Skip to content

Commit 93e52df

Browse files
committed
updates AD page
1 parent d65c95f commit 93e52df

File tree

10 files changed

+17
-7
lines changed

10 files changed

+17
-7
lines changed

docs/AI-for-security/attack-discovery.asciidoc

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,12 @@
99

1010
preview::["This feature is in technical preview. It may change in the future, and you should exercise caution when using it in production environments. Elastic will work to fix any issues, but features in technical preview are not subject to the support SLA of GA features."]
1111

12+
.Requirements
13+
[sidebar]
14+
--
15+
To use Attack Discovery, you need the **Attack Discovery: All** {kibana-ref}/kibana-role-management.html#adding_kibana_privileges[{kib} privilege].
16+
--
17+
1218
Attack discovery leverages large language models (LLMs) to analyze alerts in your environment and identify threats. Each "discovery" represents a potential attack and describes relationships among multiple alerts to tell you which users and hosts are involved, how alerts correspond to the MITRE ATT&CK matrix, and which threat actor might be responsible. This can help make the most of each security analyst's time, fight alert fatigue, and reduce your mean time to respond.
1319

1420
For a demo, refer to the following video.
@@ -45,18 +51,18 @@ When you access Attack discovery for the first time, you'll need to select an LL
4551
.Recommended models
4652
[sidebar]
4753
--
48-
While Attack discovery is compatible with many different models, our testing found increased performance with Claude 3.5 Sonnet. In general, models with larger context windows are more effective for Attack discovery.
54+
While Attack discovery is compatible with many different models, refer to the <<llm-performance-matrix, Large language model performance matrix>> to see which models perform best.
4955
--
5056
+
51-
image::images/attck-disc-select-model-empty-state.png[]
57+
image::images/attck-disc-select-model-empty.png[]
5258
+
5359
. Once you've selected a connector, click **Generate** to start the analysis.
5460

5561
It may take from a few seconds up to several minutes to generate discoveries, depending on the number of alerts and the model you selected.
5662

57-
IMPORTANT: Attack discovery is in technical preview and will only analyze opened and acknowleged alerts from the past 24 hours. By default it only analyzes up to 20 alerts within this timeframe, but you can expand this up to 100 by going to **AI Assistant → Settings (image:images/icon-settings.png[Settings icon,17,17]) → Knowledge Base** and updating the **Alerts** setting.
63+
IMPORTANT: y default it analyzes up to 100 alerts within this timeframe, but you can expand this up to 500 by clicking the settings icon (image:images/icon-settings.png[Settings icon,17,17]) next to the model selection menu and adjusting the **Alerts** slider. Note that sending more alerts than your chosen LLM can handle may result in an error.
5864

59-
image::images/knowledge-base-settings.png["AI Assistant's settings menu open to the Knowledge Base tab",75%]
65+
image::images/attack-disc-alert-number-menu.png["Attack Discovery's settings menu",75%]
6066

6167
IMPORTANT: Attack discovery uses the same data anonymization settings as <<security-assistant, Elastic AI Assistant>>. To configure which alert fields are sent to the LLM and which of those fields are obfuscated, use the Elastic AI Assistant settings. Consider the privacy policies of third-party LLMs before sending them sensitive data.
6268

@@ -72,7 +78,7 @@ Each discovery includes the following information describing the potential threa
7278
. The number of associated alerts and which parts of the https://attack.mitre.org/[MITRE ATT&CK matrix] they correspond to.
7379
. The implicated entities (users and hosts), and what suspicious activity was observed for each.
7480

75-
image::images/attack-discovery-full-card.png[Attack discovery detail view]
81+
image::images/attck-disc-example-disc.png[Attack discovery detail view]
7682

7783
[[attack-discovery-workflows]]
7884
[discrete]
-222 KB
Binary file not shown.
-256 KB
Binary file not shown.
201 KB
Loading
108 KB
Loading

docs/serverless/AI-for-security/attack-discovery.mdx

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,10 @@ status: in review
1212
This feature is in technical preview. It may change in the future, and you should exercise caution when using it in production environments. Elastic will work to fix any issues, but features in technical preview are not subject to the support SLA of GA features.
1313
</DocCallOut>
1414

15+
<DocCallOut title="Requirements">
16+
To use Attack Discovery, you need the **Attack Discovery: All** privilege.
17+
</DocCallOut>
18+
1519
Attack discovery leverages large language models (LLMs) to analyze alerts in your environment and identify threats. Each "discovery" represents a potential attack and describes relationships among multiple alerts to tell you which users and hosts are involved, how alerts correspond to the MITRE ATT&CK matrix, and which threat actor might be responsible. This can help make the most of each security analyst's time, fight alert fatigue, and reduce your mean time to respond.
1620

1721
For a demo, refer to the following video.
@@ -34,7 +38,7 @@ When you access Attack discovery for the first time, you'll need to select an LL
3438
2. Select an existing connector from the dropdown menu, or add a new one.
3539

3640
<DocCallOut title="Recommended models">
37-
While Attack discovery is compatible with many different models, our testing found increased performance with Claude 3.5 Sonnet. In general, models with larger context windows are more effective for Attack discovery.
41+
While Attack discovery is compatible with many different models, refer to the <DocLink slug="/serverless/security/llm-performance-matrix"> Large language model performance matrix </DocLink> to see which models perform best.
3842
</DocCallOut>
3943

4044
![Attack discovery empty state](../images/attack-discovery/attck-disc-select-model-empty-state.png)
@@ -65,7 +69,7 @@ Each discovery includes the following information describing the potential threa
6569
- The number of associated alerts and which parts of the [MITRE ATT&CK matrix](https://attack.mitre.org/) they correspond to.
6670
- The implicated entities (users and hosts), and what suspicious activity was observed for each.
6771

68-
![Attack discovery detail view](../images/attack-discovery/attack-discovery-full-card.png)
72+
![Attack discovery detail view](../images/attack-discovery/attck-disc-example-disc.png)
6973

7074
<div id="workflows"></div>
7175
## Incorporate discoveries with other workflows
108 KB
Loading
Binary file not shown.
108 KB
Loading

0 commit comments

Comments
 (0)