Skip to content

Commit 0683d9c

Browse files
First draft
1 parent 9058bff commit 0683d9c

File tree

1 file changed

+9
-11
lines changed

1 file changed

+9
-11
lines changed

solutions/security/detect-and-alert/create-detection-rule.md

Lines changed: 9 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -240,28 +240,26 @@ To filter noisy {{ml}} rules, use [rule exceptions](/solutions/security/detect-a
240240
241241
242242
1. Find **Detection rules (SIEM)** in the navigation menu or by using the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md), then click **Create new rule**.
243-
2. To create a rule that searches for events whose specified field value matches the specified indicator field value in the indicator index patterns, select **Indicator Match**, then fill in the following fields:
243+
2. To create a rule that generates alerts whenever events match or do not match threat intelligence indicators, select **Indicator Match**, then configure the following:
244244
245-
1. **Source**: The individual index patterns or data view that specifies what data to search.
246-
2. **Custom query**: The query and filters used to retrieve the required results from the {{elastic-sec}} event indices. For example, if you want to match documents that only contain a `destination.ip` address field, add `destination.ip : *`.
247-
248-
::::{tip}
249-
If you want the rule to check every field in the indices, use this wildcard expression: `*:*`.
250-
::::
245+
1. **Source**: Specifies event data for the rule to query. In the **Index patterns** field, the [default {{elastic-sec}} indices](/solutions/security/get-started/configure-advanced-settings.md#update-sec-indices) are provided. You can add more indices or remove existing ones.
246+
247+
If you choose to use a data view, click **Data View**, then choose one from the drop-down.
251248
249+
2. **Custom query**: By default, a KQL query that searches every field in the specified event data sources is provided (`*:*`). You can modify the query as needed. For example, if you want to match documents that only contain a `destination.ip` address field, add `destination.ip : *`.
252250
253-
::::{note}
251+
::::{tip}
254252
You can use saved queries and queries from saved Timelines (**Import query from saved Timeline**) as rule conditions.
255253
::::
256254
257-
3. **Indicator index patterns**: The indicator index patterns containing field values for which you want to generate alerts. This field is automatically populated with indices specified in the `securitySolution:defaultThreatIndex` advanced setting. For more information, see [Update default Elastic Security threat intelligence indices](/solutions/security/get-started/configure-advanced-settings.md#update-threat-intel-indices).
255+
3. **Indicator index patterns**: Specifies threat intelligence indicator data for the rule to query. By default, the indices specified in the [`securitySolution:defaultThreatIndex`](/solutions/security/get-started/configure-advanced-settings.md#update-threat-intel-indices) advanced setting are entered.
258256
259257
::::{important}
260-
Data in indicator indices must be [ECS compatible](/reference/security/fields-and-object-schemas/siem-field-reference.md), and so it must contain a `@timestamp` field.
258+
Data in threat intelligence indicator indices must be [ECS compatible](/reference/security/fields-and-object-schemas/siem-field-reference.md), and must contain a `@timestamp` field.
261259
::::
262260
263261
4. **Indicator index query**: The query and filters used to filter the fields from the indicator index patterns. The default query `@timestamp > "now-30d/d"` searches specified indicator indices for indicators ingested during the past 30 days and rounds the start time down to the nearest day (resolves to UTC `00:00:00`).
264-
5. **Indicator mapping**: Compares the values of the specified event and indicator fields, and generates an alert if the values are identical.
262+
5. **Indicator mapping**: Compares the values of the event and indicator fields, and generates an alert if the values match or do not match.
265263
266264
::::{note}
267265
Only single-value fields are supported.

0 commit comments

Comments
 (0)