Constrain your search using the threat filter and
submit a log query based on the DNS category, for example,
threat_category.value
= 'dns-c2'
to view logs that have been determined to be
a C2 domain. To search for other DNS types, replace c2 with another
supported DNS category (ddns, parked, malware, etc). Adjust the
search criteria as necessary for your search, including additional
query parameters (such as the severity level and subtype) along
with a date range.