Skip to content

Commit df3e37f

Browse files
committed
missing backticks
1 parent fa8cc0b commit df3e37f

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

docs/integrations/security-threat-detection/threat-intel-quick-analysis.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -106,6 +106,7 @@ Use [Field Extraction Rules (FER)](/docs/manage/field-extractions/create-field-e
106106
| if (isEmpty(actor), "Unassigned", actor) as Actor
107107
| count as threat_count by src_ip, malicious_confidence, Actor, _source, label_name
108108
| sort by threat_count
109+
```
109110
<!-- Per DOCS-643, replace the preceding step with the following after `sumo://threat/cs` is replaced by `threatlookup`:
110111
1. Customize your query so you can use parsed fields from the Field Extraction Rule with the [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/), where `src_ip` is the parsed field from the FER. For example:
111112
```

0 commit comments

Comments
 (0)