Skip to content

Commit a9828fc

Browse files
Cleans the "Detections and alerts" page (#789)
Addresses part of #559 by doing the following: - Removes raw migrated Serverless files that are no longer being used - Adds anchors where missing - Makes minor inline adjustments to the files that were labeled where appropriate Preview: [Detections and alerts](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/789/solutions/security/detect-and-alert)
1 parent 8110e63 commit a9828fc

File tree

4 files changed

+11
-110
lines changed

4 files changed

+11
-110
lines changed

raw-migrated-files/docs-content/serverless/security-detection-engine-overview.md

Lines changed: 0 additions & 87 deletions
This file was deleted.

raw-migrated-files/toc.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,6 @@ toc:
9191
- file: docs-content/serverless/project-setting-data.md
9292
- file: docs-content/serverless/project-settings-alerts.md
9393
- file: docs-content/serverless/project-settings-content.md
94-
- file: docs-content/serverless/security-detection-engine-overview.md
9594
- file: docs-content/serverless/what-is-observability-serverless.md
9695
- file: elasticsearch-hadoop/elasticsearch-hadoop/index.md
9796
children:

solutions/security/configure-elastic-defend/configure-an-integration-policy-for-elastic-defend.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ To configure an integration policy:
5858

5959
## Malware protection [malware-protection]
6060

61-
{{elastic-defend}} malware prevention detects and stops malicious attacks by using a [machine learning model](/solutions/security/detect-and-alert.md#machine-learning-model) that looks for static attributes to determine if a file is malicious or benign.
61+
{{elastic-defend}} malware prevention detects and stops malicious attacks by using a machine learning model that looks for static attributes to determine if a file is malicious or benign.
6262

6363
By default, malware protection is enabled on Windows, macOS, and Linux hosts. To disable malware protection, turn off the **Malware protections** toggle.
6464

solutions/security/detect-and-alert.md

Lines changed: 10 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -8,22 +8,7 @@ applies_to:
88
security: all
99
---
1010

11-
# Detections and alerts
12-
13-
% What needs to be done: Align serverless/stateful
14-
15-
% Use migrated content from existing pages that map to this page:
16-
17-
% - [x] ./raw-migrated-files/security-docs/security/detection-engine-overview.md
18-
% - [ ] ./raw-migrated-files/docs-content/serverless/security-detection-engine-overview.md
19-
20-
% Internal links rely on the following IDs being on this page (e.g. as a heading ID, paragraph ID, etc):
21-
22-
$$$support-indicator-rules$$$
23-
24-
$$$detections-permissions$$$
25-
26-
$$$machine-learning-model$$$
11+
# Detections and alerts [security-detection-engine-overview]
2712

2813
Use the detection engine to create and manage rules and view the alerts these rules create. Rules periodically search indices (such as `logs-*` and `filebeat-*`) for suspicious source events and create alerts when a rule’s conditions are met. When an alert is created, its status is `Open`. To help track investigations, an alert’s [status](/solutions/security/detect-and-alert/manage-detection-alerts.md#detection-alert-status) can be set as `Open`, `Acknowledged`, or `Closed`.
2914

@@ -32,7 +17,7 @@ Use the detection engine to create and manage rules and view the alerts these ru
3217
:screenshot:
3318
:::
3419

35-
In addition to creating [your own rules](/solutions/security/detect-and-alert/create-detection-rule.md), enable [Elastic prebuilt rules](/solutions/security/detect-and-alert/install-manage-elastic-prebuilt-rules.md#load-prebuilt-rules) to immediately start detecting suspicious activity. For detailed information on all the prebuilt rules, see the [*Prebuilt rule reference*](security-docs://reference/prebuilt-rules/index.md) section. Once the prebuilt rules are loaded and running, [*Tune detection rules*](/solutions/security/detect-and-alert/tune-detection-rules.md) and [Add and manage exceptions](/solutions/security/detect-and-alert/add-manage-exceptions.md) explain how to modify the rules to reduce false positives and get a better set of actionable alerts. You can also use exceptions and value lists when creating or modifying your own rules.
20+
In addition to creating [your own rules](/solutions/security/detect-and-alert/create-detection-rule.md), enable [Elastic prebuilt rules](/solutions/security/detect-and-alert/install-manage-elastic-prebuilt-rules.md#load-prebuilt-rules) to immediately start detecting suspicious activity. For detailed information on all the prebuilt rules, see the [Prebuilt rule reference](security-docs://reference/prebuilt-rules/index.md) section. Once the prebuilt rules are loaded and running, [Tune detection rules](/solutions/security/detect-and-alert/tune-detection-rules.md) and [Add and manage exceptions](/solutions/security/detect-and-alert/add-manage-exceptions.md) explain how to modify the rules to reduce false positives and get a better set of actionable alerts. You can also use exceptions and value lists when creating or modifying your own rules.
3621

3722
There are several special prebuilt rules you need to know about:
3823

@@ -42,23 +27,27 @@ There are several special prebuilt rules you need to know about:
4227
If you want to receive notifications via external systems, such as Slack or email, when alerts are created, use the {{kib}} [Alerting and Actions](/explore-analyze/alerts-cases.md) framework.
4328

4429
::::{note}
45-
To use {{kib}} Alerting for detection alert notifications, you need the [appropriate license](https://www.elastic.co/subscriptions).
30+
To use {{kib}} Alerting for detection alert notifications in the {{stack}}, you need the [appropriate license](https://www.elastic.co/subscriptions).
4631
::::
4732

4833

49-
After rules have started running, you can monitor their executions to verify they are functioning correctly, as well as view, manage, and troubleshoot alerts (see [*Manage detection alerts*](/solutions/security/detect-and-alert/manage-detection-alerts.md) and [*Monitor and troubleshoot rule executions*](/troubleshoot/security/detection-rules.md)).
34+
After rules have started running, you can monitor their executions to verify they are functioning correctly, as well as view, manage, and troubleshoot alerts (see [Manage detection alerts](/solutions/security/detect-and-alert/manage-detection-alerts.md) and [Monitor and troubleshoot rule executions](/troubleshoot/security/detection-rules.md)).
5035

5136
You can create and manage rules and alerts via the UI or the [Detections API](https://www.elastic.co/docs/api/doc/kibana/group/endpoint-security-detections-api).
5237

5338
::::{important}
54-
To make sure you can access Detections and manage rules, see [*Detections requirements*](/solutions/security/detect-and-alert/detections-requirements.md).
39+
To make sure you can access Detections and manage rules, see [Detections requirements](/solutions/security/detect-and-alert/detections-requirements.md).
5540

5641
::::
5742

5843

5944

6045
## Compatibility with cold and frozen tier nodes [cold-tier-detections]
6146

47+
```yaml {applies_to}
48+
stack:
49+
```
50+
6251
Cold and frozen [data tiers](/manage-data/lifecycle/data-tiers.md) hold time series data that is only accessed occasionally. In {{stack}} version >=7.11.0, {{elastic-sec}} supports cold but not frozen tier data for the following {{es}} indices:
6352
6453
* Index patterns specified in `securitySolution:defaultIndex`
@@ -111,5 +100,5 @@ Depending on your privileges and whether detection system indices have already b
111100

112101
## Using logsdb index mode [detections-logsdb-index-mode]
113102

114-
To learn how your rules and alerts are affected by using the [logsdb index mode](/manage-data/data-store/data-streams/logs-data-stream.md), refer to [*Using logsdb index mode with {{elastic-sec}}*](/solutions/security/detect-and-alert/using-logsdb-index-mode-with-elastic-security.md).
103+
To learn how your rules and alerts are affected by using the [logsdb index mode](/manage-data/data-store/data-streams/logs-data-stream.md), refer to [Using logsdb index mode with {{elastic-sec}}](/solutions/security/detect-and-alert/using-logsdb-index-mode-with-elastic-security.md).
115104

0 commit comments

Comments
 (0)