You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: solutions/security/detect-and-alert/create-detection-rule.md
+75Lines changed: 75 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -120,6 +120,81 @@ Select a rule type below for detailed instructions:
120
120
***Never seen before** → New terms (e.g., "first time seeing this user/host combination")
121
121
***Complex analytics** → ES|QL (e.g., "aggregate and transform data beyond other query types")
122
122
123
+
## Create a custom query rule [create-custom-rule]
124
+
125
+
Refer to [Custom query rule documentation](/solutions/security/detect-and-alert/rule-types/custom-query.md) for complete instructions on creating custom query rules, including:
## Create a machine learning rule [create-ml-rule]
133
+
134
+
Refer to [Machine learning rule documentation](/solutions/security/detect-and-alert/rule-types/machine-learning.md) for complete instructions on creating machine learning rules, including:
135
+
136
+
* Requirements and prerequisites
137
+
* ML job startup considerations and resource requirements
138
+
* Baseline learning periods and production best practices
139
+
* Alert suppression with anomaly fields
140
+
141
+
## Create a threshold rule [create-threshold-rule]
142
+
143
+
Refer to [Threshold rule documentation](/solutions/security/detect-and-alert/rule-types/threshold.md) for complete instructions on creating threshold rules, including:
144
+
145
+
* Step-by-step configuration with Group by and Threshold fields
146
+
* Understanding cardinality limits and risk levels
147
+
* Testing cardinality before creating rules
148
+
* Circuit breaker error troubleshooting
149
+
* How threshold rule alerts differ from source documents
150
+
151
+
152
+
## Create an event correlation rule [create-eql-rule]
153
+
154
+
Refer to [Event correlation rule documentation](/solutions/security/detect-and-alert/rule-types/event-correlation.md) for complete instructions on creating event correlation rules, including:
## Create an indicator match rule [create-indicator-rule]
163
+
164
+
Refer to [Indicator match rule documentation](/solutions/security/detect-and-alert/rule-types/indicator-match.md) for complete instructions on creating indicator match rules, including:
165
+
166
+
* Step-by-step configuration with threat indicator mapping
167
+
* How to compare source events with threat intelligence feeds
168
+
* Using value lists as indicator match indices
169
+
* Performance considerations and best practices
170
+
171
+
::::{note}
172
+
{{elastic-sec}} provides [limited support](/solutions/security/detect-and-alert.md#support-indicator-rules) for indicator match rules.
173
+
::::
174
+
175
+
176
+
## Create a new terms rule [create-new-terms-rule]
177
+
178
+
Refer to [New terms rule documentation](/solutions/security/detect-and-alert/rule-types/new-terms.md) for complete instructions on creating new terms rules, including:
179
+
180
+
* Step-by-step configuration with field selection
181
+
* How to detect first-time occurrences
182
+
* Multi-field combination support (up to 3 fields)
183
+
* History window size configuration
184
+
* Important cardinality limits for field arrays
185
+
186
+
187
+
## Create an {{esql}} rule [create-esql-rule]
188
+
189
+
Refer to [ES|QL rule documentation](/solutions/security/detect-and-alert/rule-types/esql.md) for complete instructions on creating ES|QL rules, including:
0 commit comments