Back to Floor
Detection Engineering I • Room 3
Threat Objects
When designing a detection, the engineer must explicitly define the "Threat Object"—the artifact (IP, hash, filename) representing the malicious activity.
Extracting this allowing downstream integration with Threat Intelligence and SOAR playbooks for automated blocking.
Knowledge Check
Prove your understanding to clear the room (Rewards XP)
You are writing a correlation search. Use the `eval` command to create a new field called `threat_object` and set its value to the existing `dest_ip` field.
Splunk Search Bar
>