Skip to content

Commit 0dc38ac

Browse files
authored
Update docs/integrations/security-threat-detection/threat-intel-quick-analysis.md
1 parent a34fcd0 commit 0dc38ac

File tree

1 file changed

+0
-1
lines changed

1 file changed

+0
-1
lines changed

docs/integrations/security-threat-detection/threat-intel-quick-analysis.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,6 @@ Use [Field Extraction Rules (FER)](/docs/manage/field-extractions/create-field-e
106106
| if (isEmpty(actor), "Unassigned", actor) as Actor
107107
| count as threat_count by src_ip, malicious_confidence, Actor, _source, label_name
108108
| sort by threat_count
109-
```
110109
<!-- Per DOCS-643, replace the preceding step with the following after `sumo://threat/cs` is replaced by `threatlookup`:
111110
1. Customize your query so you can use parsed fields from the Field Extraction Rule with the [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/), where `src_ip` is the parsed field from the FER. For example:
112111
```

0 commit comments

Comments
 (0)