LogoLogo
  • AttackForge Support
  • Release Notes
    • 2025
    • 2024
    • 2023
    • 2022
    • 2021
    • 2020
    • 2019
  • Core & Enterprise
    • Getting Started
      • How It Works
      • Requesting A Project
      • Creating & Updating Projects
      • Invite User To Project
      • View Project Team
      • Project Scope
      • Project Workspace
      • Project Notes
      • Project Pages
      • Test Cases
      • Creating Vulnerabilities
      • Updating Vulnerabilities
      • Review & QA
      • Attack Chains
      • Reporting
      • Retesting & Remediation
      • Notifications
      • Custom Fields & Forms
      • Advanced Filtering
      • Vulnerability SLAs
      • User Settings
      • Login Redirects
    • Modules
      • Dashboard
      • Analytics
      • Vulnerabilities
      • Projects
      • Scheduling
      • Portfolios
      • Groups
      • Attack Chains
      • Assets
      • Writeups
      • Test Suites
      • Report Templates
        • Overview
        • Tutorial
        • Tips & Tricks
        • Troubleshooting
        • Template - Report Templates
        • Template - Tags
        • Template - Options
        • Template - Functions
        • Template - Filters
        • Template - Styles
        • Template - Tables
        • Template - Charts
        • Template - Conditions
        • ReportGen CLI
        • ReportGen Library
      • Users
      • Administration
      • Flows
      • Self-Service RESTful API
        • GETTING STARTED
        • EXPORTING TO CSV
        • ADVANCED QUERY FILTER
        • ActivateUser
        • AddProjectMembershipAdministrators
        • AddTestcaseToTestsuite
        • AddTestcasesToTestsuite
        • AddUserToGroup
        • ApproveProjectRequestById
        • ArchivePortfolio
        • ArchiveProject
        • CancelProjectRetestRound
        • CloneProject
        • CompleteProjectRetestRound
        • CreateAssetInLibrary
        • CreateGroup
        • CreatePortfolio
        • CreateProject
        • CreateProjectNote
        • CreateProjectRequest
        • CreateProjectTestCase
        • CreateProjectWorkspaceNote
        • CreateRemediationNote
        • CreateScope
        • CreateTestcaseNote
        • CreateTestsuite
        • CreateUser
        • CreateUsers
        • CreateVulnerability
        • CreateVulnerabilityBulk
        • CreateVulnerabilityLibraryIssue
        • CreateVulnerabilityWithLibrary
        • DeactivateUser
        • DownloadProjectTestCaseFile
        • DownloadProjectTestCaseNoteFile
        • DownloadProjectTestCaseWorkspaceNoteFile
        • DownloadVulnerabilityEvidence
        • DownloadVulnerabilityLibraryFile
        • DownloadWorkspaceFile
        • GetApplicationAuditLogs
        • GetAssets
        • GetAssetsByGroup
        • GetAssetInLibrary
        • GetAssetsInLibrary
        • GetCustomFieldsConfig
        • GetFormConfig
        • GetGroup
        • GetGroups
        • GetMostCommonVulnerabilities
        • GetMostFailedTestcases
        • GetMostVulnerableAssets
        • GetPortfolio
        • GetPortfolios
        • GetPortfolioStream
        • GetProjectAuditLogs
        • GetProjectById
        • GetProjects
        • GetProjectsAndVulnerabilities
        • GetProjectsByGroup
        • GetProjectMembershipAdministrators
        • GetProjectNotes
        • GetProjectReport
        • GetProjectReportData
        • GetProjectRequests
        • GetProjectRequestById
        • GetProjectTestcasesById
        • GetProjectVulnerabilitiesById
        • GetProjectWorkspace
        • GetTestsuiteById
        • GetTestsuites
        • GetUserByEmail
        • GetUserById
        • GetUserByUsername
        • GetUserAuditLogs
        • GetUserGroups
        • GetUserLoginHistory
        • GetUserProjects
        • GetUsers
        • GetVulnerabilityById
        • GetVulnerabilities
        • GetVulnerabilitiesByAssetName
        • GetVulnerabilitiesByGroup
        • GetVulnerabilityLibraryIssues
        • GetVulnerabilityRevisionHistory
        • InviteUserToProject
        • InviteUsersToProjectTeam
        • RejectProjectRequestById
        • RegenerateAPIKey
        • RemoveProjectMembershipAdministrators
        • RemoveProjectTeamMembers
        • RequestNewProjectRetest
        • RestoreProject
        • SendEmail
        • SendDailyCommencementEmail
        • SendDailyCompletionEmail
        • UpdateAssetInLibrary
        • UpdateCustomFieldsConfig
        • UpdateExecSummaryNotes
        • UpdateFormConfig
        • UpdateGroup
        • UpdatePortfolio
        • UpdateProjectById
        • UpdateProjectMembershipAdministrators
        • UpdateProjectNote
        • UpdateProjectRequestById
        • UpdateProjectRetestRound
        • UpdateProjectWorkspaceNote
        • UpdateScope
        • UpdateTestcase
        • UpdateTestcaseOnTestsuite
        • UpdateTestsuite
        • UpdateUserAccessOnGroup
        • UpdateUserAccessOnProject
        • UpdateUser
        • UpdateVulnerabilityById
        • UpdateVulnerabilityLibraryIssue
        • UpdateVulnerabilitySLAs
        • UpdateVulnerabilityWithLibrary
        • UploadTestcaseFile
        • UploadVulnerabilityEvidence
        • UploadVulnerabilityLibraryFile
        • UploadWorkspaceFile
      • Self-Service Events API
        • GETTING STARTED
        • Project Created
        • Project Updated
        • Project Request Created
        • Project Request Updated
        • Project Retest Requested
        • Project Retest Completed
        • Project Retest Cancelled
        • Vulnerability Created
        • Vulnerability Updated
        • Vulnerability Evidence Created
        • Vulnerability Evidence Updated
        • Vulnerability Remediation Note Created
        • Vulnerability Remediation Note Updated
    • AFScript
    • Access Control Matrix
    • Raising Support Tickets
    • Security
  • Contact
Powered by GitBook

Check YouTube for more tutorials: https://youtube.com/@attackforge

On this page
  • Contains
  • Example
  • Additional Filters
  • Starts With
  • Example
  • Additional Filters
  • Ends With
  • Example
  • Additional Filters
  • Wildcard
  • Supported Globs
  • Extglobs
  • Brace Expansion
  • Examples
  • Additional Filters
  • Regex
  • Examples
  • Case Sensitivity
  • Additional Filters
  • Considerations
  • List-type Fields
  • Custom Views
  • Creating a New View
  • Updating a View
  • Restoring a View
  1. Core & Enterprise
  2. Getting Started

Advanced Filtering

PreviousCustom Fields & FormsNextVulnerability SLAs

Last updated 1 month ago

Advanced filtering can help you to quickly and easily find the information that you need, and help you save your search filter so you can easily repeat your search time and time again.

Advanced filtering is available in the Filters section of your table, or when selecting an individual column filter.

When selecting which advanced filter to use, there are multiple options to choose from:

  • Contains

  • Starts With

  • Ends With

  • Wildcard

  • Regex

Contains

The Contains filter is used to check whether an input value is contained anywhere within the search. It performs a case insensitive search by default.

Example

Filtering for xss in the Vulnerability title using a Contains filter will check if xss is contained anywhere within the title. The following results would apply:

  1. Reflected XSS [MATCH]

  2. Reflected Cross-Site Scripting (XSS) [MATCH]

  3. Xss Identified in Application Login Page [MATCH]

  4. Stored xss Leads to Stolen Session Token [MATCH]

Additional Filters

You can add further filters to Contains including:

  • Does Not - checks if the input value is NOT contained anywhere within the search.

  • Match Whole Word - checks if the input value is contained anywhere within the search and also matches the entire word. Using the example above - 1, 3 and 4 would be a match. 2 would not be a match due to the ( and ) wrapping the word xss.

  • Match Case - checks if the input value is contained anywhere within the search and the case sensitivity also matches. Using the example above - only 4 would be a match. 1, 2 and 3 all have different cases in use.

Starts With

The Starts With filter is used to search records which begin with the characters specified within the input value. It performs a case insensitive search by default.

Example

Filtering for xss in the Vulnerability title using a Starts With filter will check if xss is included at the start of the title. The following results would apply:

  1. Reflected XSS [NO MATCH]

  2. Reflected Cross-Site Scripting (XSS) [NO MATCH]

  3. Xss Identified in Application Login Page [MATCH]

  4. Stored xss Leads to Stolen Session Token [NO MATCH]

Additional Filters

You can add further filters to Starts With including:

  • Does Not - checks if the search DOES NOT begin with the characters specified within the input value.

  • Match Whole Word - checks if the search begins with the characters specified within the input value and also matches the entire word. Using the example above - 3 would be a match.

  • Match Case - checks if the search begins with the characters specified within the input value and the case sensitivity also matches. Using the example above - there would be no matches.

Ends With

The Ends With filter is used to search records which end with the characters specified within the input value. It performs a case insensitive search by default.

Example

Filtering for xss in the Vulnerability title using a Ends With filter will check if xss is included at the end of the title. The following results would apply:

  1. Reflected XSS [MATCH]

  2. Reflected Cross-Site Scripting (XSS) [NO MATCH]

  3. Xss Identified in Application Login Page [NO MATCH]

  4. Stored xss Leads to Stolen Session Token [NO MATCH]

Additional Filters

You can add further filters to Starts With including:

  • Does Not - checks if the search DOES NOT end with the characters specified within the input value.

  • Match Whole Word - checks if the search ends with the characters specified within the input value and also matches the entire word. Using the example above - 1 would be a match.

  • Match Case - checks if the search ends with the characters specified within the input value and the case sensitivity also matches. Using the example above - there would be no matches.

Wildcard

The Wildcard filter is used to perform Glob matching or globbing using wildcards (like * and ?) to match values based on patterns. It performs a case insensitive search by default.

Supported Globs

  • Wildcards (**, *.js)

  • Negation ('!a/*.js', '*!(b).js')

  • extglobs (+(x|y), !(a|b))

  • POSIX character classes ([[:alpha:][:digit:]])

  • brace expansion (foo/{1..5}.md, bar/{a,b,c}.js)

  • regex character classes (foo-[1-5].js)

  • regex logical "or" (foo/(abc|xyz).js)

Extglobs

pattern

regex equivalent

description

?(pattern)

(pattern)?

Matches zero or one occurrence of the given patterns

*(pattern)

(pattern)*

Matches zero or more occurrences of the given patterns

+(pattern)

(pattern)+

Matches one or more occurrences of the given patterns

@(pattern)

(pattern) *

Matches one of the given patterns

!(pattern)

N/A (equivalent regex is much more complicated)

Matches anything except one of the given patterns

Brace Expansion

  • Supports lists - (aka "sets") a/{b,c}/d => ['a/b/d', 'a/c/d']

  • Supports sequences - (aka "ranges") {01..03} => ['01', '02', '03']

  • Supports steps - (aka "increments") {2..10..2} => ['2', '4', '6', '8', '10']

  • Supports escaping a\\{d,c,b}e => a{d,c,b}e

Examples

  1. Filtering for xss OR cross site scripting anywhere in the Vulnerability title:

*xss*|*cross site scripting*
  1. Filtering for NOT 'HTTP' AND NOT 'MIME' anywhere in the Vulnerability title:

!(*HTTP*|*MIME*)

Additional Filters

You can add further filters to Starts With including:

  • Does Not - checks if the search DOES NOT match the glob specified.

  • Match Case - checks if the search matches the glob specified and the case sensitivity also matches.

Regex

The Regex filter is used to perform Regular Expression matching based on patterns. It performs a case sensitive search by default.

Examples

  1. Filtering for xss OR cross site scripting anywhere in the Vulnerability title:

^xss|cross site scripting$
  1. Filtering for NOT 'HTTP' AND NOT 'MIME' anywhere in the Vulnerability title:

^(?!(.*HTTP.*|.*MIME.*)).*$

Case Sensitivity

You can perform a case insensitive search by clicking on flags and selecting insensitive from the options.

Additional Filters

You can add further filters to Starts With including:

  • Does Not - checks if the search DOES NOT match the RegEx specified.

Considerations

List-type Fields

Filtering on List-type fields such as Tags will match against ANY of the tags. That is, if any tag in the list satisfies the filter, the filter will be considered a match.

For example, if you are filtering Vulnerabilities for the tag OWASP TOP 10 - so long as any of the tags on the vulnerability has the tag OWASP TOP 10, that vulnerability will be considered a match.

If you are wanting to filter Tags by multiple tags - for example to determine if any vulnerability has both OWASP TOP 10 and CWE TOP 25 - you can add multiple filter entries:

Custom Views

Custom Views allows you to save your favourite and frequently used table views.

You can easily configure and switch between different views providing flexibility in how you want to see your data.

Each view is saved against your own personal user settings, so you can tailor each view to exactly how you want it. And best of all - you can create as many views as you need!

COMING SOON! Ability for Admins to create Views and make them available to all or selected users, including setting default views for other users.

Each view is unique. You can save the following information and table state for each view:

  • Table filters, including Advanced filters

  • Column visibility

  • Column filters, including Advanced filters

  • Column ordering

  • Column sorting

  • Column locking

  • Column features

  • Table scroll

Each view gets its own name. You can also duplicate views to create similar ways of seeing your data.

We also support re-ordering your views, making it easy to switch between frequently accessed data.

Creating a New View

You can create a new View by clicking on the + icon:

Once you have finished making the adjustments to your filtering and table, you can save your view by clicking on the Save icon:

Updating a View

You can update an existing View after making changes by clicking on the Save icon:

Restoring a View

If you are on a View and you have moved away from what the View is configured to show, for example by further filtering or sorting, you can return back to the original results for the View by clicking on the Restore icon: