Skip to content

Commit 08bd666

Browse files
committed
Fix broken link
1 parent bcbb852 commit 08bd666

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

docs/integrations/security-threat-detection/threat-intel-quick-analysis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ _sourceCategory=<source-category-name>
6868

6969
### Field Extraction Rule
7070

71-
Use [Field Extraction Rules (FER)]((/docs/manage/field-extractions/create-field-extraction-rule)) to parse fields from your log messages at the time the messages are ingested, which eliminates the need to parse fields at the query level. Use these parsed fields along with Threat Intel Lookup operator.
71+
Use [Field Extraction Rules (FER)](/docs/manage/field-extractions/create-field-extraction-rule) to parse fields from your log messages at the time the messages are ingested, which eliminates the need to parse fields at the query level. Use these parsed fields along with Threat Intel Lookup operator.
7272

7373
1. Create the FER For example, for Cylance Security Events, create and use the following Field Extraction Rule:
7474
```sql

0 commit comments

Comments
 (0)