Comprehensive and Detailed 150 to 250 words of Explanation From Exact Extract Google Security Operations Engineer documents:
The primary investigation tool for exploring relationships and historical activity in Google Security Operations is the UDM (Universal Data Model) search. The platform's curated views, such as the "User View," are built on top of this search capability.
To find all assets a user has interacted with, an analyst would perform a UDM search for the specific user (e.g., principal.user.userid = "suspicious_user") over the specified time range. The search results will include all UDM events associated with that user. Within these events, the analyst can examine all populated asset fields, such as principal.asset.hostname, principal.ip, target.resource.name, and target.user.userid (for interactions with service accounts).
This UDM search allows the analyst to pivot from the user entity to all related asset entities, directly answering the question of "what assets the user has interacted with." While the wording of Option A is slightly backward (it's more efficient to query for the user and find the hostnames), it is the only option that correctly identifies the UDM search as the tool used to find user-to-asset (hostname) relationships. Options B (Retrohunt), C (Raw Log Scan), and D (Ingestion Report) are incorrect tools for this investigative task.
(Reference: Google Cloud documentation, "Google SecOps UM Search overview"; "Investigate a user"; "Universal Data Model noun list")
Submit