Skip to content

Commit 4e22d66

Browse files
[8.16] [Request][8.16] Update nav references for all "Investigation tools" topics (backport #6000) (#6097)
* First draft * Fixed outdated instruction * More updates * Updates to cases * Last update * Updates instructions for cases * Update docs/osquery/invest-guide-run-osquery.asciidoc Co-authored-by: natasha-moore-elastic <[email protected]> * Update docs/osquery/invest-guide-run-osquery.asciidoc Co-authored-by: natasha-moore-elastic <[email protected]> * Nat's edit --------- Co-authored-by: natasha-moore-elastic <[email protected]> (cherry picked from commit e210b0d) Co-authored-by: Nastasha Solomon <[email protected]>
1 parent 829225d commit 4e22d66

File tree

8 files changed

+21
-18
lines changed

8 files changed

+21
-18
lines changed

docs/cases/cases-manage-settings.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
:frontmatter-tags-content-type: [how-to]
66
:frontmatter-tags-user-goals: [analyze]
77

8-
To change case closure options and add custom fields, templates, and connectors for external incident management systems, go to *Cases* -> *Settings*.
8+
To change case closure options and add custom fields, templates, and connectors for external incident management systems, find **Cases** in the navigation menu or search for `Security/Cases` by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then click **Settings**.
99

1010
[role="screenshot"]
1111
image::images/cases-settings.png[Shows the case settings page]

docs/cases/cases-manage.asciidoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ You can create and manage cases using the UI or the <<cases-api-overview>>.
1414
Open a new case to keep track of security issues and share their details with
1515
colleagues.
1616

17-
. Go to *Cases*, then click *Create case*. If no cases exist, the Cases table will be empty and you'll be prompted to create one by clicking the *Create case* button inside the table.
17+
. Find **Cases** in the navigation menu or search for `Security/Cases` by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then click *Create case*. If no cases exist, the Cases table will be empty and you'll be prompted to create one by clicking the *Create case* button inside the table.
1818

1919
. If you defined <<cases-templates,templates>>, you can optionally select one to use its default field values. preview:[]
2020

@@ -232,7 +232,7 @@ The following attachments are _not_ exported:
232232

233233
To export a case:
234234

235-
. Open the main menu, go to *Stack Management -> {kib}*, then select the *Saved Objects* tab.
235+
. Find *Saved Objects* in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
236236
. Search for the case by choosing a saved object type or entering the case title in the search bar.
237237
. Select one or more cases, then click the *Export* button.
238238
. Click *Export*. A confirmation message that your file is downloading displays.
@@ -249,7 +249,7 @@ image::images/cases-export-button.png[Shows the export saved objects workflow]
249249

250250
To import a case:
251251

252-
. Open the main menu, go to *Stack Management -> {kib}*, then select the *Saved Objects* tab.
252+
. Find *Saved Objects* in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
253253
. Click *Import*.
254254
. Select the NDJSON file containing the exported case and configure the import options.
255255
. Click *Import*.

docs/cases/indicators-of-compromise.asciidoc

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,7 @@ An indicator, also referred to as an IoC, is a piece of information associated w
2929
Install a threat intelligence integration to add indicators to the Indicators page.
3030

3131

32-
. Choose one of the following:
33-
* From the {security-app} main menu, go to *Intelligence* -> *Indicators* -> *Add Integrations*.
34-
* From the {kib} main menu, click *Add integrations*.
32+
. From the {security-app}, click *Add Integrations*.
3533
. In the search bar, search for `Threat Intelligence` to get a list of threat intelligence integrations.
3634
. Select a threat intelligence integration, then complete the integration's guided installation.
3735
+

docs/cloud-native-security/session-view.asciidoc

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,8 @@ NOTE: To view Linux session data from your Kubernetes infrastructure, you'll nee
3030
Session View uses process data collected by the {elastic-defend} integration,
3131
but this data is not always collected by default. To confirm that Session View data is enabled:
3232

33-
. Go to *Manage* -> *Policies*, and edit one or more of your {elastic-defend} integration policies.
33+
. Find **Policies** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
34+
. Select one or more of your {elastic-defend} integration policies to edit.
3435
. Select the *Policy settings* tab, then scroll down to the Linux event collection section near the bottom.
3536
. Check the box for *Process* events, and turn on the *Collect session data* toggle.
3637
. If you want to include file and network alerts in Session View, check the boxes for *Network* and *File* events.
@@ -124,7 +125,8 @@ From a security perspective, terminal output is important because it offers a me
124125

125126
To enable terminal output data capture:
126127

127-
. Go to *Manage* -> *Policies*, then select one or more of your {elastic-defend} integration policies to edit.
128+
. Find **Policies** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
129+
. Select one or more of your {elastic-defend} integration policies to edit.
128130
. On the *Policy settings* tab, scroll down to the Linux event collection section near the bottom of the page
129131
and select the *Collect session data* and *Capture terminal output* options.
130132

docs/detections/visual-event-analyzer.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,8 @@ In KQL, this translates to any event with the `agent.type` set to either:
2020
To find events that can be visually analyzed:
2121

2222
. First, display a list of events by doing one of the following:
23-
* Go to *Explore* -> *Hosts*, then select the *Events* tab. A list of all your hosts' events appears at the bottom of the page.
24-
* Go to *Alerts*, then scroll down to the Alerts table.
23+
* Find **Hosts** in the main menu, or search for `Security/Explore/Hosts` by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then select the *Events* tab. A list of all your hosts' events appears at the bottom of the page.
24+
* Find **Alerts** in the main menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then scroll down to the Alerts table.
2525
. Filter events that can be visually analyzed by entering either of the following queries in the KQL search bar, then selecting *Enter*:
2626
** `agent.type:"endpoint" and process.entity_id :*`
2727
+

docs/events/timeline-templates.asciidoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ filter (refer to <<pivot>>).
7474
. Choose one of the following:
7575
+
7676

77-
** Go to **Timelines** **Templates**, then click **Create new Timeline template**.
77+
** Find **Timelines** in the main menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. Next, select the **Templates** tab, then click **Create new Timeline template**.
7878
** Go to the Timeline bar (which is at the bottom of most pages), click the image:images/add-new-timeline-button.png[Click the add new button,20,20] button, then click **Create new Timeline template**.
7979
** From an open Timeline or Timeline template, click **New** -> **New Timeline template**.
8080

@@ -112,13 +112,13 @@ value is retrieved from the alert's `process.name` field.
112112

113113
You can view, duplicate, export, delete, and create templates from existing Timelines:
114114

115-
. Go to *Timelines* -> *Templates*.
115+
. Find **Timelines** in the main menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then select the **Templates** tab.
116116

117117
+
118118
[role="screenshot"]
119119
image::images/all-actions-timeline-ui.png[]
120120

121-
. Click the *All actions* icon in the relevant row, and then select the action:
121+
. Click the *All actions* icon in the relevant row, and then select the action:
122122

123123
* *Create timeline from template* (refer to <<create-timeline-template>>)
124124
* *Duplicate template*
@@ -138,7 +138,7 @@ NOTE: You cannot delete prebuilt templates.
138138
You can import and export Timeline templates, which enables importing templates
139139
from one space or {elastic-sec} instance to another. Exported templates are saved in an `ndjson` file.
140140

141-
. Go to *Timelines* -> *Templates*.
141+
. Find **Timelines** in the main menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then select the **Templates** tab.
142142
. To export templates, do one of the following:
143143

144144
* To export one template, click the *All actions* icon in the relevant row and

docs/events/timeline-ui-overview.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ retrieved from the alert. For more information, refer to <<timeline-templates-ui
2525

2626
To make a new Timeline, choose one of the following:
2727

28-
* Go to **Timelines**, then click **Create new Timeline**.
28+
* Find **Timelines** in the main menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then click **Create new Timeline**.
2929
* Go to the Timeline bar (which is at the bottom of most pages), click the image:images/add-new-timeline-button.png[Click the add new button,20,20] button, then click **Create new Timeline template**.
3030
* From an open Timeline or Timeline template, click **New** -> **New Timeline**.
3131

@@ -174,7 +174,7 @@ space or {elastic-sec} instance to another. Exported Timelines are saved as `.nd
174174

175175
To export Timelines:
176176

177-
* Go to *Timelines*.
177+
* Find **Timelines** in the main menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
178178
* Either click the *All actions* menu in the relevant row and select *Export selected*, or select multiple Timelines and then click *Bulk actions* -> *Export selected*.
179179

180180
To import Timelines:

docs/osquery/invest-guide-run-osquery.asciidoc

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,8 @@ image::images/osquery-investigation-guide.png[Shows a live query in an investiga
1919

2020
NOTE: You can only add Osquery to investigation guides for custom rules because prebuilt rules cannot be edited.
2121

22-
. Go to *Rules* -> *Detection rules (SIEM)*, select a rule, then click *Edit rule settings* on the rule details page.
22+
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the main menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
23+
. Select a rule to open the its details, then click *Edit rule settings*.
2324
. Select the *About* tab, then expand the rule's advanced settings.
2425
. Scroll down to the Investigation guide section. In the toolbar, click the *Osquery* button (image:images/osquery-button.png[Click the Osquery button,20,20]).
2526
.. Add a descriptive label for the query; for example, `Search for executables`.
@@ -39,6 +40,8 @@ image::images/setup-osquery-investigation-guide.png[width=70%][height=70%][Shows
3940
[[run-live-queries-ig]]
4041
=== Run live queries from an investigation guide
4142

43+
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the main menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
44+
. Select a rule to open the its details.
4245
. Go to *Rules* -> *Detection rules (SIEM)*, then select a rule to open its details.
4346
. Go to the About section of the rule details page and click *Investigation guide*.
4447
. Click the query. The Run Osquery pane displays with the *Query* field autofilled. Do the following:

0 commit comments

Comments
 (0)