Skip to content

Search Library

The Search Library provides a comprehensive collection of pre-built queries and reports designed to help security teams quickly access critical identity data without building custom searches. Each query is optimized for specific use cases spanning security investigations, compliance reporting, operational management, and risk analysis.

Overview

The Search Library dashboard organizes queries into functional categories, making it easy to find relevant reports for your specific needs. All queries are production-ready and leverage the same powerful filtering, sorting, and export capabilities as Global Search.

Key Benefits:

  • Instant Access: No query building required—click and view results immediately
  • Best Practice Queries: Professionally designed queries based on identity security best practices
  • Customizable Views: All reports support filtering, column customization, and sorting
  • Export Ready: Export any report to CSV for offline analysis, compliance evidence, or integration with other tools
  • Framework Aligned: Queries mapped to security frameworks (CIS, NIST, CRI) for compliance reporting

Access Methods:

  1. Search Library Page: Navigate directly to the Search Library dashboard
  2. Global Search: Select the Library tab in Global Search to access all queries
  3. Dashboard Widgets: Click through from dashboard widgets to open filtered reports

How to Use Search Library

Accessing Reports

  1. Navigate to Search Library: Click Search Library in the main navigation
  2. Select Category Tile: Browse tiles organized by functional area
  3. Click Query Name: Click any query in the tile to open the report
  4. View Results: Report opens with pre-configured columns and default sorting

Customizing Reports

Once a report is open:

  • Apply Filters: Use column filters to narrow results
  • Adjust Columns: Show/hide columns via the Columns panel
  • Sort Data: Click column headers to sort ascending or descending
  • Export Results: Click Export CSV to download current view
  • Save Modified Query: Save your customized view as a new saved search

Export Options

The Export CSV button allows all reports to be exported for further analysis:

  • Exports respect current filters and column selections
  • Standard CSV format compatible with Excel, Google Sheets, and analytics tools
  • Large datasets are paginated automatically (typically 1000 records per batch)

Query Categories and Reports

The Search Library organizes queries into nine functional categories, each addressing specific identity security and compliance requirements.

NOTE

If you are using a macOS system to access the Hydden UI, the scroll bar on tiles with more than 5 reports might only become visible when moving the mouse to the outer right side of the tile.

NOTE

Depending on the amount of data collected for your organization, accessing a report via query might show a loading indicator. Large datasets are paginated for optimal performance.

Owners & Accounts

Queries for investigating individual identities and accounts across all connected systems.

QueryDescriptionUse Cases
General Account QueryComprehensive report on all account dataFull account inventory, bulk data analysis, baseline reporting
Accounts Created by DateAccount data filtered by creation date rangeNew account audits, onboarding tracking, temporal analysis
OwnersOwner properties with full details from all collection sourcesIdentity consolidation, account-to-owner mapping review, contact information
Insights and RecommendationsThreat score correlations with security framework recommendationsCompliance gap analysis, risk prioritization, framework alignment

Insights and Recommendations queries align with major cybersecurity frameworks:

  • CIS v8: CIS Controls version 8 recommendations
  • CRI v2 Tier4: Cyber Resilience Institute framework
  • NIST CSF v2.0: NIST Cybersecurity Framework version 2.0

These reports are also visualized on the Insights and Recommendations page, accessible via click-through from the main Threat Score widget on the Identity Posture Dashboard.

Groups

Queries for analyzing security groups, distribution lists, and nested group structures.

QueryDescriptionUse Cases
General Group QueryReport on all groups across all platformsGroup inventory, platform comparison, membership analysis
Expanded Group MembershipReport on expanded (nested) group membershipsPrivilege escalation paths, indirect access analysis, nested group audits
Direct Group MembershipReport on direct group members onlyFirst-level membership review, direct assignment verification

Understanding Group Membership Types:

  • Direct Members: Accounts explicitly added to a group
  • Expanded Members: Accounts that inherit membership through nested groups (groups within groups)
  • Example: If Group A contains Group B, and Group B contains User1, then User1 is a direct member of Group B but an expanded member of Group A

Detections

Security-focused queries for identifying risks, anomalies, and compromised accounts.

QueryDescriptionUse Cases
Account Z-ScoreStatistical anomaly detection for account behaviorOutlier identification, behavioral analysis, anomaly investigation
Account Threat ScoresAccount-specific threat scores from all detection rulesIndividual account risk assessment, remediation prioritization
Owner Threat ScoresIdentity-level aggregated threat scores (highest first)Executive reporting, high-risk identity identification, SOC investigations
Threat ScoresComprehensive threat scores for all accountsOrganization-wide risk posture, trend analysis, compliance reporting
Compromised AccountsAccounts flagged as compromised with password detailsIncident response, breach investigation, credential hygiene

Threat Score Methodology:

  • Scores aggregate multiple threat detection rules weighted by severity
  • Higher scores indicate greater security risk
  • Scores update automatically as new data is collected
  • Custom threat rules contribute to overall scores

Passwords, Secrets & Certificates

Queries for credential hygiene, secret management, and authentication method analysis.

QueryDescriptionUse Cases
Account Secrets & CertificatesAccount credentials including secrets and certificate dataCredential inventory, certificate expiration tracking, secret management review
Password/Secret AgePassword or secret age with oldest listed firstPassword rotation audits, policy compliance, stale credential identification
Password/Secret Never SetAccounts with no password set since creationConfiguration issues, incomplete provisioning, security gap identification
Account SSH Key - Authorized Public KeysPublic SSH key details for discovered accountsSSH access audits, key inventory, authorized key management
Account SSH Key - Private KeysPrivate SSH key details for discovered accountsPrivate key discovery, security risk assessment, key rotation planning
Account MFAMulti-factor authentication details (type, provider, device)MFA coverage analysis, compliance verification, authentication method inventory

Credential Hygiene:

  • Enforce password rotation policies
  • Identify accounts with aging credentials
  • Detect configuration or provisioning issues
  • Support compliance requirements for credential management
  • Track certificate expiration dates for renewal planning

Vault Integrations

Queries for analyzing vaulted credentials, secrets, and PAM integration status.

QueryDescriptionUse Cases
Account Vault ObjectsKey vault data from integrated vault systemsVaulted credential inventory, vault coverage analysis, secret management review
Secrets by AccountVault secrets associated with individual accountsAccount-level secret management, credential hygiene
Secrets by GroupVault secrets associated with groupsGroup-level secret access, shared credential review
Secrets by Group (Expanded)Vault secrets with nested group membershipIndirect secret access, expanded privilege analysis
Vaulted Account ManagementDiscovered and/or vaulted/managed accountsPAM coverage analysis, vault onboarding workflow

Vaulted Account Management details:

The most important columns for this report are:

  • PAM Status, which reflects either:

    • N/A
    • CyberArk Discovered, specific to the CyberArk integration discovery workflow.
    • Not Vaulted
    • Vaulted, through an integrated password/secrets vaults.
    • Password Managed, through an IGA solution.
  • Vault/Safe, which list the name of the Vault or Safe as specified in the vault integration configuration.

  • Actions, which can be used to add accounts to discovery or to vaults/safes, if available. Mouse over hover provides help text to indicate available options:

    • Add To CyberArk Discovery
    • Cannot Add To CyberArk Discovery
    • Add To Vault
    • Cannot Add To Vault

    NOTE

    Accounts that are already vaulted, will indicate "Cannot Add To Vault". Accounts that are already known to the CyberArk Discovery workflow, will indicate "Cannot Add To CyberArk Discovery".

Refer to the CyberArk Integration - Onboarding Discovered Accounts to CyberArk for an example.

User Activity

Queries for tracking authentication events, login patterns, and account activity.

QueryDescriptionUse Cases
Authentication by DateAuthentication events filtered by date rangeLogin pattern analysis, access audits, authentication timeline investigation
Stale AccountsAccounts with no recent login activityDormant account identification, cleanup initiatives, license optimization
Login AuditComprehensive report on all login eventsSecurity investigations, compliance audits, access pattern analysis

Activity Analysis:

  • Track when accounts last authenticated
  • Identify dormant accounts for deprovisioning
  • Investigate suspicious login patterns
  • Support compliance requirements for access logging

Resources & Entitlements

Queries for analyzing systems, applications, and fine-grained permissions.

QueryDescriptionUse Cases
General Resource QueryAll discovered resources (systems, applications, databases)Resource inventory, platform coverage analysis, asset management
Groups Extended Attributes ExportExtended group attributes and custom propertiesDetailed group analysis, attribute validation, integration with external tools
Users Extended Attributes ExportExtended user/account attributes and custom propertiesDetailed account analysis, custom attribute reporting, data enrichment
Resource Entitlements(Work in progress - not currently active)Future: Fine-grained permission analysis

Classification & Certification

Queries for reviewing account classification, certification status, and compliance mapping.

QueryDescriptionUse Cases
Account ClassificationAccount data based on Classification RulesService account identification, account type audits, classification rule validation
SailPoint CertificationSailPoint IIQ certification data (if integrated)IGA integration verification, certification status tracking

Privileges

Queries for analyzing elevated permissions and privileged access across the organization.

QueryDescriptionUse Cases
Privileged Group QueryAll groups with elevated permissionsPrivileged access inventory, least privilege reviews, administrative group audits
Privileged Role QueryRole-based permissions and assignmentsCloud role audits, permission set reviews, elevated access tracking
Permissions and Roles(Work in progress - not currently active)Future: Comprehensive permission analysis

Privilege Management:

  • Identify all accounts with elevated permissions
  • Review administrative group memberships
  • Track cloud IAM roles and permission sets
  • Support least privilege principle enforcement

Query Architecture

Built-In Query System

The Search Library leverages Hydden's query engine with pre-configured:

  • Column Definitions: Optimized column sets for each report type
  • Filter Models: Default filters appropriate to the query purpose
  • Sort Orders: Logical sorting (e.g., highest threat first, oldest password first)
  • Report IDs: Unique identifiers for each query enabling API access

Query Execution Flow

  1. User Selection: User clicks a query name in the Search Library
  2. Query Retrieval: System loads pre-defined query configuration
  3. Server-Side Execution: Query executes against entity store with pagination
  4. Result Rendering: Results display with configured columns and sorting
  5. Interactive Refinement: User applies additional filters, exports, or saves custom view

Performance Optimization

  • Pagination: Results load in batches (typically 1000 records) for fast initial response
  • Server-Side Processing: All filtering and sorting happens on the server
  • Indexed Attributes: Common query fields are indexed for rapid retrieval
  • Caching: Frequently accessed queries may be cached for improved performance

Common Workflows

Security Investigation

  1. Start with Owner Threat Scores to identify high-risk identities
  2. Drill into Account Threat Scores for specific accounts
  3. Use Compromised Accounts to find potential breaches
  4. Review Login Audit for suspicious authentication patterns
  5. Export findings to CSV for incident documentation

Compliance Reporting

  1. Run Insights and Recommendations for framework-specific gaps
  2. Use Privileged Group Query for elevated access inventory
  3. Check Account MFA for multi-factor authentication coverage
  4. Review Password/Secret Age for policy compliance
  5. Export all reports as compliance evidence

Operational Management

  1. Run Stale Accounts to identify dormant accounts for cleanup
  2. Use General Account Query for full account inventory
  3. Check Password/Secret Never Set for provisioning issues
  4. Review Vaulted Account Management for vault coverage
  5. Export for ticketing system integration or cleanup initiatives

Vault Integration Analysis

  1. Start with Vaulted Account Management for overall status
  2. Review Secrets by Account for account-level vault data
  3. Check Secrets by Group for group-based vault coverage
  4. Identify gaps using PAM Status filters (Not Vaulted, N/A)
  5. Use Add To Vault actions for discovered accounts

Best Practices

Query Selection

  • Start Broad: Begin with general queries (General Account Query, Owners)
  • Refine with Filters: Use column filters to narrow results
  • Use Specialized Queries: Switch to targeted queries (Compromised Accounts, Stale Accounts) for specific investigations

Export Strategy

  • Filter First: Apply filters before exporting to reduce file size
  • Select Relevant Columns: Hide unnecessary columns for cleaner exports
  • Schedule Large Exports: For very large datasets, consider off-peak hours
  • Automate with API: Use API endpoints for recurring export needs

Performance Tips

  • Paginate Large Results: Don't attempt to scroll through thousands of rows
  • Limit Time Ranges: For date-based queries, use specific date ranges
  • Bookmark Favorites: Save frequently-used queries as saved searches
  • Use Dashboards: Access queries via dashboard widgets for common workflows

Troubleshooting

IssueSolution
Query taking too longCheck dataset size; consider using filters to reduce scope
No results returnedVerify data collections have run; check date range filters
Export failsReduce result set with filters; verify export size limits
Missing query in libraryCheck product version; some queries may be version-specific
Incorrect data displayedRefresh browser cache; verify data collection status

Hydden Documentation and Training Hub