Skip to content

Commit c7e29ac

Browse files
authored
Apply suggestions from code review
1 parent b1ebe09 commit c7e29ac

File tree

5 files changed

+7
-7
lines changed

5 files changed

+7
-7
lines changed

solutions/security/ai/attack-discovery.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,9 +24,9 @@ For a demo, refer to the following video (click to view).
2424

2525
You need the `Attack Discovery: All` privileges to use Attack Discovery.
2626

27-
{applies_to}`serverless: ` Your role must also have `Rules: All` privileges to use Attack Discovery.
27+
{applies_to}`serverless: ` You need the `Rules: All` privileges to use Attack Discovery.
2828

29-
![attack-discovery-rbac](/solutions/images/security-attck-disc-rbac.png)
29+
![attack-discovery-rbac](/solutions/images/security-attck-disc-rbac.png "=65%")
3030

3131
{applies_to}`stack: ga 9.1` Your role must also have the following privileges:
3232

solutions/security/dashboards/detection-rule-monitoring-dashboard.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ The Detection rule monitoring dashboard provides visualizations to help you moni
2424
To access this dashboard and its data, you must have:
2525

2626
* At least `Read` [{{kib}} privileges](/deploy-manage/users-roles/cluster-or-deployment-auth/kibana-role-management.md) for both the **Analytics > Dashboard** and **Security > Security** {{kib}} features.
27-
* {applies_to}`serverless: ` Your role must also have `Security > Rules: All` privilege.
27+
* {applies_to}`serverless: ` The `Security > Rules: All` privilege.
2828
* At least `read` [index privileges](/deploy-manage/users-roles/cluster-or-deployment-auth/kibana-role-management.md#adding_index_privileges) for the `.kibana-event-log-*` index.
2929

3030
::::

solutions/security/get-started/automatic-migration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,8 @@ For rule migrations, if comparable Elastic-authored rules exist, Automatic Migra
1717
You can ingest your data before migrating your assets, or migrate your assets first in which case the tool will recommend which data sources you need to power your migrated rules.
1818

1919
::::{admonition} Requirements
20-
* The `SIEM migrations: All` Security sub-feature privileges.
21-
* {applies_to}`serverless: ` Your role must also have `Rules: All` privilege.
20+
* The `SIEM migrations: All` Security sub-feature privilege.
21+
* {applies_to}`serverless: ` The `Rules: All` Security sub-feature privilege.
2222
* A working [LLM connector](/solutions/security/ai/set-up-connectors-for-large-language-models-llm.md).
2323
* {{stack}} users: an [Enterprise](https://www.elastic.co/pricing) subscription.
2424
* {{Stack}} users: {{ml}} must be enabled.

solutions/security/investigate/notes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Configure the `securitySolution:maxUnassociatedNotes` [advanced setting](/soluti
2121

2222
## Grant access to notes [notes-privileges]
2323

24-
You can control access to notes by setting the [{{kib}} privileges](../../../deploy-manage/users-roles/cluster-or-deployment-auth/kibana-privileges.md) for the **Notes** feature under **Security**. To view more details on SIEM requirements, see [Detections requirements](/solutions/security/detect-and-alert/detections-requirements.md).
24+
You can control access to notes by setting the [{{kib}} privileges](../../../deploy-manage/users-roles/cluster-or-deployment-auth/kibana-privileges.md) for the **Notes** feature under **Security**. For more details on SIEM requirements, refer to [Detections requirements](/solutions/security/detect-and-alert/detections-requirements.md).
2525

2626
## View and add notes to alerts and events [notes-alerts-events]
2727

solutions/security/investigate/timeline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ In addition to Timelines, you can create and attach Timeline templates to [detec
2727

2828
## Grant access to Timeline [timeline-privileges]
2929

30-
You can control access to Timeline by setting the [{{kib}} privileges](../../../deploy-manage/users-roles/cluster-or-deployment-auth/kibana-privileges.md) for the **Timeline** feature under **Security**. To view more details on SIEM requirements, see [Detections requirements](/solutions/security/detect-and-alert/detections-requirements.md).
30+
You can control access to Timeline by setting the [{{kib}} privileges](../../../deploy-manage/users-roles/cluster-or-deployment-auth/kibana-privileges.md) for the **Timeline** feature under **Security**. For more details on SIEM requirements, refer to [Detections requirements](/solutions/security/detect-and-alert/detections-requirements.md).
3131

3232
## Create new or open existing Timeline [open-create-timeline]
3333

0 commit comments

Comments
 (0)