Skip to content

Commit a2b37f7

Browse files
Adds the "Enable threat intelligence integrations" page (#405)
* first draft * More changes * Removes refs from raw migrated toc * Update solutions/security/get-started/enable-threat-intelligence-integrations.md * Update solutions/security/get-started/enable-threat-intelligence-integrations.md * Update solutions/security/get-started/enable-threat-intelligence-integrations.md * Update solutions/security/get-started/enable-threat-intelligence-integrations.md * Update solutions/security/get-started/enable-threat-intelligence-integrations.md * Update solutions/security/get-started/enable-threat-intelligence-integrations.md * Update solutions/security/get-started/enable-threat-intelligence-integrations.md * Update solutions/security/get-started/enable-threat-intelligence-integrations.md * Removes comments about anchors
1 parent 41a0055 commit a2b37f7

File tree

6 files changed

+68
-152
lines changed

6 files changed

+68
-152
lines changed

raw-migrated-files/docs-content/serverless/security-overview-dashboard.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ For more information about connecting to threat intelligence sources, visit [Ena
5858
::::
5959

6060

61-
:::{image} ../../../images/serverless--getting-started-threat-intelligence-view.png
61+
:::{image} ../../../images/getting-started-threat-intelligence-view.png
6262
:alt: Threat Intelligence view on the Overview dashboard
6363
:class: screenshot
6464
:::

raw-migrated-files/docs-content/serverless/security-threat-intelligence.md

Lines changed: 0 additions & 72 deletions
This file was deleted.

raw-migrated-files/security-docs/security/es-threat-intel-integrations.md

Lines changed: 0 additions & 68 deletions
This file was deleted.

raw-migrated-files/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -508,7 +508,6 @@ toc:
508508
- file: docs-content/serverless/security-shared-exception-lists.md
509509
- file: docs-content/serverless/security-signals-to-cases.md
510510
- file: docs-content/serverless/security-third-party-actions.md
511-
- file: docs-content/serverless/security-threat-intelligence.md
512511
- file: docs-content/serverless/security-timeline-templates-ui.md
513512
- file: docs-content/serverless/security-timelines-ui.md
514513
- file: docs-content/serverless/security-triage-alerts-with-elastic-ai-assistant.md
@@ -846,7 +845,6 @@ toc:
846845
- file: security-docs/security/environment-variable-capture.md
847846
- file: security-docs/security/ers-requirements.md
848847
- file: security-docs/security/es-overview.md
849-
- file: security-docs/security/es-threat-intel-integrations.md
850848
- file: security-docs/security/es-ui-overview.md
851849
- file: security-docs/security/esql-queries-assistant.md
852850
- file: security-docs/security/event-filters.md

solutions/security/get-started/enable-threat-intelligence-integrations.md

Lines changed: 67 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,19 +4,77 @@ mapped_urls:
44
- https://www.elastic.co/guide/en/serverless/current/security-threat-intelligence.html
55
---
66

7-
# Enable threat intelligence integrations
7+
# Enable threat intelligence integrations [security-enable-threat-intelligence-integrations]
88

9-
% What needs to be done: Lift-and-shift
9+
The Threat Intelligence view provides a streamlined way to collect threat intelligence data that you can use for threat detection and matching. Threat intelligence data consists of [threat indicators](../../../troubleshoot/security/indicators-of-compromise.md#ti-indicators) ingested from third-party threat intelligence sources.
1010

11-
% Use migrated content from existing pages that map to this page:
11+
Threat indicators describe potential threats, unusual behavior, or malicious activity on a network or in an environment. They are commonly used in indicator match rules to detect and match known threats. When an indicator match rule generates an alert, it includes information about the matched threat indicator.
1212

13-
% - [ ] ./raw-migrated-files/security-docs/security/es-threat-intel-integrations.md
14-
% - [ ] ./raw-migrated-files/docs-content/serverless/security-threat-intelligence.md
13+
::::{note}
14+
To learn more about alerts with threat intelligence, visit [View alert details](../detect-and-alert/view-detection-alert-details.md).
1515

16-
% Internal links rely on the following IDs being on this page (e.g. as a heading ID, paragraph ID, etc):
16+
::::
1717

18-
$$$agent-ti-integration$$$
1918

20-
$$$custom-ti-integration$$$
19+
You can connect to threat intelligence sources using an [{{agent}} integration](#agent-ti-integration), the [Threat Intel module](#ti-mod-integration), or a [custom integration](#custom-ti-integration).
2120

22-
$$$ti-mod-integration$$$
21+
:::{image} ../../../images/getting-started-threat-intelligence-view.png
22+
:alt: The Threat Intelligence view on the Overview dashboard
23+
:class: screenshot
24+
:::
25+
26+
There are a few scenarios when data won’t display in the Threat Intelligence view:
27+
28+
* If you’ve chosen a time range that doesn’t contain threat indicator event data, you are prompted to choose a different range. Use the date and time picker in the {{security-app}} to select a new range to analyze.
29+
* If the {{agent}} or {{filebeat}} agent hasn’t ingested Threat Intel module data yet, the threat indicator event counts won’t load. You can wait for data to be ingested or reach out to your administrator for help resolving this.
30+
31+
32+
## Add an {{agent}} integration [agent-ti-integration]
33+
34+
1. Install a [{{fleet}}-managed {{agent}}](https://www.elastic.co/guide/en/fleet/current/install-fleet-managed-elastic-agent.html) on the hosts you want to monitor.
35+
2. In the Threat Intelligence view, click **Enable sources** to view the Integrations page. Scroll down and select **Elastic Agent only** to filter by {{agent}} integrations.
36+
37+
::::{tip}
38+
If you know the name of {{agent}} integration you want to install, you can search for it directly. Alternatively, choose the **Threat Intelligence** category to display a list of available [threat intelligence integrations](https://docs.elastic.co/en/integrations/threat-intelligence-intro).
39+
40+
::::
41+
42+
3. Select an {{agent}} integration, then complete the installation steps.
43+
4. Return to the Threat Intelligence view on the Overview dashboard. If indicator data isn’t displaying, refresh the page or refer to these [troubleshooting steps](../../../troubleshoot/security/indicators-of-compromise.md#troubleshoot-indicators-page).
44+
45+
46+
## Add a {{filebeat}} Threat Intel module integration [ti-mod-integration]
47+
48+
% Substeps in step 2 will require inline versioning. Remember to update them when we have more guidance on handling line-level differences.
49+
50+
1. Set up the [{{filebeat}} agent](https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-installation-configuration.html) and enable the Threat Intel module.
51+
52+
::::{note}
53+
For more information about enabling available threat intelligence filesets, refer to [Threat Intel module](https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-module-threatintel.html).
54+
55+
::::
56+
57+
2. Update the `securitySolution:defaultThreatIndex` [advanced setting](configure-advanced-settings.md#update-threat-intel-indices) by adding the appropriate index pattern name after the default {{fleet}} threat intelligence index pattern (`logs-ti*`):
58+
59+
* If you’re *only* using {{filebeat}} version 8.x, add the appropriate {{filebeat}} threat intelligence index pattern. For example, `logs-ti*`, `filebeat-8*`.
60+
* If you’re using a previous version of Filebeat *and* a current one, differentiate between the threat intelligence indices by using unique index pattern names. For example, if you’re using {{filebeat}} version 7.0.0 and 8.0.0, update the setting to `logs-ti*`,`filebeat-7*`,`filebeat-8*`.
61+
62+
3. Return to the Threat Intelligence view on the Overview dashboard. Refresh the page if indicator data isn’t displaying.
63+
64+
65+
## Add a custom integration [custom-ti-integration]
66+
67+
1. Set up a way to [ingest data](ingest-data-to-elastic-security.md) into your system.
68+
2. Update the `securitySolution:defaultThreatIndex` [advanced setting](configure-advanced-settings.md#update-threat-intel-indices) by adding the appropriate index pattern name after the default {{fleet}} threat intelligence index pattern (`logs-ti*`), for example, `logs-ti*`,`custom-ti-index*`.
69+
70+
::::{note}
71+
Threat intelligence indices aren’t required to be ECS compatible. However, we strongly recommend compatibility if you’d like your alerts to be enriched with relevant threat indicator information. You can find a list of ECS-compliant threat intelligence fields at [Threat Fields](https://www.elastic.co/guide/en/ecs/{{ecs_version}}/ecs-threat.html).
72+
73+
::::
74+
75+
3. Return to the Threat Intelligence view on the Overview dashboard (**Dashboards****Overview**). Refresh the page if indicator data isn’t displaying.
76+
77+
::::{note}
78+
The Threat Intelligence view searches for a `threat.feed.name` field value to define the source name in the **Name** column. If a custom source doesn’t have the `threat.feed.name` field or hasn’t defined a `threat.feed.name` field value, it’s considered unnamed and labeled as **Other**. Dashboards aren’t created for unnamed sources unless the `threat.feed.dashboard_id` field is defined.
79+
80+
::::

0 commit comments

Comments
 (0)