About
Vulcan's Magic Search is designed to elevate the search and filtering experience with new and empowered capabilities. Use the new Filter capabilities to efficiently retrieve the information that matters most. Here's a glimpse of what you can expect.
Create Complex queries with groups of AND / OR combinations.
Save Searches to recall complex queries, ensuring you can quickly access valuable information whenever needed.
Apply exact and partial match Options using "Is" or "Is Not", or apply "Contains" and "Does Not Contain" criteria to zero in on the information that meets your requirements.
Search for empty or populated values by applying the "Is not empty" and "Is empty" parameters.
Perform relative comparison using "Greater Than" and "Less Than" options to isolate data points that fall within specific numeric ranges.
Availability and Support
Magic Search will be available on the following pages in the Vulcan Platform:
All Asset tabes (Hosts, Code Projects, Websites, Images, and Cloud Resources)
All Vulnerability tabs (Unique Vulnerabilities, Software Clusters, and CVE Clusters)
Query Examples
Single Queries
Single queries are your straightforward, go-to tool for refining search results. With the option to choose between "Or" or "And" conditions, single queries allow you to filter your results based on a single set of criteria.
Use the "Or" condition to broaden your search scope and retrieve results that meet any of the specified criteria
Use the "And" condition to create a narrower focus by demanding all criteria to be met. This option is ideal for quick, precise searches.
For example:
Grouped Queries (Complex Queries)
Complex or grouped queries let you navigate between multiple sets of criteria, using "And" and "Or" conditions within the same search scope.
Create query groups (AKA, several Single Queries), each with its own rules and conditions, to perform intricate searches.
Perform more nuanced searches, combining various factors to uncover specific insights.
Start by specifying your first condition.
Click the three dots next to the condition and select "Create Group." A visual group box is created. Within the box, click the "+Add Rule" button to add more rules and conditions to this specific group query.
Create your first group of conditions using either "And" or "Or". For example:
To create another group, click the "+Add Rule" outside of the first group box borders.
Create the second group of conditions. For example:
You can keep creating as many groups as you wish.
Differences between "And" and "Or" in Grouped Queries
By default, the "And" condition is automatically selected when creating a group, but you can change it to "Or" as needed. Each logic choice leads to different search results, as illustrated below:
Using the "And" Logic
When using "And" logic to combine results between different query groups, it means that each result must meet the conditions of every query group. For example, if we are searching for vulnerabilities that contain "2022" or "OpenSSL" in their name (Query Group A) and have a CVSS score greater than 9 (Query Group B), each search result must fulfill both conditions.
Using the "Or" Logic
When using the "Or" condition to combine results between different query groups, it means that each result must satisfy the conditions in either Query Group A or Query Group B (and so on). For instance, if we want to find vulnerabilities with an Exploitable threat tag and were last seen in the past 14 days (Group Query A), and also retrieve vulnerabilities with a CVSS score greater than 9 and are patchable using the "Or" condition, each result must meet at least one of these criteria.
Parameters, Operators, and Input Type
The following tables contain the supported parameters, operators, and input type per category.
Vulnerability Parameters
Parameter | Operator | Input type |
Name |
|
|
Source (Connector) |
|
|
CVE |
|
|
CWE |
|
|
CVSS |
|
|
EPSS |
|
|
Fix Type |
|
|
Patchable |
| NA |
Published Date |
|
|
Last Seen |
|
|
First Seen |
|
|
Modified on |
|
|
Threat Tag |
|
|
Vulnerability Tag |
|
|
Affected Package |
|
|
Affected Vendor |
|
|
Status |
|
|
Asset Parameters
Parameter | Operator | Input type |
Name |
|
|
Type |
|
|
Connector (Source) |
|
|
Business Group |
|
|
Asset Tag |
|
|
OS |
|
|
OS and Version |
|
|
OS End of Life |
|
|
Cloud Instance ID |
|
|
Last Seen |
|
|
First Seen |
|
|
SLA |
|
|
IP |
|
|
Port |
|
|
Scan Coverage |
| NA |
Repo Name |
|
|
Dynamic property (previously known as "Ownership Property") |
|
|
Risk Parameters
Parameter | Operator | Input type |
Score |
|
|
Level |
|
|
SPR Threshold |
| NA |
Connectors Parameters
Parameter | Operator | Input type |
Tenablesc Pluginid |
|
|
Tenablesc Pluginid |
|
|
Aqua Results |
|
|
HackerOne Assigned to |
|
|
HackerOne State |
|
|
HackerOne Affected Asset |
|
|
Prismacloud Vuln. Type |
|
|
Qualys Vuln. QID |
|
|
Qualys Vuln. Type |
|
|
AWS Account ID |
|
|