[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-04-02。"],[[["Raw Log Scan allows users to examine unparsed logs within Google Security Operations when the information is not found in the parsed data."],["Users can search for artifacts like usernames, filenames, registry keys, and more within logs, even if the information is not indexed."],["Regular expressions can be used in Raw Log Scan to search and match character strings within security data, narrowing searches to information fragments."],["The Raw Log Scan view includes filters based on events such as DNS, Webproxy, EDR, and Alert, but not GENERIC, EMAIL, or USER event types."],["To search on Raw Log Scan you must specify the start and end time, and then the scan will begin."]]],[]]