Skip to content

Commit 54e1397

Browse files
authored
Merge branch 'main' into 41-remove-tech-preview-badges
2 parents 80d57d7 + fa71c9d commit 54e1397

File tree

351 files changed

+18857
-975
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

351 files changed

+18857
-975
lines changed

.backportrc.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
22
"upstream": "elastic/security-docs",
3-
"branches": ["8.x", "8.15", "8.14", "8.13", "8.12", "8.11", "8.10", "8.9", "8.8", "8.7", "8.6", "8.5", "8.4", "8.3", "8.2", "8.1", "8.0", "7.17", "7.16", "7.15", "7.14", "7.13", "7.12", "7.11", "7.10", "7.9", "7.8"],
3+
"branches": ["8.x", "8.16", "8.15", "8.14", "8.13", "8.12", "8.11", "8.10", "8.9", "8.8", "8.7", "8.6", "8.5", "8.4", "8.3", "8.2", "8.1", "8.0", "7.17", "7.16", "7.15", "7.14", "7.13", "7.12", "7.11", "7.10", "7.9", "7.8"],
44
"labels": ["backport"]
55
}

.mergify.yml

Lines changed: 28 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,33 @@ pull_request_rules:
1313
git merge upstream/{{base}}
1414
git push upstream {{head}}
1515
```
16+
- name: backport patches to main branch
17+
conditions:
18+
- merged
19+
- label=backport-main
20+
actions:
21+
backport:
22+
assignees:
23+
- "{{ author }}"
24+
labels:
25+
- "backport"
26+
branches:
27+
- "main"
28+
title: "[{{ destination_branch }}] {{ title }} (backport #{{ number }})"
29+
- name: backport patches to 8.17 branch
30+
conditions:
31+
- merged
32+
- base=main
33+
- label=v8.17.0
34+
actions:
35+
backport:
36+
assignees:
37+
- "{{ author }}"
38+
branches:
39+
- "8.x"
40+
title: "[{{ destination_branch }}] {{ title }} (backport #{{ number }})"
41+
labels:
42+
- backport
1643
- name: backport patches to 8.16 branch
1744
conditions:
1845
- merged
@@ -23,7 +50,7 @@ pull_request_rules:
2350
assignees:
2451
- "{{ author }}"
2552
branches:
26-
- "8.x"
53+
- "8.16"
2754
title: "[{{ destination_branch }}] {{ title }} (backport #{{ number }})"
2855
labels:
2956
- backport

README.md

Lines changed: 11 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -9,36 +9,32 @@ Documentation Manager: Janeen Roberts (Github: `@jmikell821`)
99

1010
## Contributing to Elastic Security docs
1111

12-
You can open an issue using the appropriate [template](https://github.com/elastic/security-docs/issues/new/choose).
12+
You can open an issue using the appropriate [template](https://github.com/elastic/security-docs/issues/new/choose).
1313

1414
> [!NOTE]
15-
> Please report any **known issues** that need to be documented by creating an issue in our [private repo](https://github.com/elastic/security-docs-internal/issues) using the known issue template.
15+
> Please report any **known issues** that need to be documented by creating an issue in our [private repo](https://github.com/elastic/security-docs-internal/issues) using the known issue template.
1616
1717
To contribute directly to Elastic Security documentation:
1818

19-
1. Please fork and clone the `security-docs` repo.
20-
1. Check out the `main` branch and fetch the latest changes.
21-
1. Check out a new branch and make your changes.
22-
1. Save your changes and open a pull request.
23-
1. Add all appropriate Github users as reviewers.
24-
1. Add the appropriate release version label, backport version label if appropriate, and team label to the PR.
25-
1. If your PR changes any [serverless docs content](https://github.com/elastic/security-docs/tree/main/docs/serverless), add the label `ci:doc-build` to generate a preview of the serverless docs on the PR.
26-
1. Once the docs team approves all changes, you can merge it. If a backport version label was added to a PR for stack versions 7.14.0 and newer, mergify will automatically open a backport PR.
27-
1. Merge the backport PR once it passes all CI checks.
19+
1. Please fork and clone the `security-docs` repo.
20+
1. Check out the `main` branch and fetch the latest changes.
21+
1. Check out a new branch and make your changes.
22+
1. Save your changes and open a pull request.
23+
1. Add all appropriate Github users as reviewers.
24+
1. Add the appropriate release version label, backport version label if appropriate, and team label to the PR.
25+
1. Once the docs team approves all changes, you can merge it. If a backport version label was added to a PR for stack versions 7.14.0 and newer, mergify will automatically open a backport PR.
26+
1. Merge the backport PR once it passes all CI checks.
2827

2928
### Preview documentation changes
3029

3130
When you open a pull request, preview links are automatically added as a comment in the PR. Once the CI check builds successfully, the links will be live and you can click them to preview your changes.
3231

33-
For stateful docs, you also might want to add targeted links to help reviewers find specific pages related to your PR. Preview URLs include the following pattern (replace `<YOUR_PR_NUMBER_HERE>` with the PR number):
32+
You also might want to add targeted links to help reviewers find specific pages related to your PR. Preview URLs include the following pattern (replace `<YOUR_PR_NUMBER_HERE>` with the PR number):
3433

3534
```
3635
https://security-docs_bk_<YOUR_PR_NUMBER_HERE>.docs-preview.app.elstc.co/guide/en/security/master/
3736
```
3837

39-
> [!NOTE]
40-
> Serverless docs previews don't allow targeted links, because the id in the URL changes with each rebuild.
41-
4238
## License
4339

4440
Shield: [![CC BY-NC-ND 4.0][cc-by-nc-nd-shield]][cc-by-nc-nd]

docs/AI-for-security/attack-discovery.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,10 +45,10 @@ When you access Attack discovery for the first time, you'll need to select an LL
4545
.Recommended models
4646
[sidebar]
4747
--
48-
While Attack discovery is compatible with many different models, our testing found increased performance with Claude 3 Sonnet and Claude 3 Opus. In general, models with larger context windows are more effective for Attack discovery.
48+
While Attack discovery is compatible with many different models, our testing found increased performance with Claude 3.5 Sonnet. In general, models with larger context windows are more effective for Attack discovery.
4949
--
5050
+
51-
image::images/select-model-empty-state.png[]
51+
image::images/attck-disc-select-model-empty-state.png[]
5252
+
5353
. Once you've selected a connector, click **Generate** to start the analysis.
5454

docs/AI-for-security/connect-to-byo.asciidoc

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -180,10 +180,11 @@ Finally, configure the connector:
180180
1. Log in to your Elastic deployment.
181181
2. Navigate to **Stack Management → Connectors → Create Connector → OpenAI**. The OpenAI connector enables this use case because LM Studio uses the OpenAI SDK.
182182
3. Name your connector to help keep track of the model version you are using.
183-
4. Under **URL**, enter the domain name specified in your Nginx configuration file, followed by `/v1/chat/completions`.
184-
5. Under **Default model**, enter `local-model`.
185-
6. Under **API key**, enter the secret token specified in your Nginx configuration file.
186-
7. Click **Save**.
183+
4. Under **Select an OpenAI provider**, select **Other (OpenAI Compatible Service)**.
184+
5. Under **URL**, enter the domain name specified in your Nginx configuration file, followed by `/v1/chat/completions`.
185+
6. Under **Default model**, enter `local-model`.
186+
7. Under **API key**, enter the secret token specified in your Nginx configuration file.
187+
8. Click **Save**.
187188

188189
image::images/lms-edit-connector.png[The Edit connector page in the {security-app}, with appropriate values populated]
189190

68.2 KB
Loading
23.7 KB
Loading
-66.8 KB
Binary file not shown.

docs/advanced-entity-analytics/api/asset-criticality-api-overview.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,4 +8,4 @@
88
For the most up-to-date API details, refer to {api-kibana}/group/endpoint-security-entity-analytics-api[Entity Analytics APIs].
99
--
1010

11-
You can manage <<asset-criticality, asset criticality>> records through the API. To use this API, you must first turn on the `securitySolution:enableAssetCriticality` <<enable-asset-criticality, advanced setting>>.
11+
You can manage <<asset-criticality, asset criticality>> records through the API.

docs/advanced-entity-analytics/asset-criticality.asciidoc

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,7 @@
44
.Requirements
55
[sidebar]
66
--
7-
To view and assign asset criticality, you must:
8-
9-
* Have the appropriate user role.
10-
* Turn on the `securitySolution:enableAssetCriticality` <<enable-asset-criticality, advanced setting>>.
11-
12-
For more information, refer to <<ers-requirements, Entity risk scoring prerequisites>>.
7+
To view and assign asset criticality, you must have the appropriate user role. For more information, refer to <<ers-requirements, Entity risk scoring prerequisites>>.
138
--
149

1510
The asset criticality feature allows you to classify your organization's entities based on various operational factors that are important to your organization. Through this classification, you can improve your threat detection capabilities by focusing your alert triage, threat-hunting, and investigation activities on high-impact entities.
@@ -30,7 +25,7 @@ Entities do not have a default asset criticality level. You can either assign as
3025

3126
When you assign, change, or unassign an individual entity's asset criticality level, that entity's risk score is immediately recalculated.
3227

33-
NOTE: If you assign asset criticality using the file import feature, risk scores are **not** immediately recalculated. The newly assigned or updated asset criticality levels will impact entity risk scores during the next hourly risk scoring calculation.
28+
NOTE: If you assign asset criticality using the file import feature, risk scores are **not** immediately recalculated. However, you can trigger an immediate recalculation by clicking **Recalculate entity risk scores now**. Otherwise, the newly assigned or updated asset criticality levels will be factored in during the next hourly risk scoring calculation.
3429

3530
You can view, assign, change, or unassign asset criticality from the following places in the {elastic-sec} app:
3631

@@ -78,13 +73,15 @@ host,host-001,extreme_impact
7873

7974
To import a file:
8075

81-
. Go to **Manage** → **Asset criticality**.
76+
. Find **Entity Store** in the main menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
8277
. Select or drag and drop the file you want to import.
8378
+
8479
NOTE: The file validation step highlights any lines that don't follow the required file structure. The asset criticality levels for those entities won't be assigned. We recommend that you fix any invalid lines and re-upload the file.
8580
. Click **Assign**.
8681

87-
This process overwrites any previously assigned asset criticality levels for the entities included in the imported file. The newly assigned or updated asset criticality levels are immediately visible within all asset criticality workflows and will impact entity risk scores during the next risk scoring calculation.
82+
This process overwrites any previously assigned asset criticality levels for the entities included in the imported file. The newly assigned or updated asset criticality levels are immediately visible within all asset criticality workflows.
83+
84+
You can trigger an immediate recalculation of entity risk scores by clicking **Recalculate entity risk scores now**. Otherwise, the newly assigned or updated asset criticality levels will be factored in during the next hourly risk scoring calculation.
8885

8986
[discrete]
9087
== Improve your security operations

0 commit comments

Comments
 (0)