Actions
List Threats
Get a list of threats.
External Documentation
To learn more, visit the Abnormal documentation.
Basic Parameters
Parameter | Description |
---|---|
Attack Type | Filters threats based on the type of attack. |
Filter | A filter key must be specified and value must be of the format filter={FILTER KEY} gte YYYY-MM-DDTHH:MM:SSZ lte YYYY-MM-DDTHH:MM:SSZ .Note: At least 1 of gte/lte must be specified.For example: receivedTime gte 2020-01-01T01:01:01Z lte 2021-12-01T01:01:01Z |
Recipient | Filters threats based on the name or email address of the recipient. |
Sender | Filters threats based on the name or email address of the sender. |
Source | Filters threats based on the source of detection. |
Subject | Filters threats based on the email subject. |
Topic | Filters threats based on the topic of email contents. |
Advanced Parameters
Parameter | Description |
---|---|
Attack Strategy | Filters threats based on the attack strategy. |
Impersonated Party | Filters threats based on the impersonated party. |
Page Number | The first page to start getting results from. |
Page Size | Number of threats on each page. |
Example Output
Workflow Library Example
List Threats with Abnormal and Send Results Via Email
Preview this Workflow on desktop
Was this page helpful?