Skip to content

Commit 79c5552

Browse files
committed
Cleans up AI for security section
1 parent fee5741 commit 79c5552

File tree

3 files changed

+14
-155
lines changed

3 files changed

+14
-155
lines changed

raw-migrated-files/docs-content/serverless/attack-discovery.md

Lines changed: 0 additions & 105 deletions
This file was deleted.

raw-migrated-files/docs-content/serverless/security-ai-for-security.md

Lines changed: 0 additions & 8 deletions
This file was deleted.

solutions/security/ai/attack-discovery.md

Lines changed: 14 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -6,43 +6,15 @@ mapped_urls:
66

77
# Attack Discovery
88

9-
% What needs to be done: Lift-and-shift
10-
11-
% Use migrated content from existing pages that map to this page:
12-
13-
% - [x] ./raw-migrated-files/security-docs/security/attack-discovery.md
14-
% - [ ] ./raw-migrated-files/docs-content/serverless/attack-discovery.md
15-
16-
% Internal links rely on the following IDs being on this page (e.g. as a heading ID, paragraph ID, etc):
17-
18-
$$$attack-discovery-generate-discoveries$$$
19-
20-
$$$attack-discovery-what-info$$$
21-
22-
$$$attack-discovery-workflows$$$
23-
249
::::{warning}
2510
This feature is in technical preview. It may change in the future, and you should exercise caution when using it in production environments. Elastic will work to fix any issues, but features in technical preview are not subject to the support SLA of GA features.
2611
::::
2712

28-
2913
Attack Discovery leverages large language models (LLMs) to analyze alerts in your environment and identify threats. Each "discovery" represents a potential attack and describes relationships among multiple alerts to tell you which users and hosts are involved, how alerts correspond to the MITRE ATT&CK matrix, and which threat actor might be responsible. This can help make the most of each security analyst’s time, fight alert fatigue, and reduce your mean time to respond.
3014

31-
For a demo, refer to the following video.
32-
33-
::::{admonition}
34-
<script type="text/javascript" async src="https://play.vidyard.com/embed/v4.js"></script>
35-
<img
36-
style="width: 100%; margin: auto; display: block;"
37-
class="vidyard-player-embed"
38-
src="https://play.vidyard.com/eT92arEbpRddmSM4JeyzdX.jpg"
39-
data-uuid="eT92arEbpRddmSM4JeyzdX"
40-
data-v="4"
41-
data-type="inline"
42-
/>
43-
</br>
44-
::::
15+
For a demo, refer to the following video (click to view).
4516

17+
[![Attack Discovery video](https://play.vidyard.com/eT92arEbpRddmSM4JeyzdX.jpg)](https://videos.elastic.co/watch/eT92arEbpRddmSM4JeyzdX?)
4618

4719
This page describes:
4820

@@ -55,34 +27,34 @@ This page describes:
5527

5628
The `Attack Discovery: All` privilege allows you to use Attack Discovery.
5729

58-
:::{image} ../../../images/security-attck-disc-rbac.png
59-
:alt: Attack Discovery's RBAC settings
60-
:::
30+
![attack-discovery-rbac](../../../images/security-attck-disc-rbac.png)
31+
32+
6133

6234

6335
## Generate discoveries [attack-discovery-generate-discoveries]
6436

65-
When you access Attack Discovery for the first time, you’ll need to select an LLM connector before you can analyze alerts. Attack Discovery uses the same LLM connectors as [*AI Assistant*](/solutions/security/ai/ai-assistant.md). To get started:
37+
When you access Attack Discovery for the first time, you’ll need to select an LLM connector before you can analyze alerts. Attack Discovery uses the same LLM connectors as [AI Assistant](/solutions/security/ai/ai-assistant.md). To get started:
6638

6739
1. Click the **Attack Discovery** page from {{elastic-sec}}'s navigation menu.
6840
2. Select an existing connector from the dropdown menu, or add a new one.
6941

70-
::::{admonition} Recommended models
71-
While Attack Discovery is compatible with many different models, refer to the [Large language model performance matrix](/solutions/security/ai/large-language-model-performance-matrix.md) to see which models perform best.
42+
:::{admonition} Recommended models
43+
While Attack Discovery is compatible with many different models, refer to the [Large language model performance matrix](/solutions/security/ai/large-language-model-performance-matrix.md) to see which models perform best.
7244

73-
::::
45+
:::
7446

7547

76-
:::{image} ../../../images/security-attck-disc-select-model-empty.png
77-
:alt: attck disc select model empty
78-
:::
48+
:::{image} ../../../images/security-attck-disc-select-model-empty.png
49+
:alt: attck disc select model empty
50+
:::
7951

8052
3. Once you’ve selected a connector, click **Generate** to start the analysis.
8153

8254
It may take from a few seconds up to several minutes to generate discoveries, depending on the number of alerts and the model you selected.
8355

8456
::::{important}
85-
By default, Attack Discovery analyzes up to 100 alerts within this timeframe, but you can expand this up to 500 by clicking the settings icon (![Settings icon](../../../images/security-icon-settings.png "")) next to the model selection menu and adjusting the **Alerts** slider. Note that sending more alerts than your chosen LLM can handle may result in an error.
57+
By default, Attack Discovery analyzes up to 100 alerts within this timeframe, but you can expand this up to 500 by clicking the settings icon (![Settings icon](../../../images/security-icon-settings.png "title= 70%")) next to the model selection menu and adjusting the **Alerts** slider. Note that sending more alerts than your chosen LLM can handle may result in an error.
8658
::::
8759

8860

@@ -116,7 +88,7 @@ Each discovery includes the following information describing the potential threa
11688
There are several ways you can incorporate discoveries into your {{elastic-sec}} workflows:
11789

11890
* Click an entity’s name to open the user or host details flyout and view more details that may be relevant to your investigation.
119-
* Hover over an entity’s name to either add the entity to Timeline (![Add to timeline icon](../../../images/security-icon-add-to-timeline.png "")) or copy its field name and value to the clipboard (![Copy to clipboard icon](../../../images/security-icon-copy.png "")).
91+
* Hover over an entity’s name to either add the entity to Timeline (![Add to timeline icon](../../../images/security-icon-add-to-timeline.png "title= 70%")) or copy its field name and value to the clipboard (![Copy to clipboard icon](../../../images/security-icon-copy.png "title= 70%")).
12092
* Click **Take action**, then select **Add to new case** or **Add to existing case** to add a discovery to a [case](/solutions/security/investigate/cases.md). This makes it easy to share the information with your team and other stakeholders.
12193
* Click **Investigate in timeline** to explore the discovery in [Timeline](/solutions/security/investigate/timeline.md).
12294
* Click **View in AI Assistant** to attach the discovery to a conversation with AI Assistant. You can then ask follow-up questions about the discovery or associated alerts.

0 commit comments

Comments
 (0)