You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=ip_address
153
153
```
154
154
155
-
<!--Replace section content with this after `sumo://threat/i471` is replaced by `threatlookup`:
155
+
<!--Per DOCS-643, replace section content with this after `sumo://threat/cs` is replaced by `threatlookup`:
156
156
157
157
The app provides baseline queries that utilize the [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/) to look for threat intelligence data. To see the queries, open a [dashboard in the app](#viewing-threat-intel-quick-analysis-dashboards), click the three-dot kebab in the upper-right corner of the dashboard panel, and select **Open in Log Search**.
158
158
@@ -215,7 +215,7 @@ Use [Field Extraction Rules (FER)](/docs/manage/field-extractions/create-field-e
215
215
| count as threat_count by src_ip, malicious_confidence, Actor, _source, label_name
216
216
| sort by threat_count
217
217
```
218
-
<!--Replace the preceding step with the following after `sumo://threat/i471` is replaced by `threatlookup`:
218
+
<!--Per DOCS-643, replace the preceding step with the following after `sumo://threat/cs` is replaced by `threatlookup`:
219
219
1. Customize your query so you can use parsed fields from the Field Extraction Rule with the [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/), where `src_ip` is the parsed field from the FER. For example:
220
220
```
221
221
| threatlookup singleIndicator src_ip
@@ -242,7 +242,7 @@ Use scheduled views with the threat lookup operator to find threats. Scheduled v
242
242
| lookup latitude, longitude, country_code, country_name, region, city, postal_code, area_code, metro_code from geo://default on ip = src_ip
243
243
| count as threat_count by src_ip, malicious_confidence, Actor, _source, label_name, city, country_name, raw
244
244
```
245
-
<!--Replace the preceding code with the following after `sumo://threat/i471` is replaced by `threatlookup`:
245
+
<!--Per DOCS-643, replace the preceding code with the following after `sumo://threat/cs` is replaced by `threatlookup`:
246
246
```
247
247
_sourceCategory=cylance
248
248
| threatlookup singleIndicator src_ip
@@ -259,7 +259,7 @@ Use scheduled views with the threat lookup operator to find threats. Scheduled v
259
259
| count by src_ip
260
260
```
261
261
262
-
<!--Hide this FAQ section until after `sumo://threat/i471` is replaced by `threatlookup`:
262
+
<!--Per DOCS-643, hide this FAQ section until after `sumo://threat/cs` is replaced by `threatlookup`:
0 commit comments