hi,
i parsed the logs from openedr to elk using filebeat it get parsing!
_id: Unique identifier for the log entry._index: Index name where the log entry is stored._score: Score of the log entry (typically used in search results).@timestamp: Timestamp of when the log entry was recorded.@version: Version of the log entry.agent.ephemeral_id: Ephemeral identifier for the agent responsible for collecting the log entry.agent.id: Identifier for the agent responsible for collecting the log entry.agent.name: Name of the agent responsible for collecting the log entry.agent.type: Type of agent responsible for collecting the log entry.agent.version: Version of the agent responsible for collecting the log entry.ecs.version: Version of the ECS (Elastic Common Schema) used.event.original: The original event data before parsing.host.architecture: Architecture of the host system.host.hostname: Hostname of the system where the event occurred.host.id: Unique identifier for the host system.host.ip: IP addresses associated with the host system.host.mac: MAC address of the host system.host.name: Name of the host system.host.os.build: Build version of the operating system.host.os.family: Family of the operating system (e.g., Windows).host.os.kernel: Kernel version of the operating system.host.os.name: Name of the operating system.host.os.platform: Platform of the operating system (e.g., Windows).host.os.type: Type of operating system (e.g., Windows).host.os.version: Version of the operating system.input.type: Type of input used to collect the log entry.log.file.idxhi: High index of the log file.log.file.idxlo: Low index of the log file.log.file.path: Path of the log file.log.file.vol: Volume of the log file.log.offset: Offset within the log file where the entry was read.parsed_json.baseEventType: Base event type.parsed_json.baseType: Base type.parsed_json.childProcess.*: Information about child processes.parsed_json.customerId: Customer ID.parsed_json.deviceName: Name of the device.parsed_json.endpointId: Endpoint ID.parsed_json.processes.*: Information about processes.parsed_json.sessionUser: User associated with the session.parsed_json.time: Time associated with the parsed JSON.parsed_json.type: Type of parsed JSON.parsed_json.version: Version of parsed JSON.tags: Additional tags applied to the log entry.
these many fields i'm able to see in discover of openEDR logs
will i able create a dashboard like in below formate with malware detection

