Skip to content

Commit 1051629

Browse files
Address feedback
1 parent 24dd74a commit 1051629

File tree

3 files changed

+21
-14
lines changed

3 files changed

+21
-14
lines changed
3.64 KB
Loading
-363 KB
Loading

solutions/security/ai/attack-discovery.md

Lines changed: 21 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,11 @@ You need the `Attack Discovery: All` privilege to use Attack Discovery.
2828

2929
## Set up Attack Discovery
3030

31-
By default, Attack Discovery analyzes up to 100 alerts from the last 24 hours, but you can customize how many and which alerts it analyzes using the settings menu. To open it, click the gear icon next to the **Generate** button.
31+
By default, Attack Discovery analyzes up to 100 alerts from the last 24 hours, but you can customize how many and which alerts it analyzes using the settings menu. To open it, click the settings icon next to the **Run** button.
32+
33+
:::{note}
34+
In {{stack}} 9.0.0 and earlier, the **Run** button is called **Generate**.
35+
:::
3236

3337
::::{image} /solutions/images/security-attack-discovery-settings.png
3438
:alt: Attack Discovery's settings menu
@@ -52,7 +56,9 @@ The selected fields can now be analyzed the next time you run Attack Discovery.
5256
You’ll need to select an LLM connector before you can analyze alerts. Attack Discovery uses the same LLM connectors as [AI Assistant](/solutions/security/ai/ai-assistant.md). To get started:
5357

5458
1. Click the **Attack Discovery** page from {{elastic-sec}}'s navigation menu.
55-
2. Select an existing connector from the dropdown menu, or add a new one.
59+
2. Do one of the following:
60+
- {applies_to}`stack: ga 9.1` Click the settings icon next to the **Run** button, then in the settings menu, select an existing connector from the dropdown menu, or add a new one.
61+
- {applies_to}`stack: removed 9.1` Select an existing connector from the dropdown menu, or add a new one.
5662

5763
:::{admonition} Recommended models
5864
While Attack Discovery is compatible with many different models, refer to the [Large language model performance matrix](/solutions/security/ai/large-language-model-performance-matrix.md) to see which models perform best.
@@ -64,9 +70,11 @@ You’ll need to select an LLM connector before you can analyze alerts. Attack D
6470
:alt: attck disc select model empty
6571
:::
6672

67-
3. Once you’ve selected a connector, click **Generate** to start the analysis.
68-
69-
It may take from a few seconds up to several minutes to generate discoveries, depending on the number of alerts and the model you selected. Once the analysis is complete, any threats it identifies will appear as discoveries. Click each one’s title to expand or collapse it. Click **Generate** at any time to start the Attack Discovery process again with the selected alerts.
73+
3. Once you’ve selected a connector, do one of the following to start the analysis:
74+
- {applies_to}`stack: ga 9.1` Click **Save and run**.
75+
- {applies_to}`stack: removed 9.1` Click **Generate**.
76+
77+
It may take from a few seconds up to several minutes to generate discoveries, depending on the number of alerts and the model you selected. Once the analysis is complete, any threats it identifies will appear as discoveries. Click each one’s title to expand or collapse it. Click **Run** at any time to start the Attack Discovery process again with the selected alerts.
7078

7179
::::{important}
7280
Attack Discovery uses the same data anonymization settings as [Elastic AI Assistant](/solutions/security/ai/ai-assistant.md). To configure which alert fields are sent to the LLM and which of those fields are obfuscated, use the Elastic AI Assistant settings. Consider the privacy policies of third-party LLMs before sending them sensitive data.
@@ -104,29 +112,27 @@ There are several ways you can incorporate discoveries into your {{elastic-sec}}
104112

105113
```yaml {applies_to}
106114
stack: ga 9.1
107-
serverless: ga
108115
```
109116
110117
You can define recurring schedules (for example, daily or weekly) to automatically generate attack discoveries without needing manual runs. For example, you can generate discoveries every 24 hours and send a Slack notification to your SecOps channel if discoveries are found. Notifications are sent using configured [connectors](/deploy-manage/manage-connectors.md), such as Slack or email, and you can customize the notification content to tailor alert context to your needs.
111118
112-
Scheduled discoveries are shared by default with all users in a {{kib}} space.
113-
114119
:::{note}
115-
You can still generate discoveries manually at any time, regardless of an active schedule.
120+
* Scheduled discoveries are shared by default with all users in a {{kib}} space. Once shared, the visibility of shared discoveries cannot be changed.
121+
* You can still generate discoveries manually at any time, regardless of an active schedule.
116122
:::
117123
118124
To create a new schedule:
119125
120-
1. Click the gear icon to open the settings menu, then select **Schedule**.
121-
2. Select **Create new schedule**.
126+
1. In the top-right corner, select **Schedule**.
127+
2. In the **Attack discovery schedule** flyout, select **Create new schedule**.
122128
3. Enter a name for the new schedule.
123129
4. Select the LLM connector to use for generating discoveries, or add a new one.
124130
5. Use the KQL query bar, time filter, and alerts slider to customize the set of alerts that will be analyzed.
125131
6. Define the schedule's frequency (for example, every 24 hours).
126132
7. Optionally, select the [connectors](/deploy-manage/manage-connectors.md) to use for receiving notifications, and define their actions.
127133
8. Click **Create & enable schedule**.
128134
129-
After creating new schedules, you can view their status, modify them or delete them from the **Schedule** tab in the settings menu.
135+
After creating new schedules, you can view their status, modify them or delete them from the **Attack discovery schedule** flyout.
130136
131137
:::{tip}
132138
Scheduled discoveries are shown with a **Scheduled Attack discovery** icon ({icon}`calendar`). Click the icon to view the schedule that created it.
@@ -136,15 +142,16 @@ Scheduled discoveries are shown with a **Scheduled Attack discovery** icon ({ico
136142

137143
```yaml {applies_to}
138144
stack: ga 9.1
139-
serverless: ga
140145
```
141146

142-
Attack discoveries are automatically saved each time you generate them. Once saved, discoveries remain available for later review, reporting, and tracking over time. This allows you to revisit discoveries to monitor trends, maintain audit trails, and support investigations as your environment evolves.
147+
Attack discoveries are automatically saved on the **Attack Discovery** page each time you generate them. Once saved, discoveries remain available for later review, reporting, and tracking over time. This allows you to revisit discoveries to monitor trends, maintain audit trails, and support investigations as your environment evolves.
143148

144149
### Change a discovery's status
145150

146151
You can set a discovery's status to indicate that it's under active investigation or that it's been resolved. To do this, click **Take action**, then select **Mark as acknowledged** or **Mark as closed**.
147152

153+
You can choose to change the status of only the discovery, or of both the discovery and the alerts associated with it.
154+
148155
### Take bulk actions
149156

150157
You can take bulk actions on multiple discoveries, such as bulk-changing their status or adding them to a case. To do this, select the checkboxes next to each discovery, then click **Selected *x* Attack discoveries** and choose the action you want to take.

0 commit comments

Comments
 (0)