Custom Logs - HTTP
{
"eventAt": "2025-03-12T12:31:51.812Z",
"service": "endpoint-detection",
"severity": "high",
"alertId": "EDR-2025-001847",
"description": "Suspicious PowerShell execution detected on DESKTOP-WIN10-042",
"source": "192.168.1.45"
}Step 1: Create a New Source
Step 2: Configure the Source
Step 3: Set Up Authentication
Step 4: Configure the Destination
Step 5: Transform and Enrich
Parse JSON Columns
Parse Key-Value Columns
Step 6: Timestamp Extraction
Step 7: Review and Create
Step 8: Send Data from Your Tool
Last updated
Was this helpful?