Articles by Eric Beahan


Validating Elastic Common Schema (ECS) fields using Elastic Security detection rules

Normalizing your data through Elastic Common Schema empowers you to analyze and visualize everything in a uniform manner. What about custom data sources? Identify any sources that aren’t ECS-compliant with the Elastic Security detection engine.