![]() ![]() # versions, this URL points to the dashboard archive on the ![]() # has a value which is computed based on the Beat name and version. # The URL from where to download the dashboards archive. # options here or by using the `setup` command. # the dashboards is disabled by default and can be enabled either by setting the # These settings control loading the sample dashboards to the Kibana index. ![]() # Optional fields that you can specify to add additional information to the # The tags of the shipper are included in their own field with each # all the transactions sent by a single shipper in the web interface. ![]() # The name of the shipper that publishes the network data. # Period on which files under path should be checked for changes # Paths that should be crawled and fetched. # Change to true to enable this input configuration. See this list for values that you can query for with the threat_actor facet.I'm trying to use fortinet module to parse and make logs presentable before it ships to logstash here is my filebeats configuration file: Webcam Acceptable expressions for the threat_actor facet See this list for values that you can query for with the device_type facet. Z/VSE Acceptable expressions for the device_type facet See this list for values that you can query for with the os_type facet. UNKNOWN Acceptable expressions for the os_type facet See this list for values that you can query for with the industry facet. Acceptable expressions for the industry facet To inquire about query elements you do not see on this list, submit a Support request. Note: We may update these query elements at any time and publish updates in this article on a quarterly basis. Each section lists acceptable expressions for facets in the ASI queries. Use this page as a reference when writing your own search queries in Attack Surface Intelligence). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |