Hunt Page

Overview

The Hunt page answers the question "what happened, who did it, and where else did it show up?" Operators reach the page from the left navigation rail (Hunting) and from the Dashboard Recent Alerts row action, which mounts the Hunt drill-down sidebar in place.

The page is organized around three concepts:

  • Event buckets — the top-level groupings into which every event falls. MetaDefender NDR exposes five: All Events, All Alerts, Network Sessions, Netflows, and Files.
  • Tabs — a persistent workspace of open investigation views. Each tab is a saved query against a specific bucket and detection type with its own time range, filters, and selection state.
  • Detail sidebar — the collapsible pane that opens when an operator selects a row, rendering a full type-specific view of the event with its enrichments and correlations.

A single Hunt session typically carries several tabs open at once: an All Alerts tab for broad triage, a Sessions → DNS tab for a suspected beaconing investigation, a Files tab for recent extractions, and one or more drill-down tabs opened from right-click pivots. Tabs persist across sessions; closing the browser and returning leaves the workspace intact.

Tabs and Tab Lifecycle

Tabs are the organizing unit of the Hunt page. Each tab is a self-contained investigation context: its own query, time window, sort, pagination, and selected row.

Creating a tab

Operators create a tab by picking an entry from the Hunt page menu. The menu is structured by bucket: selecting Alerts → All Alerts opens a new All Alerts tab; selecting Sessions → DNS opens a new DNS session tab. The new tab opens next to the active tab and becomes the focused workspace.

Tabs are also created implicitly by several drill-down actions:

  • Clicking the Recent Alerts row action on the Dashboard opens the matching Hunt tab and mounts the sidebar on that row.
  • A right-click pivot from a row value (see Right-Click Context Menus on Values, below) opens a new tab pre-filtered to the pivoted value.
  • A cross-tab pivot from the sidebar (see Pivoting Between Tabs, below) opens the matching flow, session, or file tab in a new position.

Closing, reordering, and re-opening tabs

Tabs expose a close control on their header. Closing the last tab returns the operator to an empty Hunt surface with the menu ready for a fresh selection. Tabs can be reordered by drag; the order is saved with the workspace.

A closed tab is not recoverable as a tab — closing is destructive — but the same menu entry that originally created it always produces an equivalent blank tab against the same detection type.

Persistence across sessions

The full tab workspace persists per user. That includes, for each tab: its bucket and detection type, the applied time range, quick-search text, column width and order customizations, pagination, and the currently selected row (if any). Returning to the Hunt page after signing out and back in restores the workspace.

User-level persistence is scoped by event bucket so that column preferences carried across, say, DNS session tabs do not interfere with column preferences on Network Session tabs.

Tab Types

Every tab is rooted in one of five event buckets. Selecting a bucket with no sub-type opens a unified view; selecting a sub-type opens a tab with the column projection and sidebar renderer specific to that type.

All Events

The widest view. All Events returns every event regardless of type — alerts, sessions, flows, and files — with the minimum common column set (timestamp, protocol, source and destination endpoints). Operators use it as a triage starting point when they do not yet know what kind of event triggered the behavior they are hunting.

All Alerts (Alert Pipeline)

All Alerts returns every record that reached the alerting pipeline: Suricata signature alerts, C2 and Threat Intelligence (InSights) alerts, MetaDefender Core alerts, behavioral detections, and ML anomaly alerts. The common column set is timestamp, protocol, source and destination endpoints, alert type, and severity.

Per-type sub-tabs narrow All Alerts to a single detection family:

Every alert sub-tab exposes severity (Critical, High, Medium, Low) as a first-class column and supports the same right-click pivots described below.

Sub-tabWhat it Contains
SignatureAlertClassic intrusion-detection signature hits from Suricata with signature message, identifier (SID), category, MITRE technique and tactic, and payload.
C2 Infrastructure AlertMatches against command-and-control (C2) IP and domain threat intelligence, with match type, matched value, score, confidence, and source feed.
InSights AlertMatches against OPSWAT InSights Threat Intelligence Database (TIDB) and Reputation Database (REPDB), with the matched entity and source tagging.
MDCore AlertMetaDefender Core file-scan verdicts: scan result, threat name, detection engine coverage, and file metadata.
Behavioral detections (one sub-tab per type)Beaconing, Data Exfiltration, Long Duration, DNS Tunneling, DGA, Fast Flux, Port Scan, Connection Spray, and the Composite / Unified aggregates. See [Behavioral detections_](_Behavioral detections) for the full catalog.
ML Random Cut Forest AnomalyAnomaly detections from the RCF model, carrying the anomaly score, the threshold the score crossed, the model version, and the underlying event that scored.

Network Sessions

Network Sessions returns per-protocol session records — one row per protocol transaction — in a unified table. Per-protocol sub-tabs apply a projection specific to each protocol parser:

Sub-tabProtocol-specific fields
DNSQuery name, record type, response code, TTL, answer data.
HTTPHostname, URL, method, status, user agent, referer, content-type, response length
TLSVersion, SNI, certificate subject and issuer, validity window, JA3 / JA3S / JA4 fingerprints, cipher, session resumption flag.
QUICVersion, SNI, JA3 / JA4 fingerprints, client / server Application-Layer Protocol Negotiation (ALPN).
SSHProtocol version, client and server software, HASSH client and server fingerprints, key-exchange and cipher algorithms.
SMBCommand, filename, share, access flags, status.
RDPClient name, client build, cookie, keyboard layout, X.509 certificate subject and issuer.
SMTPMail-from, recipients, HELO, attachment filenames, reply codes.
FTPCommand, command data, reply code.
FileInfoFilename, magic string, SHA-256, Message Digest 5 (MD5), size, state, stored flag. See Files below.

Every session row carries the standard 5-tuple (source IP and port, destination IP and port, protocol) and a community_id correlator that joins all events belonging to the same connection. When the sensor and enrichment pipeline have attached intelligence to an entity on the row — for example, a TIDB match on the DNS query name — the relevant enrichment ribbon appears inline and the full enrichment payload is available in the sidebar.

Operational Technology (OT) protocol event types (Modbus, DNP3, Ethernet/Internet Protocol (ENIP) / Common Industrial Protocol (CIP), S7comm, Building Automation and Control Networks (BACnet), IEC 60870-5-104 (IEC104)) are on the roadmap and will appear as additional Network Sessions sub-tabs when they ship.

Netflows

Netflows returns NetFlow and connection-summary records — one row per flow, emitted after flow timeout or protocol-parser close. Columns include packets and bytes per direction (to-server and to-client), flow start, end, and age, flow state, termination reason, alerted flag, transaction count, and exception policy.

Netflows is the primary surface for packet-and-byte-volume investigations: which internal host uploaded 2 gigabytes to which external IP over what window, which long-duration connections remain open, and which connections were terminated abnormally.

Files

Files returns FileInfo events — one row per file the sensor extracted from observed traffic. Columns include filename, magic string, SHA-256, MD5, file size, state (CLOSED when the file is eligible for MetaDefender Core enrichment), and stored flag.

When MetaDefender Core enrichment is enabled and the file has been scanned, the row also carries the scan result and threat name. A right-click pivot on the SHA-256 column opens an All Events tab showing every event that referenced the same file hash (HTTP download, SMB write, SMTP attachment) so the analyst can trace the file's path across the network.

Search and Filtering

The top bar of every Hunt tab exposes three controls that govern what the table returns: quick search, the time selector, and the advanced-search query builder.

Quick search is a single text box in the top bar that applies a free-text search across the event's key indexed fields. Operators use it for fast entity lookups — a suspected malicious domain, a specific IP, a SHA-256 hash, a signature name — without opening the advanced builder.

The set of fields covered by quick search is intentionally narrow so the query stays fast on high-volume deployments; operators who need to match against a field outside that set use the advanced search builder instead.

Time selection

Time selection is a dual-mode control that combines a relative picker (for example, Last 15 minutes, Last 1 hour, Last 24 hours, Last 7 days) with a calendar range picker (for example, June 12 09:00June 12 17:00). Operators toggle between the two modes without losing the in-progress selection.

The selected time range applies to every query the tab issues and is persisted per tab. Very wide ranges (Last 7 days, Last 30 days, custom multi-week ranges) increase query latency; operators narrow the range when they need responsive iteration and widen it only to confirm long-tail behavior.

Advanced search is a visual query builder accessed from the top bar. It supports the full Boolean grammar — AND, OR, NOT — combined with field-specific filters that project the correct operator for each field type (equality for categorical fields, prefix for hostnames, range for numeric fields, set membership for enumerations). Expressions can be nested to build arbitrarily complex conditions.

The advanced-search payload is held with the tab; switching tabs does not clear the builder state, and returning to the tab later restores the last-applied expression. Saved named searches are not part of MVP — operators recreate complex queries by re-opening them from the tab workspace.

Faceting and column filtering

Column filtering on the results table (per-column filter inputs rendered in the table header) is on the roadmap. On MVP, operators narrow results by composing the query in advanced search or by pivoting from a row value in the existing result set.

Real-time mode

Every tab has a real-time mode that continuously refreshes the result set as new events land in storage. In real-time mode the table repolls at a short cadence and new rows appear at the top; end-to-end latency from sensor observation to the Hunt table is under ten seconds under normal conditions.

Operators switch a tab between real-time and historical mode from a toggle in the top bar. Historical mode runs a single query against the selected time range and holds the result set stable for investigation. True push-based streaming with configurable auto-scroll is tracked on the roadmap; MVP real-time mode is poll-based continuous refresh.

Sort and Pagination

Every column in the results table is sortable. Clicking a column header toggles ascending, descending, and cleared states; the active sort is indicated by an arrow glyph on the header.

Pagination is controlled from the table footer. Operators choose the rows-per-page count from a fixed set:

  • 10
  • 25
  • 50
  • 100
  • 250
  • 500

Page navigation (first, previous, next, last, and direct page entry) is on the same footer. Sort and pagination state persist with the tab.

Column widths can be resized by dragging the header divider, and columns can be reordered by dragging the header. Both are saved per user and per event bucket, so column preferences applied to, for example, the DNS sub-tab carry across other DNS sub-tabs.

Show / hide column controls (choosing which of the available fields render as columns) are tracked on the roadmap. On MVP, the column set is the bucket- and sub-type-specific projection documented in Tab Types above.

Working with Results

A row is the atomic unit the operator acts on.

  • Select a row. Clicking a row opens the detail sidebar on the right (see The Detail Sidebar, below). A single row is selected at a time.
  • Copy a value. Right-clicking a cell exposes Copy in the context menu (see Right-Click Context Menus on Values, below).
  • Pivot from a value. Right-clicking a cell also exposes the pivot actions — Hunt all events from this IP, Show related events, Show related files, Search file hash across all events, Show all events with this community id — each of which opens a new tab pre-filtered to the selected value.
  • Export the result set. The tab exports to Comma-Separated Values (CSV) or JavaScript Object Notation (JSON) from the tab action menu. Export respects the active search, filters, time range, and sort; the row cap on export matches the platform limit documented in (Link Removed)

Multi-row selection and bulk actions — assigning rows to an analyst, tagging rows, dispositioning rows — are not part of MVP. Operators who need to route events to downstream systems use the Security Information and Event Management (SIEM) and syslog integrations described under (Link Removed)

The Detail Sidebar

The detail sidebar is the collapsible pane that opens on the right side of the page when an operator selects a row. It renders the full event with every available field laid out in sections specific to the event type, plus any enrichments attached by the pipeline.

The sidebar header exposes next / previous controls that step through the currently-visible result page without closing the sidebar. Operators use the controls to walk a page of alerts end-to-end without returning to the table between rows. Stepping past the end of the current page advances to the first row of the next page; stepping backward past the first row returns to the last row of the previous page.

Type-specific renderers

The sidebar dispatches a different renderer based on which event blocks are present on the record. One record can fire several renderers at once — for example, a DNS session row that matched a TIDB entry renders the DNS section alongside the InSights Enrichment section, and a FileInfo row with a MetaDefender Core hit renders the FileInfo section alongside the MDCore Enrichment section.

The renderers shipped on MVP:

Event TypeSidebar SectionWhat it shows
Signature AlertSuricata Alert + PayloadSignature message, SID, revision, category, severity, action, MITRE technique and tactic, affected product, attack target, malware family, author, confidence, rule metadata, plus the base64 and printable payload.
DNS EventSuricata DNSQuery name, record type, response code, answer data, TTL, query-or-answer flag.
HTTP EventSuricata HTTPHostname, URL, method, status, response length, user agent, referer, content-type, request and response headers.
TLS EventSuricata TLSVersion, SNI, subject, issuer, serial, fingerprint, JA3 / JA3S / JA4 fingerprints, cipher, validity window, session-resumed flag.
SSH EventSSH detail (generic ontology-driven block)Protocol version, client and server software, HASSH fingerprints, key exchange and cipher algorithms.
SMB EventSMB detail (generic ontology-driven block)Command, share, filename, access flags, status.
RDP EventRDP detail (generic ontology-driven block)Client name, client build, cookie, version, certificate subject and issuer.
SMTP EventSMTP detail (generic ontology-driven block)Mail-from, recipients, HELO, attachment filenames, reply codes.
QUIC EventSuricata QUICVersion, SNI, JA3 / JA4 fingerprints, ALPN.
FTP EventFTP detail (generic ontology-driven block)Command, command data, reply code.
FileInfo EventSuricata FileInfoFilename, magic string, SHA-256, MD5, file size, state, stored flag.
Flow EventSuricata FlowPackets to-server and to-client, bytes to-server and to-client, start, end, age, state, termination reason, alerted flag, transaction count, exception policy.
MD Core Enrichment SectionMD CoreScan result, threat name, positive engines over total engines, scan details per antivirus engine, cache-hit flag, file metadata (SHA-256, MD5, size, type).
C2 Enrichment SectionC2 InfrastructureMatch type, matched value, confidence, score, source feed — one block per C2-matched entity on the row.
InSights Enrichment SectionInSightsMalicious flag, source tagging, matched entity — one block per InSights-matched entity on the row.
Behavioral Alert SectionsOne section per detection nested key (Beaconing, Data Exfiltration, Long Duration, DNS Tunneling, DGA, Fast Flux, Port Scan, Connection Spray, and the composite aggregates)Detection-specific metadata: connection counts, byte ratios, upload / download totals, window bounds, destination country / Autonomous System Number (ASN) / organization, malicious Indicators of Compromise (IOC) lists.

Clicking the sidebar close control returns the full table width; re-opening a row in the same tab re-mounts the sidebar on the new row.

Right-Click Context Menus on Values

Every cell value in the results table and every field value in the sidebar exposes a right-click context menu. The menu carries two classes of action: copy and pivot.

Right-click pivots always open a new tab; the originating tab is preserved so the operator can walk back after following a lead.

ActionScopeWhat happens
Copy to clipboardAny cell or sidebar field valueThe selected value is placed on the system clipboard.
Hunt all events from this IPAny IP-valued cell (source or destination)A new tab opens on All Events filtered to rows where the IP appears in either the source or destination 5-tuple position. The selected time range carries over from the originating tab.
Show related filesAny row with a flow or session contextA new tab opens on the Files bucket filtered to files observed on the same flow — useful for seeing what file was transferred across a suspicious connection.
Show related eventsAny rowA new tab opens on All Events filtered to events that share the row's community_id — that is, every event belonging to the same connection.
Search file hash across all eventsAny file hash cell (SHA-256 or MD5)A new tab opens on All Events filtered to events that reference the hash, including the upstream HTTP download, the SMB write, and the downstream MDCore scan.
Show all events with this community idAny row with a community_idA new tab opens on All Events filtered to that community_id — the connection-level view of every protocol transaction and enrichment on the same 5-tuple session.

Pivoting Between Tabs

Pivoting is the core investigative motion on the Hunt page: following an indicator from one view into another with the filter set carried over.

Three pivots happen commonly:

  • Alert → flow. An operator studying an All Alerts row right-clicks the community_id and selects Show all events with this community id. A new All Events tab opens with every protocol transaction, every flow record, every file extraction, and every enrichment attached to that connection.
  • Flow → session. An operator studying a long-duration flow on Netflows right-clicks the community_id and selects Show related events. The resulting tab exposes the DNS resolution, TLS handshake, and HTTP requests that happened on that flow.
  • Session → file. An operator studying an HTTP session right-clicks the row and selects Show related files. The resulting Files tab lists every file extracted from the same flow, with MetaDefender Core scan results where available.

The same pivots run from the sidebar. Right-clicking a value inside the sidebar — an IP in the flow section, a hash in the fileinfo section, a community_id header — exposes the same pivot menu as the table row, so analysts investigating from the sidebar do not have to return to the table to follow the indicator.

Roadmap additions (see Roadmap, below) include a dedicated correlation view that surfaces related events without requiring an explicit pivot, and a file-to-endpoint tracing view that visualizes the source → file hash → destination endpoints relationship directly.

Saving Hunt Context

MetaDefender NDR preserves Hunt context through the tab persistence model rather than through a dedicated saved-query UI.

What persists

Every tab is saved to the user's workspace. For each tab the platform persists:

  • The bucket and detection type (which menu entry created it).
  • The selected time range.
  • The active quick-search text and advanced-search expression.
  • Column width and order customizations (scoped per event bucket).
  • Sort state and rows-per-page selection.
  • The page position.

Signing out and back in — from the same browser or a different one — restores every open tab to the last-saved state.

What does not persist

Row selection and sidebar-open state are transient and reset at sign-in. Operators who need to return to a specific row bookmark it by leaving the tab open, rather than by saving the row directly.

Sharing a Hunt context

A named save / load / share workflow for complex queries — so an analyst can hand a query to a peer, an incident responder can capture the filter that scoped an investigation, or a runbook can reference a specific Hunt view by name — is on the roadmap. On MVP, analysts reproduce a peer's context by applying the same menu selection, time range, and advanced-search expression manually, and they reference Hunt views from incident documentation by describing the applied filters rather than by a stable identifier.

See Also

  • Dashboard— the overview surface that feeds Hunt via the Recent Alerts row action.
  • Detection Overview — the catalog of detection families whose alerts land in All Alerts and its per-type sub-tabs.
  • Critical Alert Triage— the runbook that uses the Hunt page end-to-end for first-response triage.
  • Alert, Flow, and PCAP Pivoting — extended coverage of the pivot patterns introduced in this chapter.
  • (Link Removed) — the severity label definitions used in the alert columns.
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard