EXPLORE
← Back to Explore
crowdstrike_cql

Detect locally disabled RTR

This query identifies hosts with locally disabled RTR.

Detection Query

#event_simpleName=SensorHeartbeat
| groupBy([aid], function=selectLast([@timestamp, ComputerName, SensorStateBitMap]), limit=max)
| bitfield:extractFlags(
field=SensorStateBitMap,
 output=[
   [2, RTR_Locally_Disabled]
])
| RTR_Locally_Disabled="true"

Author

CrowdStrike

Data Sources

Endpoint

Platforms

windowslinux

Tags

Monitoringcs_module:Insight
Raw Content
# --- Query Metadata ---
# Human-readable name for the query. Will be displayed as the title.
name: Detect locally disabled RTR

# Description of what the query does and its purpose.
description: This query identifies hosts with locally disabled RTR.

# The author or team that created the query.
author: CrowdStrike

# The required log sources to run this query successfully in Next-Gen SIEM.
# This will be displayed in the UI to inform the user.
log_sources:
  - Endpoint

# The CrowdStrike modules required to run this query.
cs_required_modules:
  - Insight

# Tags for filtering and categorization.
# Include relevant techniques, tactics, or platforms.
tags:
  - Monitoring

# --- Query Content ---
# The actual CrowdStrike Query Language (CQL) code.
# Using the YAML block scalar `|` allows for multi-line strings.
cql: |
  #event_simpleName=SensorHeartbeat
  | groupBy([aid], function=selectLast([@timestamp, ComputerName, SensorStateBitMap]), limit=max)
  | bitfield:extractFlags(
  field=SensorStateBitMap,
   output=[
     [2, RTR_Locally_Disabled]
  ])
  | RTR_Locally_Disabled="true"