A Risk Rule generates events on Suspicious Cloud Share Activity and regularly contributes to confirmed incidents from Risk Notables. An analyst realizes the raw logs these events are generated from contain information which helps them determine what might be malicious.
What should they ask their engineer for to make their analysis easier?
- A.Create a field extraction for this information.
- B.Add this information to the risk_message.
- C.Create another detection for this information.
- D.Allowlist more events based on this information.