Skip to content

Commit 2218382

Browse files
committed
Updates SIEM migration guide
1 parent 221c6fa commit 2218382

File tree

4 files changed

+16
-3
lines changed

4 files changed

+16
-3
lines changed
656 KB
Loading
407 KB
Loading

solutions/security/get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ This section describes how to set up {{elastic-sec}}, install {{agent}} and the
1010
* [Detect threats in my data with SIEM](https://www.elastic.co/getting-started/security/detect-threats-in-my-data-with-siem)
1111

1212
::::{note}
13-
If you're migrating to Elastic's SIEM from Splunk, you can use our AI-powered [SIEM migration tool](../security/get-started/siem-migration.md).
13+
If you're migrating to Elastic's SIEM from Splunk, you can use our [SIEM migration tool](../security/get-started/siem-migration.md).
1414
::::
1515

1616
* [Secure my hosts with endpoint security](https://www.elastic.co/getting-started/security/secure-my-hosts-with-endpoint-security)

solutions/security/get-started/siem-migration.md

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ Elastic's AI-powered SIEM migration helps you quickly convert SIEM rules from th
99
You can ingest your data before migrating your rules, or migrate your rules first, in which case the tool will recommend which data sources you need to power your migrated rules.
1010

1111
::::{admonition} Requirements
12+
* The `SIEM migrations: All` Security sub-feature privilege.
1213
* A working [LLM connector](/solutions/security/ai/set-up-connectors-for-large-language-models-llm.md).
1314
* {{stack}} users: an [Enterprise](https://www.elastic.co/pricing) subscription.
1415
* {{Stack}} users: {{ml}} must be enabled.
@@ -49,7 +50,7 @@ You can ingest your data before migrating your rules, or migrate your rules firs
4950
If the file is large, you may need to separate it into multiple parts and upload them individually to avoid exceeding your LLM's context window.
5051
::::
5152

52-
6. After you upload your Splunk rules, SIEM migration will detect whether they use any Splunk macros or lookups. If so, follow the instructions which appear to export and upload them. Alternatively, you can complete this step later — however, until you upload them, some of your migrated rules will have a `partially translated` status.
53+
6. After you upload your Splunk rules, SIEM migration will detect whether they use any Splunk macros or lookups. If so, follow the instructions which appear to export and upload them. Alternatively, you can complete this step later — however, until you upload them, some of your migrated rules will have a `partially translated` status. If you upload them now, you don't have to wait on the page for them to be processed — a notification will appear when processing is complete.
5354

5455
7. Click **Translate** to start the rule translation process. You don't need to stay on this page. A notification will appear when the process is complete.
5556

@@ -62,10 +63,16 @@ This section describes the **Translated rules** page's interface and explains ho
6263

6364
When you upload a new batch of rules, they are assigned a name and number, for example `SIEM rule migration 1`, or `SIEM rule migration 2`. Use the **Migrations** dropdown menu in the upper right to select which batch appears.
6465

66+
::::{image} ../../../images/security-siem-migration-processed-rules.png
67+
:alt: The translated rules page
68+
:width: 850px
69+
:screenshot:
70+
::::
71+
6572
The table's fields are as follows:
6673

6774
* **Name:** The names of Elastic authored rules cannot be edited until after rule installation. To edit the name of a custom translated rule, click the name and select **Edit**.
68-
* **Status:** The rule's translation status. Hover over the tooltip next to the column title for more information.
75+
* **Status:** The rule's translation status.
6976
* **Risk Score:** For Elastic authored rules, risk scores are predefined. For custom translated rules, risk scores are defined as follows:
7077
* If the source rule has a field comparable to Elastic's risk score, we use that value.
7178
* Otherwise, if the source rule has a field comparable to Elastic's rule severity field, we base the risk score on that value according to these [guidelines](/solutions/security/detect-and-alert/create-detection-rule.md#custom-highlighted-esql-fields).
@@ -96,6 +103,12 @@ You cannot edit Elastic authored rules using this interface, but after they are
96103

97104
Click the rule's name to open the rule's details flyout to the **Translation** tab, which shows the source rule alongside the translated — or partially translated — Elastic version. You can update any part of the rule. When finished, click **Save**.
98105

106+
::::{image} ../../../images/security-siem-migration-edit-rule.png
107+
:alt: The rule details flyout
108+
:width: 850px
109+
:screenshot:
110+
::::
111+
99112
::::{note}
100113
If you haven't yet ingested your data, you will likely encounter `Unknown index` or `Unknown column` errors while editing. You can ignore these and add your data later.
101114
::::

0 commit comments

Comments
 (0)