Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents
minLevel2
maxLevel2
typeflat

...

Image Added

Purpose

The Palo Alto threat injection is

...

a one-shot injection of the tables firewall.paloalto.traffic learn more and firewall.all.traffic learn more

...

, which are also used in the Use Case: Firewall Monitoring. The events of the file are sent at a frequency of 1 second.

Open synthetic data

Once the synthetic data has been launched, you can use the Open button at the top right of the card in Exchange to access the search window, where you can check the data table with the synthetic data. You can also access the data table using finders or LINQ via the Navigation pane (Data Search area → Explore your data tab).

...

Image Added
Image Added

Use synthetic data

After launching the synthetic data, you can use it in various contexts, such as the search window to perform operations to analyze the data, Activeboards to visualize and analyze the data graphically, or alerts to specify conditions to find anomalous events.

Synthetic data included inside a use case perform a key role in it, as they provide the necessary data to successfully understand what the use case intends to demonstrate.