-
Notifications
You must be signed in to change notification settings - Fork 181
[ON week] AI-feedback updates to Security AI docs #3935
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 1 commit
2382ebb
fabef51
4bfc809
892a555
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -45,7 +45,6 @@ Once you have chosen an alert to investigate: | |
|
|
||
| 5. (Optional) Ask AI Assistant follow-up questions, provide additional information for further analysis, and request clarification. The response is not a static report. | ||
|
|
||
|
|
||
| ## Generate triage reports [ai-triage-reportgen] | ||
|
|
||
| Elastic AI Assistant can streamline the documentation and report generation process by providing clear records of security incidents, their scope and impact, and your remediation efforts. You can use AI Assistant to create summaries or reports for stakeholders that include key event details, findings, and diagrams. Once AI Assistant has finished analyzing one or more alerts, you can generate reports by using prompts such as: | ||
|
|
@@ -60,3 +59,43 @@ After you review the report, click **Add to existing case** at the top of AI Ass | |
| :alt: An AI Assistant dialogue with the add to existing case button highlighted | ||
| :screenshot: | ||
| ::: | ||
|
|
||
|
|
||
| ## Example alert triage workflow | ||
|
|
||
| This section shows an example workflow for triaging a specific alert. | ||
|
|
||
| **Scenario:** You are investigating an alert: "Multiple Failed Logins Followed by Success - user: jsmith" | ||
|
|
||
| **Step 1: Open Alert and Generate Initial Analysis** | ||
| 1. From the **Alerts** table, click **View details**. | ||
| 2. Click **Chat** to open AI Assistant. The alert information is automatically attached. | ||
| 3. Click the **Alert summarization** quick prompt. AI Assistant shared an initial alert assessment. | ||
|
|
||
| **Step 2: Assess Criticality and Context** | ||
| Ask AI Assistant: | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Do users need to ask the assistant the following questions in any particular order? Also, do they need to ask all of these questions or just some?
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. No particular order, just examples of what users might consider asking to get more info. |
||
| - "Is user jsmith typically logging in from [this IP/location]?" | ||
| - "Are there other suspicious activities from this user in the last 24 hours?" | ||
| - "What's the risk score for the source IP?" | ||
|
|
||
| **Step 3: Investigate Related Activity** | ||
| If AI Assistant flags concerns, investigate further. Ask AI Assistant to: | ||
| - "Generate an {{esql}} query to find all recent activity from user jsmith". | ||
| - "Generate an {{esql}} query to find other users logging in from this IP". | ||
|
|
||
| **Step 4: Make a Determination** | ||
| Based on your initial AI-assisted analysis, determine whether you're dealing with a potential threat: | ||
|
|
||
| - **False Positive**: User was traveling, this is expected behavior. | ||
| - Immediate action: Add note to alert, close as false positive. | ||
| - Future action: Add a rule exception to prevent similar alerts. | ||
|
|
||
| - **True Positive**: Behavior indicates a potential attack. | ||
| In response to a potential credential compromise, immediately: | ||
| - Escalate according to your organization's incident response plan. | ||
| - Create a case to track the investigation. | ||
|
|
||
| **Step 5: Document Your Findings** | ||
| 1. From AI Assistant, click **Add to case** on key messages. | ||
| 2. Go to **Cases**, add your case notes. | ||
| 3. Update alert status. | ||
benironside marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This might be a good place to use the stepper component: https://elastic.github.io/docs-builder/syntax/stepper/