Simple Question:
Is there any way to identify which raw logs ingested into Google SecOps do not yet have a parser?
There are many teams ingesting logs into my Google SecOps, and I would like to identify which logs do not yet have an active parser. Is there a way to view or report on logs that are not yet parsed?
