Skip to content

Commit 1f02e5d

Browse files
Removes main
1 parent 2da610c commit 1f02e5d

13 files changed

+35
-35
lines changed

docs/detections/add-exceptions.asciidoc

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -38,24 +38,24 @@ specific event in the sequence, update the rule's EQL statement. For example:
3838
+
3939
--
4040
* To add an exception from the rule details page:
41-
.. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the main navigation menu menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
41+
.. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
4242
.. Search for the rule that you want to add an exception to, then click its name to open the rule details.
4343
.. Scroll down the rule details page, select the *Rule exceptions* tab, then click *Add rule exception*.
4444
+
4545
[role="screenshot"]
4646
image::images/rule-exception-tab.png[Detail of rule exceptions tab]
4747

4848
* To add an exception from the Alerts table:
49-
.. Find **Alerts** in the main navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
49+
.. Find **Alerts** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
5050
.. Scroll down to the Alerts table, go to the alert you want to create an exception for, click the *More Actions* menu (*...*), then select *Add rule exception*.
5151

5252
* To add an exception from the alert details flyout:
53-
.. Find **Alerts** in the main navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
53+
.. Find **Alerts** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
5454
.. Click the *View details* button from the Alerts table.
5555
.. In the alert details flyout, click *Take action -> Add rule exception*.
5656

5757
* To add an exception from the Shared Exception Lists page:
58-
.. Go to the *Shared exception lists* page. Find **Detection rules (SIEM)** in the main navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then go to *Shared exception lists*.
58+
.. Find the **Shared exception lists** page in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
5959
.. Click *Create shared exception list* -> *Create exception item*.
6060
--
6161

@@ -157,17 +157,17 @@ Additionally, to add an Endpoint exception to the Endpoint Security rule, there
157157
--
158158

159159
* To add an Endpoint exception from the rule details page:
160-
.. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the main navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
160+
.. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
161161
.. Search for and select the Elastic *Endpoint Security* rule.
162162
.. Scroll down the rule details page, select the *Endpoint exceptions* tab, then click *Add endpoint exception*.
163163

164164
* To add an Endpoint exception from the Alerts table:
165-
.. Find **Alerts** in the main navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
165+
.. Find **Alerts** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
166166
.. Scroll down to the Alerts table, and from an {elastic-endpoint}
167167
alert, click the *More actions* menu (*...*), then select *Add Endpoint exception*.
168168

169169
* To add an Endpoint exception from Shared Exception Lists page:
170-
.. Go to the *Shared exception lists* page. Find **Detection rules (SIEM)** in the main navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then go to *Shared exception lists*.
170+
.. Find the *Shared exception lists* page in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
171171
.. Expand the Endpoint Security Exception List or click the list name to open the list's details page. Next, click *Add endpoint exception*.
172172
+
173173
NOTE: The Endpoint Security Exception List is automatically created. By default, it's associated with the Endpoint Security rule and any rules with the <<rule-ui-advanced-params, *{elastic-endpoint} exceptions*>> option selected.
@@ -267,7 +267,7 @@ image::images/nested-exp.png[]
267267

268268
To view a rule's exceptions:
269269

270-
. Open the rule's details page. To do this, find **Detection rules (SIEM)** in the main navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], search for the rule that you want to examine, then click the rule's name to open its details.
270+
. Open the rule's details page. To do this, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], search for the rule that you want to examine, then click the rule's name to open its details.
271271
. Scroll down and select the *Rule exceptions* or *Endpoint exceptions* tab. All exceptions that belong to the rule will display in a list.
272272
+
273273
From the list, you can filter, edit, and delete exceptions. You can also toggle between *Active exceptions* and *Expired exceptions*.

docs/detections/building-block-rule.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ image::images/alert-indices-ui.png[]
2525
By default, building block alerts are excluded from the Overview and Alerts pages.
2626
You can choose to include building block alerts on the Alerts page, which expands the number of alerts.
2727

28-
. Find **Alerts** in the main navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
28+
. Find **Alerts** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
2929
. In the Alerts table, select *Additional filters* ->
3030
*Include building block alerts*, located on the far-right.
3131

docs/detections/prebuilt-rules-management.asciidoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Follow these guidelines to start using the {security-app}'s <<prebuilt-rules, pr
2727
[[load-prebuilt-rules]]
2828
=== Install and enable Elastic prebuilt rules
2929

30-
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the main navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
30+
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
3131
+
3232
The badge next to *Add Elastic rules* shows the number of prebuilt rules available for installation.
3333
+
@@ -83,7 +83,7 @@ Each prebuilt rule includes several tags identifying the rule's purpose, detecti
8383
[[select-all-prebuilt-rules]]
8484
=== Select and duplicate all prebuilt rules
8585

86-
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the main navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
86+
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
8787
. From the *Rules* page, select the *Elastic rules* filter.
8888
. Click *Select all _x_ rules* above the rules table.
8989
. Click *Bulk actions* -> *Duplicate*.
@@ -97,7 +97,7 @@ You can then modify the duplicated rules and, if required, delete the prebuilt o
9797

9898
Elastic regularly updates prebuilt rules to optimize their performance and ensure they detect the latest threats and techniques. When updated versions are available for your installed prebuilt rules, the *Rule Updates* tab appears on the *Rules* page, allowing you to update your installed rules with the latest versions.
9999

100-
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the main navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
100+
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
101101
. From the *Rules* page, select the *Rule Updates* tab.
102102
+
103103
NOTE: The *Rule Updates* tab doesn't appear if all your installed prebuilt rules are up to date.

docs/detections/prebuilt-rules/tune-rule-signals.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ add an exception for the required application.
3535
For example, to prevent the <<unusual-process-execution-path-alternate-data-stream>> rule from
3636
producing alerts for an in-house application named `myautomatedbuild`:
3737

38-
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the main navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
38+
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
3939
. Search for and then click on the *Unusual Process Execution Path - Alternate Data Stream* rule.
4040
+
4141
The *Unusual Process Execution Path - Alternate Data Stream* rule details page is displayed.

docs/detections/rules-coverage.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ The **MITRE ATT&CK® coverage** page shows which https://attack.mitre.org[MITRE
1010

1111
Mirroring the MITRE ATT&CK® framework, columns represent major tactics, and cells within each column represent a tactic's related techniques. Cells are darker when a technique has more rules matching the current filters, as indicated in the **Legend** at the top.
1212

13-
To access the **MITRE ATT&CK® coverage** page, find **Detection rules (SIEM)** in the main navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then go to **MITRE ATT&CK® coverage**.
13+
To access the **MITRE ATT&CK® coverage** page, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then go to **MITRE ATT&CK® coverage**.
1414

1515
[NOTE]
1616
====

docs/detections/rules-cross-cluster-search.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ To update a rule's API key, log into the local cluster as a user with the privil
6666

6767
* Edit and save the rule.
6868
* Update the rule's API key manually:
69-
. Find **Stack Management** in the main navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then go to
69+
. Find **Stack Management** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then go to
7070
*Rules*.
7171
. Use the search box and filters to find the rules you want to update. For example, use the *Type* filter to find rules under the *Security* category.
7272
. Select the rule's actions menu (*...*), then *Update API key*.

docs/detections/rules-ui-create.asciidoc

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ To create or edit {ml} rules, you must have the https://www.elastic.co/subscript
4242
{ess-trial}[cloud deployment]. Additionally, you must have the {ref}/built-in-roles.html[`machine_learning_admin`] user
4343
role, and the selected {ml} job must be running for the rule to function correctly.
4444
==============
45-
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the main navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
45+
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
4646
. To create a rule based on a {ml} anomaly threshold, select *Machine Learning* on the *Create new rule*, then select:
4747
.. The required {ml} jobs.
4848
+
@@ -67,7 +67,7 @@ in the step or its sub-steps, apply the change to the other rule types, too.
6767
[discrete]
6868
[[create-custom-rule]]
6969
=== Create a custom query rule
70-
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the main navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
70+
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
7171
. To create a rule based on a KQL or Lucene query, select *Custom query* on the *Create new rule* page, then:
7272
.. Define which {es} indices or data view the rule searches for alerts.
7373
.. Use the filter and query fields to create the criteria used for detecting
@@ -117,7 +117,7 @@ in these steps or sub-steps, apply the change to the other rule types, too.
117117
[discrete]
118118
[[create-threshold-rule]]
119119
=== Create a threshold rule
120-
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the main navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
120+
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
121121
. To create a rule based on a source event field threshold, select *Threshold* on the *Create new rule* page, then:
122122
.. Define which {es} indices the rule analyzes for alerts.
123123
.. Use the filter and query fields to create the criteria used for detecting
@@ -157,7 +157,7 @@ in these steps or sub-steps, apply the change to the other rule types, too.
157157
[discrete]
158158
[[create-eql-rule]]
159159
=== Create an event correlation rule
160-
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the main navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
160+
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
161161
. To create an event correlation rule using EQL, select *Event Correlation* on the *Create new rule* page, then:
162162
. To create an event correlation rule using EQL, select *Event Correlation*, then:
163163
.. Define which {es} indices or data view the rule searches when querying for events.
@@ -224,7 +224,7 @@ in these steps or sub-steps, apply the change to the other rule types, too.
224224

225225
NOTE: {elastic-sec} provides limited support for indicator match rules. See <<support-indicator-rules>> for more information.
226226

227-
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the main navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
227+
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
228228
. To create a rule that searches for events whose specified field value matches the specified indicator field value in the indicator index patterns, select *Indicator Match* on the *Create new rule* page, then fill in the following fields:
229229
.. *Source*: The individual index patterns or data view that specifies what data to search.
230230
.. *Custom query*: The query and filters used to retrieve the required results from
@@ -311,7 +311,7 @@ image::images/indicator_value_list.png[]
311311
[[create-new-terms-rule]]
312312
=== Create a new terms rule
313313

314-
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the main navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
314+
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
315315
. To create a rule that searches for each new term detected in source documents, select *New Terms* on the *Create new rule* page, then:
316316
.. Specify what data to search by entering individual {es} index patterns or selecting an existing data view.
317317
.. Use the filter and query fields to create the criteria used for detecting
@@ -351,7 +351,7 @@ Use {ref}/esql.html[{esql}] to query your source events and aggregate event data
351351

352352
To create an {esql} rule:
353353

354-
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the main navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
354+
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
355355
. Select **{esql}**, then write a query.
356356
+
357357
NOTE: Refer to the sections below to learn more about <<esql-rule-query-types,{esql} query types>>, <<esql-query-design,query design considerations>>, and <<esql-rule-limitations,rule limitations>>.

0 commit comments

Comments
 (0)