You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: solutions/security/ai/attack-discovery.md
+21-14Lines changed: 21 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,11 @@ You need the `Attack Discovery: All` privilege to use Attack Discovery.
28
28
29
29
## Set up Attack Discovery
30
30
31
-
By default, Attack Discovery analyzes up to 100 alerts from the last 24 hours, but you can customize how many and which alerts it analyzes using the settings menu. To open it, click the gear icon next to the **Generate** button.
31
+
By default, Attack Discovery analyzes up to 100 alerts from the last 24 hours, but you can customize how many and which alerts it analyzes using the settings menu. To open it, click the settings icon next to the **Run** button.
32
+
33
+
:::{note}
34
+
In {{stack}} 9.0.0 and earlier, the **Run** button is called **Generate**.
@@ -52,7 +56,9 @@ The selected fields can now be analyzed the next time you run Attack Discovery.
52
56
You’ll need to select an LLM connector before you can analyze alerts. Attack Discovery uses the same LLM connectors as [AI Assistant](/solutions/security/ai/ai-assistant.md). To get started:
53
57
54
58
1. Click the **Attack Discovery** page from {{elastic-sec}}'s navigation menu.
55
-
2. Select an existing connector from the dropdown menu, or add a new one.
59
+
2. Do one of the following:
60
+
- {applies_to}`stack: ga 9.1` Click the settings icon next to the **Run** button, then in the settings menu, select an existing connector from the dropdown menu, or add a new one.
61
+
- {applies_to}`stack: removed 9.1` Select an existing connector from the dropdown menu, or add a new one.
56
62
57
63
:::{admonition} Recommended models
58
64
While Attack Discovery is compatible with many different models, refer to the [Large language model performance matrix](/solutions/security/ai/large-language-model-performance-matrix.md) to see which models perform best.
@@ -64,9 +70,11 @@ You’ll need to select an LLM connector before you can analyze alerts. Attack D
64
70
:alt: attck disc select model empty
65
71
:::
66
72
67
-
3. Once you’ve selected a connector, click **Generate** to start the analysis.
68
-
69
-
It may take from a few seconds up to several minutes to generate discoveries, depending on the number of alerts and the model you selected. Once the analysis is complete, any threats it identifies will appear as discoveries. Click each one’s title to expand or collapse it. Click **Generate** at any time to start the Attack Discovery process again with the selected alerts.
73
+
3. Once you’ve selected a connector, do one of the following to start the analysis:
74
+
- {applies_to}`stack: ga 9.1` Click **Save and run**.
It may take from a few seconds up to several minutes to generate discoveries, depending on the number of alerts and the model you selected. Once the analysis is complete, any threats it identifies will appear as discoveries. Click each one’s title to expand or collapse it. Click **Run** at any time to start the Attack Discovery process again with the selected alerts.
70
78
71
79
::::{important}
72
80
Attack Discovery uses the same data anonymization settings as [Elastic AI Assistant](/solutions/security/ai/ai-assistant.md). To configure which alert fields are sent to the LLM and which of those fields are obfuscated, use the Elastic AI Assistant settings. Consider the privacy policies of third-party LLMs before sending them sensitive data.
@@ -104,29 +112,27 @@ There are several ways you can incorporate discoveries into your {{elastic-sec}}
104
112
105
113
```yaml {applies_to}
106
114
stack: ga 9.1
107
-
serverless: ga
108
115
```
109
116
110
117
You can define recurring schedules (for example, daily or weekly) to automatically generate attack discoveries without needing manual runs. For example, you can generate discoveries every 24 hours and send a Slack notification to your SecOps channel if discoveries are found. Notifications are sent using configured [connectors](/deploy-manage/manage-connectors.md), such as Slack or email, and you can customize the notification content to tailor alert context to your needs.
111
118
112
-
Scheduled discoveries are shared by default with all users in a {{kib}} space.
113
-
114
119
:::{note}
115
-
You can still generate discoveries manually at any time, regardless of an active schedule.
120
+
* Scheduled discoveries are shared by default with all users in a {{kib}} space. Once shared, the visibility of shared discoveries cannot be changed.
121
+
* You can still generate discoveries manually at any time, regardless of an active schedule.
116
122
:::
117
123
118
124
To create a new schedule:
119
125
120
-
1. Click the gear icon to open the settings menu, then select **Schedule**.
121
-
2. Select **Create new schedule**.
126
+
1. In the top-right corner, select **Schedule**.
127
+
2. In the **Attack discovery schedule** flyout, select **Create new schedule**.
122
128
3. Enter a name for the new schedule.
123
129
4. Select the LLM connector to use for generating discoveries, or add a new one.
124
130
5. Use the KQL query bar, time filter, and alerts slider to customize the set of alerts that will be analyzed.
125
131
6. Define the schedule's frequency (for example, every 24 hours).
126
132
7. Optionally, select the [connectors](/deploy-manage/manage-connectors.md) to use for receiving notifications, and define their actions.
127
133
8. Click **Create & enable schedule**.
128
134
129
-
After creating new schedules, you can view their status, modify them or delete them from the **Schedule** tab in the settings menu.
135
+
After creating new schedules, you can view their status, modify them or delete them from the **Attack discovery schedule** flyout.
130
136
131
137
:::{tip}
132
138
Scheduled discoveries are shown with a **Scheduled Attack discovery** icon ({icon}`calendar`). Click the icon to view the schedule that created it.
@@ -136,15 +142,16 @@ Scheduled discoveries are shown with a **Scheduled Attack discovery** icon ({ico
136
142
137
143
```yaml {applies_to}
138
144
stack: ga 9.1
139
-
serverless: ga
140
145
```
141
146
142
-
Attack discoveries are automatically saved each time you generate them. Once saved, discoveries remain available for later review, reporting, and tracking over time. This allows you to revisit discoveries to monitor trends, maintain audit trails, and support investigations as your environment evolves.
147
+
Attack discoveries are automatically saved on the **Attack Discovery** page each time you generate them. Once saved, discoveries remain available for later review, reporting, and tracking over time. This allows you to revisit discoveries to monitor trends, maintain audit trails, and support investigations as your environment evolves.
143
148
144
149
### Change a discovery's status
145
150
146
151
You can set a discovery's status to indicate that it's under active investigation or that it's been resolved. To do this, click **Take action**, then select **Mark as acknowledged** or **Mark as closed**.
147
152
153
+
You can choose to change the status of only the discovery, or of both the discovery and the alerts associated with it.
154
+
148
155
### Take bulk actions
149
156
150
157
You can take bulk actions on multiple discoveries, such as bulk-changing their status or adding them to a case. To do this, select the checkboxes next to each discovery, then click **Selected *x* Attack discoveries** and choose the action you want to take.
0 commit comments