Skip to content

Commit cc7f488

Browse files
committed
Update comments in threat intel quick analysis article
1 parent a33ab97 commit cc7f488

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

docs/integrations/security-threat-detection/threat-intel-quick-analysis.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ _sourceCategory=cylance "IP Address"
152152
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=ip_address
153153
```
154154

155-
<!-- Replace section content with this after `sumo://threat/i471` is replaced by `threatlookup`:
155+
<!-- Per DOCS-643, replace section content with this after `sumo://threat/cs` is replaced by `threatlookup`:
156156
157157
The app provides baseline queries that utilize the [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/) to look for threat intelligence data. To see the queries, open a [dashboard in the app](#viewing-threat-intel-quick-analysis-dashboards), click the three-dot kebab in the upper-right corner of the dashboard panel, and select **Open in Log Search**.
158158
@@ -215,7 +215,7 @@ Use [Field Extraction Rules (FER)](/docs/manage/field-extractions/create-field-e
215215
| count as threat_count by src_ip, malicious_confidence, Actor, _source, label_name
216216
| sort by threat_count
217217
```
218-
<!-- Replace the preceding step with the following after `sumo://threat/i471` is replaced by `threatlookup`:
218+
<!-- Per DOCS-643, replace the preceding step with the following after `sumo://threat/cs` is replaced by `threatlookup`:
219219
1. Customize your query so you can use parsed fields from the Field Extraction Rule with the [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/), where `src_ip` is the parsed field from the FER. For example:
220220
```
221221
| threatlookup singleIndicator src_ip
@@ -242,7 +242,7 @@ Use scheduled views with the threat lookup operator to find threats. Scheduled v
242242
| lookup latitude, longitude, country_code, country_name, region, city, postal_code, area_code, metro_code from geo://default on ip = src_ip
243243
| count as threat_count by src_ip, malicious_confidence, Actor, _source, label_name, city, country_name, raw
244244
```
245-
<!-- Replace the preceding code with the following after `sumo://threat/i471` is replaced by `threatlookup`:
245+
<!-- Per DOCS-643, replace the preceding code with the following after `sumo://threat/cs` is replaced by `threatlookup`:
246246
```
247247
_sourceCategory=cylance
248248
| threatlookup singleIndicator src_ip
@@ -259,7 +259,7 @@ Use scheduled views with the threat lookup operator to find threats. Scheduled v
259259
| count by src_ip
260260
```
261261

262-
<!-- Hide this FAQ section until after `sumo://threat/i471` is replaced by `threatlookup`:
262+
<!-- Per DOCS-643, hide this FAQ section until after `sumo://threat/cs` is replaced by `threatlookup`:
263263

264264
## Threat Intel FAQ
265265

0 commit comments

Comments
 (0)