You are creating a correlation rule in Next-Gen SIEM to trigger alerts based on when the event occurred, regardless of when the event was ingested.
Which event timestamp should you select?
You notice that the format of incoming logs suddenly changes from JSON format to key-value pairs during log collection.
What action would you take to parse the data correctly?
What should you do with a field that is not CPS-compliant when adding it to a parser?
You need to import a pre-built workflow into Fusion SOAR to automate a part of your incident response process.
Which file format would you use?
What dashboard presents a view of third-party data ingestion over the past 30 days?
You want a consistent view of events from various data sources.
Which ECS field type should you normalize?
Which three System alerts are enabled by default in Next-Gen SIEM for third-party connectors?
A Falcon Log Collector has been configured with 4 sinks of type memory, each having a queue size of 2GB.
What is the minimum memory requirement produced by this configuration?
When creating an API client for Falcon SIEM Connector, which permission is required for the connector to read Falcon event streams?
Which role is most appropriate when a user only needs to view SIEM investigations and dashboards but must not modify content?
You want a Next-Gen SIEM dashboard to update automatically when new data is available.
Which action would you take?
Which combination of scope and permissions must be configured to create an API token that allows you to create and get the results of a query job in Next-Gen SIEM?
Which default parser would you use to parse the log event below?
Jan 15 14:22:07 host1 sshd[1234]: Failed login