Skip to content

Commit 8bea709

Browse files
[Security] [Serverless: Sep 30]Analyzer support for MDE (#3194)
Resolves #2308. Documents visual event analyzer support for Microsoft Defender for Endpoint and support for `event.kind: "alert"` events from third-party integrations. Preview: [Visual event analyzer](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/3194/solutions/security/investigate/visual-event-analyzer)
1 parent b481231 commit 8bea709

File tree

1 file changed

+14
-3
lines changed

1 file changed

+14
-3
lines changed

solutions/security/investigate/visual-event-analyzer.md

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ products:
1313

1414
# Visual event analyzer [security-visual-event-analyzer]
1515

16-
{{elastic-sec}} allows any event detected by {{elastic-endpoint}} to be analyzed using a process-based visual analyzer, which shows a graphical timeline of processes that led up to the alert and the events that occurred immediately after. Examining events in the visual event analyzer is useful to determine the origin of potentially malicious activity and other areas in your environment that may be compromised. It also enables security analysts to drill down into all related hosts, processes, and other events to aid in their investigations.
16+
{{elastic-sec}} allows any event detected by {{elastic-endpoint}} or supported third-party integrations to be analyzed using a process-based visual analyzer, which shows a graphical timeline of processes that led up to the alert and the events that occurred immediately after. Examining events in the visual event analyzer is useful to determine the origin of potentially malicious activity and other areas in your environment that may be compromised. It also enables security analysts to drill down into all related hosts, processes, and other events to aid in their investigations.
1717

1818
::::{tip}
1919
If you’re experiencing performance degradation, you can [exclude cold and frozen tier data](/solutions/security/get-started/configure-advanced-settings.md#exclude-cold-frozen-tiers) from analyzer queries. This setting is only available for the {{stack}}.
@@ -27,15 +27,20 @@ You can visualize events from the following sources:
2727

2828
* {{elastic-defend}} integration
2929
* Sysmon data collected through {{winlogbeat}}
30-
* [CrowdStrike integration](integration-docs://reference/crowdstrike.md) (Falcon logs collected through Event Stream or FDR)
31-
* [SentinelOne Cloud Funnel integration](integration-docs://reference/sentinel_one_cloud_funnel.md)
30+
* Third-party integrations:
31+
* [CrowdStrike](integration-docs://reference/crowdstrike.md) (Falcon logs collected through Event Stream or FDR)
32+
* [SentinelOne Cloud Funnel](integration-docs://reference/sentinel_one_cloud_funnel.md)
33+
* {applies_to}`stack: ga 9.2` [Microsoft Defender for Endpoint](integration-docs://reference/microsoft_defender_endpoint.md)
3234

3335
In KQL, this translates to any event with the `agent.type` set to:
3436

3537
* `endpoint`
3638
* `winlogbeat` with `event.module` set to `sysmon`
3739
* `filebeat` with `event.module` set to `crowdstrike`
3840
* `filebeat` with `event.module` set to `sentinel_one_cloud_funnel`
41+
* {applies_to}`stack: ga 9.2` `filebeat` with `event.module` set to `microsoft_defender_endpoint`
42+
43+
{applies_to}`stack: ga 9.2` The visual analyzer also supports analyzing `event.kind: "alert"` events from third-party integrations. To view these events, your role must have `read` privileges for the `alerts-security.alerts-*` indices.
3944

4045
To find events that can be visually analyzed:
4146

@@ -50,6 +55,12 @@ To find events that can be visually analyzed:
5055
* `agent.type:"winlogbeat" and event.module: "sysmon" and process.entity_id : *`
5156
* `agent.type:"filebeat" and event.module: "crowdstrike" and process.entity_id : *`
5257
* `agent.type:"filebeat" and event.module: "sentinel_one_cloud_funnel" and process.entity_id : *`
58+
* {applies_to}`stack: ga 9.2` `agent.type:"filebeat" and event.module: "microsoft_defender_endpoint" and process.entity_id : *`
59+
60+
::::{note}
61+
{applies_to}`stack: ga 9.2` To specifically filter for alert-kind events from third-party integrations, add `event.kind:"alert"`. For example:
62+
`agent.type:"filebeat" and event.module:"microsoft_defender_endpoint" and event.kind:"alert" and process.entity_id:*`
63+
::::
5364

5465
3. Events that can be visually analyzed are denoted by a cubical **Analyze event** icon. Select this option to open the event in the visual analyzer. The event analyzer is accessible from the **Hosts**, **Alerts**, and **Timelines** pages, as well as the alert details flyout.
5566

0 commit comments

Comments
 (0)