical
  2. Review and act on matches
  3. Filter: Medium + Unreviewed
  4. Triage the backlog

Incident Investigation

  1. Search for the IP/host/user involved
  2. Expand date range to see history
  3. Check related alerts
  4. Export timeline for documentation

Reducing Noise

  1. Identify frequently dismissed alerts
  2. Note the patterns (source, rule, etc.)
  3. Adjust SIEM rules or notification thresholds

Keyboard Shortcuts

Shortcut Action
/ Focus search box
Esc Clear search
c Clear all filters
s Open severity filter
d Open date range filter

Next Steps