Constrain your search using the threat filter and submit a log query
based on the DNS category, for example, threat_category.value =
'dns-c2' to view logs that have been determined to be a C2
domain. To search for other DNS types, replace c2 with another supported
DNS category (ddns, parked, malware, etc). Adjust the search criteria as
necessary for your search, including additional query parameters (such
as the severity level and subtype) along with a date range.