Top Files Transferred

Prev Next

Top Files Transferred Widget

The Top Files Transferred widget displays a table of the largest or most notable files transferred across your network, including file hashes, names, sizes, and malware detection alerts. This is a key data loss prevention (DLP) widget — use it to monitor for large file exfiltration, identify files flagged by malware engines, and track file transfer patterns.

Configuration

Click + Add Widget, select Top Files Transferred, and click Next.

Field

Required

Description

Default

Widget Name

Yes

A title (e.g., 'Top Files Transferred').

—

Time Range

No

Period to display.

Use Global

Query

No

A DataBee search query to filter file transfer records.

Empty

Sort Column

No

Which column determines the 'top' files.

file_size

Sort Order

No

Ascending or Descending.

Descending

Sort Options

The Sort Column controls how the top 10 files are selected:

Sort Column

What It Prioritizes

Use When

file_size

Largest files first.

Looking for potential data exfiltration — large file transfers are a common indicator.

file_name

Alphabetical by file name.

Searching for specific file types or naming patterns.

file_hash

By file hash.

Grouping files with identical content (same hash = same file).

malware_alerts

Files with the most malware detections.

Prioritizing the most dangerous files — those flagged by multiple detection engines.

Tip: Set Sort Column to malware_alerts with Descending order to immediately surface the most dangerous files. Files detected by multiple malware engines appear at the top.

Understanding the Table

Column

Description

File Hash

The SHA-256 hash (truncated to 11 characters). Hover to see the full hash. Click to search for all transfers of this file.

Name

The file name and extension (e.g., medical.flac, director.html). Shows '-' if the file name is unknown.

Size

Human-readable file size (e.g., 973.94 kB). Hover to see the exact byte count.

Malware Alerts

Names of malware engines that flagged this file, shown in bold red text (e.g., 'Hector Machine Learning Engine'). Multiple alerts are comma-separated. Shows '-' if no alerts were triggered.

Query Syntax

The Query field accepts DataBee's search query syntax to filter which records are included. If left blank, all records in the selected table within the time range are included.

Basic Syntax

Queries follow the format: field_name operator value

Supported Operators

Operator

Description

Example

in

Field value matches the specified value(s). Use parentheses for multiple values.

severity_id in (4,5,6)

notin

Field value does NOT match the specified value(s).

status_id notin (0,99)

contains

Field value contains the specified substring.

message contains ransomware

between

Field value falls between two values (inclusive). Separate with comma.

traffic.bytes between 1000,50000

Combining Conditions

Use "and" to combine multiple conditions. For example: severity_id in (4,5) and metadata.product.name in CrowdStrike

Nested Field Paths

Access nested fields using dot notation. Common paths include:

Path

Description

metadata.product.name

The security product that generated the event (e.g., CrowdStrike, Qualys)

src_endpoint.ip

Source IP address

dst_endpoint.ip

Destination IP address

device.name

Device hostname

user.name

Username

finding.severity

Finding severity level

Note: The widget's Time Range setting automatically filters by time — you do not need to include time filters in the Query field.

Query Examples for Top Files Transferred

Scenario

Query

Only files with malware alerts

malwares contains alert

Files from CrowdStrike detections

metadata.product.name in CrowdStrike

Only executable files

file.name contains .exe

Large files only (>1MB)

file.size between 1000000,999999999

Files from a specific device

device.name in workstation-42

Interactive Features

  • Click any file hash to pivot to Search, showing the complete transfer history for that file — including source/destination endpoints, timestamps, and associated network activity.
  • Hover over truncated hashes to see the full SHA-256 value.
  • Hover over file sizes to see the exact byte count.
Copyright © 2026 DataBee®, A Comcast Company.
DataBee® is a registered trademark of Comcast.