Skip to content

Commit 8c90678

Browse files
First draft
1 parent c73c723 commit 8c90678

File tree

1 file changed

+18
-16
lines changed

1 file changed

+18
-16
lines changed

docs/detections/rules-ui-create.asciidoc

Lines changed: 18 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -42,9 +42,8 @@ To create or edit {ml} rules, you must have the https://www.elastic.co/subscript
4242
{ess-trial}[cloud deployment]. Additionally, you must have the {ref}/built-in-roles.html[`machine_learning_admin`] user
4343
role, and the selected {ml} job must be running for the rule to function correctly.
4444
==============
45-
. Go to *Rules* -> *Detection rules (SIEM)* -> *Create new rule*. The *Create new rule* page displays.
46-
. To create a rule based on a {ml} anomaly threshold, select *Machine Learning*,
47-
then select:
45+
. Go to the *Rules* page. To access the it, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the <<kibana-navigation-search,global search field>>.
46+
. To create a rule based on a {ml} anomaly threshold, select *Machine Learning* on the *Create new rule*, then select:
4847
.. The required {ml} jobs.
4948
+
5049
NOTE: If a required job isn't currently running, it will automatically start when you finish configuring and enable the rule.
@@ -68,9 +67,8 @@ in the step or its sub-steps, apply the change to the other rule types, too.
6867
[discrete]
6968
[[create-custom-rule]]
7069
=== Create a custom query rule
71-
. Go to *Rules* -> *Detection rules (SIEM)* -> *Create new rule*. The *Create new rule* page displays.
72-
. To create a rule based on a KQL or Lucene query, select *Custom query*,
73-
then:
70+
. Go to the *Rules* page. To access the it, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the <<kibana-navigation-search,global search field>>.
71+
. To create a rule based on a KQL or Lucene query, select *Custom query* on the *Create new rule* page, then:
7472
.. Define which {es} indices or data view the rule searches for alerts.
7573
.. Use the filter and query fields to create the criteria used for detecting
7674
alerts.
@@ -119,8 +117,8 @@ in these steps or sub-steps, apply the change to the other rule types, too.
119117
[discrete]
120118
[[create-threshold-rule]]
121119
=== Create a threshold rule
122-
. Go to *Rules* -> *Detection rules (SIEM)* -> *Create new rule*. The *Create new rule* page displays.
123-
. To create a rule based on a source event field threshold, select *Threshold*, then:
120+
. Go to the *Rules* page. To access the it, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the <<kibana-navigation-search,global search field>>.
121+
. To create a rule based on a source event field threshold, select *Threshold* on the *Create new rule* page, then:
124122
.. Define which {es} indices the rule analyzes for alerts.
125123
.. Use the filter and query fields to create the criteria used for detecting
126124
alerts.
@@ -159,7 +157,8 @@ in these steps or sub-steps, apply the change to the other rule types, too.
159157
[discrete]
160158
[[create-eql-rule]]
161159
=== Create an event correlation rule
162-
. Go to *Rules* -> *Detection rules (SIEM)* -> *Create new rule*. The *Create new rule* page displays.
160+
. Go to the *Rules* page. To access the it, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the <<kibana-navigation-search,global search field>>.
161+
. To create an event correlation rule using EQL, select *Event Correlation* on the *Create new rule* page, then:
163162
. To create an event correlation rule using EQL, select *Event Correlation*, then:
164163
.. Define which {es} indices or data view the rule searches when querying for events.
165164
.. Write an {ref}/eql-syntax.html[EQL query] that searches for matching events or a series of matching events.
@@ -225,9 +224,8 @@ in these steps or sub-steps, apply the change to the other rule types, too.
225224

226225
NOTE: {elastic-sec} provides limited support for indicator match rules. See <<support-indicator-rules>> for more information.
227226

228-
. Go to *Rules* -> *Detection rules (SIEM)* -> *Create new rule*. The *Create new rule* page displays.
229-
. To create a rule that searches for events whose specified field value matches the specified indicator field value in the indicator index patterns, select *Indicator Match*, then fill in the following fields:
230-
227+
. Go to the *Rules* page. To access the it, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the <<kibana-navigation-search,global search field>>.
228+
. To create a rule that searches for events whose specified field value matches the specified indicator field value in the indicator index patterns, select *Indicator Match* on the *Create new rule* page, then fill in the following fields:
231229
.. *Source*: The individual index patterns or data view that specifies what data to search.
232230
.. *Custom query*: The query and filters used to retrieve the required results from
233231
the {elastic-sec} event indices. For example, if you want to match documents that only contain a `destination.ip` address field, add `destination.ip : *`.
@@ -306,15 +304,19 @@ You uploaded a value list of known ransomware domains, and you want to be notifi
306304
+
307305
TIP: If you don't remember this information, go to *Rules* -> *Detection rules (SIEM)* -> *Manage value lists*. Locate the appropriate value list and note the field in the corresponding `Type` column. (Examples include keyword, text, and IP.)
308306

307+
////
308+
Revisit this tip ^
309+
////
310+
309311
[role="screenshot"]
310312
image::images/indicator_value_list.png[]
311313

312314
[discrete]
313315
[[create-new-terms-rule]]
314316
=== Create a new terms rule
315317

316-
. Go to *Rules* -> *Detection rules (SIEM)* -> *Create new rule*. The *Create new rule* page displays.
317-
. To create a rule that searches for each new term detected in source documents, select *New Terms*, then:
318+
. Go to the *Rules* page. To access the it, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the <<kibana-navigation-search,global search field>>.
319+
. To create a rule that searches for each new term detected in source documents, select *New Terms* on the *Create new rule* page, then:
318320
.. Specify what data to search by entering individual {es} index patterns or selecting an existing data view.
319321
.. Use the filter and query fields to create the criteria used for detecting
320322
alerts.
@@ -353,8 +355,8 @@ Use {ref}/esql.html[{esql}] to query your source events and aggregate event data
353355

354356
To create an {esql} rule:
355357

356-
. Go to *Rules* -> *Detection rules (SIEM)* -> *Create new rule*. The *Create new rule* page appears.
357-
. Select **{esql}**, then write a query.
358+
. Go to the *Rules* page. To access the it, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the <<kibana-navigation-search,global search field>>.
359+
. Select **{esql}**, then write a query.
358360
+
359361
NOTE: Refer to the sections below to learn more about <<esql-rule-query-types,{esql} query types>>, <<esql-query-design,query design considerations>>, and <<esql-rule-limitations,rule limitations>>.
360362
+

0 commit comments

Comments
 (0)