I have Symantec antimalware logs on index pattern logstash-sepm*. In json document I don't have event.category field but I want to create a correlation rule what if the same malware detects on multiple hosts. So I have to first select a value present in event.category like "process" or anything else. I want to declear field "type" as my event.catoegory but it deoesnot work.
EQL uses the @timestamp and event.category
Yes you can cusotmize fields when running the query using your custom code or from Kibana Dev Console, but from the Kibaba SIEM UI, there is a call to the endpoint :
As far as I could understand from the documentation is, we can define custom field like "event_category_field": "file.type" as an event.category if and only if we don't have event.category in the json document.
Here I want to ask how can I define event_category_field through kibana UI. I know kibana UI objective is to run the EQL syntax only but if I am wanting to declear my custom field as event.category how will it be accomplished.
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.