Skip to content

Commit a0ef068

Browse files
First draft
1 parent 58e9685 commit a0ef068

File tree

3 files changed

+13
-110
lines changed

3 files changed

+13
-110
lines changed

raw-migrated-files/docs-content/serverless/security-detection-engine-overview.md

Lines changed: 0 additions & 87 deletions
This file was deleted.

raw-migrated-files/toc.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,6 @@ toc:
104104
- file: docs-content/serverless/project-settings-alerts.md
105105
- file: docs-content/serverless/project-settings-content.md
106106
- file: docs-content/serverless/security-automatic-import.md
107-
- file: docs-content/serverless/security-detection-engine-overview.md
108107
- file: docs-content/serverless/security-vuln-management-faq.md
109108
- file: docs-content/serverless/what-is-observability-serverless.md
110109
- file: elasticsearch-hadoop/elasticsearch-hadoop/index.md

solutions/security/detect-and-alert.md

Lines changed: 13 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -8,22 +8,7 @@ applies_to:
88
security: all
99
---
1010

11-
# Detections and alerts
12-
13-
% What needs to be done: Align serverless/stateful
14-
15-
% Use migrated content from existing pages that map to this page:
16-
17-
% - [x] ./raw-migrated-files/security-docs/security/detection-engine-overview.md
18-
% - [ ] ./raw-migrated-files/docs-content/serverless/security-detection-engine-overview.md
19-
20-
% Internal links rely on the following IDs being on this page (e.g. as a heading ID, paragraph ID, etc):
21-
22-
$$$support-indicator-rules$$$
23-
24-
$$$detections-permissions$$$
25-
26-
$$$machine-learning-model$$$
11+
# Detections and alerts [security-detection-engine-overview]
2712

2813
Use the detection engine to create and manage rules and view the alerts these rules create. Rules periodically search indices (such as `logs-*` and `filebeat-*`) for suspicious source events and create alerts when a rule’s conditions are met. When an alert is created, its status is `Open`. To help track investigations, an alert’s [status](/solutions/security/detect-and-alert/manage-detection-alerts.md#detection-alert-status) can be set as `Open`, `Acknowledged`, or `Closed`.
2914

@@ -32,7 +17,7 @@ Use the detection engine to create and manage rules and view the alerts these ru
3217
:screenshot:
3318
:::
3419

35-
In addition to creating [your own rules](/solutions/security/detect-and-alert/create-detection-rule.md), enable [Elastic prebuilt rules](/solutions/security/detect-and-alert/install-manage-elastic-prebuilt-rules.md#load-prebuilt-rules) to immediately start detecting suspicious activity. For detailed information on all the prebuilt rules, see the [*Prebuilt rule reference*](security-docs://reference/prebuilt-rules/index.md) section. Once the prebuilt rules are loaded and running, [*Tune detection rules*](/solutions/security/detect-and-alert/tune-detection-rules.md) and [Add and manage exceptions](/solutions/security/detect-and-alert/add-manage-exceptions.md) explain how to modify the rules to reduce false positives and get a better set of actionable alerts. You can also use exceptions and value lists when creating or modifying your own rules.
20+
In addition to creating [your own rules](/solutions/security/detect-and-alert/create-detection-rule.md), enable [Elastic prebuilt rules](/solutions/security/detect-and-alert/install-manage-elastic-prebuilt-rules.md#load-prebuilt-rules) to immediately start detecting suspicious activity. For detailed information on all the prebuilt rules, see the [Prebuilt rule reference](security-docs://reference/prebuilt-rules/index.md) section. Once the prebuilt rules are loaded and running, [Tune detection rules](/solutions/security/detect-and-alert/tune-detection-rules.md) and [Add and manage exceptions](/solutions/security/detect-and-alert/add-manage-exceptions.md) explain how to modify the rules to reduce false positives and get a better set of actionable alerts. You can also use exceptions and value lists when creating or modifying your own rules.
3621

3722
There are several special prebuilt rules you need to know about:
3823

@@ -42,23 +27,27 @@ There are several special prebuilt rules you need to know about:
4227
If you want to receive notifications via external systems, such as Slack or email, when alerts are created, use the {{kib}} [Alerting and Actions](/explore-analyze/alerts-cases.md) framework.
4328

4429
::::{note}
45-
To use {{kib}} Alerting for detection alert notifications, you need the [appropriate license](https://www.elastic.co/subscriptions).
30+
To use {{kib}} Alerting for detection alert notifications in the {{stack}}, you need the [appropriate license](https://www.elastic.co/subscriptions).
4631
::::
4732

4833

49-
After rules have started running, you can monitor their executions to verify they are functioning correctly, as well as view, manage, and troubleshoot alerts (see [*Manage detection alerts*](/solutions/security/detect-and-alert/manage-detection-alerts.md) and [*Monitor and troubleshoot rule executions*](/troubleshoot/security/detection-rules.md)).
34+
After rules have started running, you can monitor their executions to verify they are functioning correctly, as well as view, manage, and troubleshoot alerts (see [Manage detection alerts](/solutions/security/detect-and-alert/manage-detection-alerts.md) and [Monitor and troubleshoot rule executions](/troubleshoot/security/detection-rules.md)).
5035

5136
You can create and manage rules and alerts via the UI or the [Detections API](https://www.elastic.co/docs/api/doc/kibana/group/endpoint-security-detections-api).
5237

5338
::::{important}
54-
To make sure you can access Detections and manage rules, see [*Detections requirements*](/solutions/security/detect-and-alert/detections-requirements.md).
39+
To make sure you can access Detections and manage rules, see [Detections requirements](/solutions/security/detect-and-alert/detections-requirements.md).
5540

5641
::::
5742

5843

5944

6045
## Compatibility with cold and frozen tier nodes [cold-tier-detections]
6146

47+
```yaml {applies_to}
48+
stack:
49+
```
50+
6251
Cold and frozen [data tiers](/manage-data/lifecycle/data-tiers.md) hold time series data that is only accessed occasionally. In {{stack}} version >=7.11.0, {{elastic-sec}} supports cold but not frozen tier data for the following {{es}} indices:
6352
6453
* Index patterns specified in `securitySolution:defaultIndex`
@@ -85,7 +74,7 @@ In addition, the following support restrictions are in place:
8574

8675
## Detections configuration and index privilege prerequisites [detections-permissions]
8776

88-
[*Detections requirements*](/solutions/security/detect-and-alert/detections-requirements.md) provides detailed information on all the permissions required to initiate and use the Detections feature.
77+
[Detections requirements](/solutions/security/detect-and-alert/detections-requirements.md) provides detailed information on all the permissions required to initiate and use the Detections feature.
8978

9079

9180
## Malware prevention [malware-prevention]
@@ -115,6 +104,8 @@ Behavioral ransomware prevention on the Elastic Endpoint detects and stops ranso
115104

116105
For information on how to enable ransomware protection on your host, see [Ransomware protection](/solutions/security/configure-elastic-defend/configure-an-integration-policy-for-elastic-defend.md#ransomware-protection).
117106

107+
% Check on this note
108+
118109
::::{note}
119110
Ransomware prevention is a paid feature and is enabled by default if you have a [Platinum or Enterprise license](https://www.elastic.co/pricing).
120111
::::
@@ -145,5 +136,5 @@ Depending on your privileges and whether detection system indices have already b
145136

146137
## Using logsdb index mode [detections-logsdb-index-mode]
147138

148-
To learn how your rules and alerts are affected by using the [logsdb index mode](/manage-data/data-store/data-streams/logs-data-stream.md), refer to [*Using logsdb index mode with {{elastic-sec}}*](/solutions/security/detect-and-alert/using-logsdb-index-mode-with-elastic-security.md).
139+
To learn how your rules and alerts are affected by using the [logsdb index mode](/manage-data/data-store/data-streams/logs-data-stream.md), refer to [Using logsdb index mode with {{elastic-sec}}](/solutions/security/detect-and-alert/using-logsdb-index-mode-with-elastic-security.md).
149140

0 commit comments

Comments
 (0)