Skip to content

Commit 37ca195

Browse files
authored
Update docs/integrations/security-threat-detection/threat-intel-quick-analysis.md
1 parent c8115aa commit 37ca195

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

docs/integrations/security-threat-detection/threat-intel-quick-analysis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ _sourceCategory=cylance "IP Address"
4646

4747
<!-- Per DOCS-643, replace section content with this after `sumo://threat/cs` is replaced by `threatlookup`:
4848
49-
The app provides baseline queries that utilize the [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/) to look for threat intelligence data. To see the queries, open a [dashboard in the app](#viewing-threat-intel-quick-analysis-dashboards), click the three-dot kebab in the upper-right corner of the dashboard panel, and select **Open in Log Search**.
49+
The app provides baseline queries that utilize the [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/) to look for threat intelligence data. To see the queries, open a [dashboard in the app](#viewing-threat-intel-quick-analysis-dashboards), click the three-dot kebab in the upper-right corner of the dashboard panel, and select **Open in Log Search**.
5050
5151
You can further optimize and enhance these queries for the log and events types being scanned for threats. Use the following guidelines to customize your threat intel queries:
5252

0 commit comments

Comments
 (0)