Abstract
A list of detectors connected to URL and File log types.
If you turn off URL and File log types collection, some detectors are unable to detect cyber attacks or provide full context, and correlation rules are unable to detect cyber events.
The following detectors are affected by URL logs:
The following detectors are affected by File logs: