[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["難以理解","hardToUnderstand","thumb-down"],["資訊或程式碼範例有誤","incorrectInformationOrSampleCode","thumb-down"],["缺少我需要的資訊/範例","missingTheInformationSamplesINeed","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-07-16 (世界標準時間)。"],[[["Raw Log Scan allows users to examine unparsed logs within Google Security Operations when the information is not found in the parsed data."],["Users can search for artifacts like usernames, filenames, registry keys, and more within logs, even if the information is not indexed."],["Regular expressions can be used in Raw Log Scan to search and match character strings within security data, narrowing searches to information fragments."],["The Raw Log Scan view includes filters based on events such as DNS, Webproxy, EDR, and Alert, but not GENERIC, EMAIL, or USER event types."],["To search on Raw Log Scan you must specify the start and end time, and then the scan will begin."]]],[]]