Skip to content

Commit 379d2d1

Browse files
Update solutions/security/get-started/get-started-detect-with-siem.md
Co-authored-by: natasha-moore-elastic <[email protected]>
1 parent 726b74b commit 379d2d1

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

solutions/security/get-started/get-started-detect-with-siem.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ For a comprehensive explanation of all endpoint protections and policy settings,
8181

8282
## Add Elastic prebuilt detection rules
8383

84-
Detection rules allow you to monitor your environment by searching for source events, matches, sequences, or {{ml}} job anomaly results that meet their criteria. When a rule’s criteria are met, {{elastic-sec}} generates an alert. While you can create your own rules tailored for your environment, Elastic ships out-of-the-box prebuilt rules that you can install. Remember that if you installed {{elastic-defend}}, the Endpoint Security rule is already enabled.
84+
Detection rules allow you to monitor your environment by searching for source events, matches, sequences, or {{ml}} job anomaly results that meet their criteria. When a rule’s criteria are met, {{elastic-sec}} generates an alert. While you can create your own rules tailored for your environment, Elastic ships out-of-the-box prebuilt rules that you can install. If you installed {{elastic-defend}}, the Endpoint Security ({{elastic-defend}}) rule is automatically enabled after you install it.
8585

8686
:::{dropdown} Steps to install and enable prebuilt rules
8787
1. On the **Get Started** page, scroll down to the **Configure rules and alerts** section.

0 commit comments

Comments
 (0)