Skip to content

Commit 460b1d9

Browse files
jpipkin1kimsauce
andauthored
Update docs/platform-services/threat-intelligence-indicators.md
Co-authored-by: Kim (Sumo Logic) <[email protected]>
1 parent d2b766a commit 460b1d9

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

docs/platform-services/threat-intelligence-indicators.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -259,7 +259,7 @@ The `hasThreatMatch` Cloud SIEM rules function searches incoming Records in Clou
259259
`hasThreatMatch([<fields>], <filters>, <indicators>)`
260260

261261
Parameters:
262-
* `<fields>` is a list of comma separated [entity field names](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/schema/entity_fields.md). At least one field name is required.
262+
* `<fields>` is a list of comma-separated [entity field names](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/schema/entity_fields.md). At least one field name is required.
263263
* `<filters>` is a logical expression using [indicator attributes](/docs/platform-services/threat-intelligence-indicators/#normalized-json-format). Allowed in the filtering are parentheses `()`; `OR` and `AND` boolean operators; and comparison operators `=`, `<`, `>`, `=<`, `=>`, `!=`. <br/>You can filter on the following indicator attributes:
264264
* `actors`
265265
* `confidence`

0 commit comments

Comments
 (0)