| CPC H04L 63/1416 (2013.01) [H04L 63/1433 (2013.01); H04L 63/145 (2013.01)] | 25 Claims |

|
1. A computer-implemented method, comprising:
causing a first search to be performed for data on a first security endpoint of a first federated search environment;
organizing information about the first search into steps and variables, wherein a result of performance of the steps includes the variables, wherein the steps include commands iteratively executed during the first search;
running security analytics on a dataset of the data uncovered during the first search;
detecting first behavior on a second security endpoint of a second federated search environment, wherein the first behavior is associated with parameters and metrics of second behavior of the first security endpoint that existed during development of the steps and variables; and
in response to the detection of the first behavior, reusing the steps and variables to perform a second search on a second security endpoint of the second federated search environment,
wherein the reusing the steps and variables to perform the second search includes iteratively executing the commands during the second search.
|