Skip to content

Commit ccfdebd

Browse files
Merge branch 'main' into issue-3491-exception-item-list
2 parents 4646a5a + 1fdd76c commit ccfdebd

38 files changed

+329
-220
lines changed

docs/cases/cases-index.asciidoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
include::indicators-of-compromise.asciidoc[leveloffset=+1]
2+
13
include::cases-overview.asciidoc[leveloffset=+1]
24

35
include::cases-req.asciidoc[leveloffset=+2]
@@ -6,4 +8,3 @@ include::cases-manage.asciidoc[leveloffset=+2]
68

79
include::cases-manage-settings.asciidoc[leveloffset=+1]
810

9-
include::indicators-of-compromise.asciidoc[leveloffset=+1]

docs/cloud-native-security/cloud-native-security-index.asciidoc

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,5 +65,4 @@ include::d4c-policy-guide.asciidoc[leveloffset=+2]
6565
include::cloud-nat-sec-kubernetes-dashboard.asciidoc[leveloffset=+2]
6666

6767
include::cloud-workload-protection.asciidoc[leveloffset=+1]
68-
include::session-view.asciidoc[leveloffset=+1]
6968
include::environment-variable-capture.asciidoc[leveloffset=+1]

docs/cloud-native-security/session-view.asciidoc

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
[[session-view]]
2-
== Session View
2+
= Session View
33

44
Session View is an investigation tool that allows you to examine Linux process data organized
55
in a tree-like structure according to the Linux logical event model, with processes organized by parentage and time of execution.
@@ -13,9 +13,8 @@ and investigating session activity on your Linux infrastructure and understandin
1313
* Session View requires an https://www.elastic.co/pricing[Enterprise subscription].
1414
--
1515

16-
[float]
17-
[[session-view-data]]
18-
====== Session View displays:
16+
Session View has the following features:
17+
1918
* *Interactive and non-interactive processes:* Processes and services with or without a controlling terminal.
2019
* *User information:* The Linux user that executed each session or process, and any exec user changes.
2120
* *Process and event telemetry:* Process information included in the Linux logical event model.
@@ -27,7 +26,7 @@ NOTE: To view Linux session data from your Kubernetes infrastructure, you'll nee
2726

2827
[float]
2928
[[enable-session-view]]
30-
=== Enable Session View data
29+
== Enable Session View data
3130
Session View uses process data collected by the {elastic-defend} integration,
3231
but this data is not always collected by default. To confirm that Session View data is enabled:
3332

@@ -45,7 +44,7 @@ fields collected when this setting is enabled, refer to the https://github.com/e
4544

4645
[float]
4746
[[open-session-view]]
48-
=== Open Session View
47+
== Open Session View
4948
Session View is accessible from the **Hosts**, **Alerts**, and **Timelines** pages, as well as the alert details flyout and the **Kubernetes** dashboard.
5049
Events and sessions that you can investigate in Session View have a rectangular
5150
*Open Session View* button in the *Actions* column. For example:
@@ -60,7 +59,7 @@ From either of these tabs, click the *Open Session View* button for an event or
6059

6160
[discrete]
6261
[[session-view-ui]]
63-
=== Session View UI
62+
== Session View UI
6463
The Session View UI has the following features:
6564

6665
[role="screenshot"]
@@ -109,7 +108,7 @@ image::images/session-view-output-badge.png[The Output badge,width=80%,height=80
109108

110109
[[session-view-output]]
111110
[discrete]
112-
=== Terminal output view UI
111+
== Terminal output view UI
113112

114113
.Requirements
115114
[sidebar]
@@ -148,7 +147,7 @@ TIP: Use Session view's *Fullscreen* button (located next to the *Close session
148147

149148
[discrete]
150149
[[terminal-output-limitations]]
151-
==== Terminal output limitations for search and alerting
150+
=== Terminal output limitations for search and alerting
152151
You should understand several current limitations before building rules based on terminal output data:
153152

154153
* Terminal output that appears in the `process.io.text` field includes https://gist.github.com/fnky/458719343aabd01cfb17a3a4f7296797[ANSI codes] that represent, among other things, text color, text weight, and escape sequences. This can prevent EKS queries from matching as expected. Queries of this data will have more success matching single words than more complex strings.

docs/detections/detections-index.asciidoc

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,8 +41,6 @@ include::alert-suppression.asciidoc[leveloffset=+1]
4141

4242
include::alerts-reduce.asciidoc[]
4343

44-
include::visual-event-analyzer.asciidoc[]
45-
4644
include::query-alert-indices.asciidoc[]
4745

4846
include::prebuilt-rules/tune-rule-signals.asciidoc[]

docs/detections/detections-req.asciidoc

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,8 @@ and restarting {kib}, you must restart all detection rules.
3636
[discrete]
3737
[[enable-detections-ui]]
3838
== Enable and access detections
39-
To use the Detections feature, it must be enabled and your role must have access to rules and alerts. If your role does not have the cluster and index privileges needed to enable this feature, you can request someone who has these privileges to visit your Kibana space, which will turn it on for you. The following table describes the required privileges to access the Detections page, including rules and alerts.
39+
40+
To use the Detections feature, it must be enabled, your role must have access to rules and alerts, and your {kib} space must have **Data View Management** {kibana-ref}/xpack-spaces.html#spaces-control-feature-visibility[feature visibility]. If your role does not have the cluster and index privileges needed to enable this feature, you can request someone who has these privileges to visit your Kibana space, which will turn it on for you. The following table describes the required privileges to access the Detections feature, including rules and alerts.
4041

4142
NOTE: For instructions about using Machine Learning jobs and rules, refer to <<ml-requirements, Machine learning job and rule requirements>>.
4243

@@ -65,7 +66,7 @@ a|The `manage`, `write`,`read`, and `view_index_metadata` index privileges for t
6566

6667
|Enable the Detections feature in all Kibana spaces
6768

68-
*NOTE*: To turn on the Detections feature, visit the Detections page for each appropriate Kibana space.
69+
*NOTE*: To turn on the Detections feature, visit the Rules and Alerts pages for each appropriate Kibana space.
6970

7071
|The `manage` privilege
7172
a|The `manage`, `write`,`read`, and `view_index_metadata` index privileges for the following system indices and data streams:

docs/detections/rules-cross-cluster-search.asciidoc

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,11 @@
99

1010
This section explains the general process for setting up cross-cluster search in detection rules. For specific instructions on each part of the process, refer to the linked documentation.
1111

12-
NOTE: This procedure uses TLS certificate authentication to add remote clusters. {stack} 8.10.0 introduces an alternate method using {ref}/remote-clusters-api-key.html[API key authentication], but it is not yet supported for detection rules.
12+
. On the local cluster, establish trust and set up a connection to the remote cluster, using one of the following methods. With either method, note the unique name that you give to the remote cluster, because you'll need to use it throughout this process.
1313

14-
. On the local cluster, {ref}/remote-clusters-cert.html[establish trust and set up a connection] to the remote cluster. Note the unique name that you give to the remote cluster, because you'll need to use it throughout this process.
14+
* {ref}/remote-clusters-api-key.html[Add remote clusters using API key authentication] — Clusters must be on {stack} version 8.14 or later.
15+
16+
* {ref}/remote-clusters-cert.html[Add remote clusters using TLS certificate authentication]
1517

1618
. On both the local and remote clusters, {ref}/remote-clusters-cert.html#clusters-privileges-ccs-kibana-cert[create a
1719
role for cross-cluster search privileges], and make sure the two roles have
@@ -56,7 +58,9 @@ IMPORTANT: The rule preview uses the current user's cross-cluster search privile
5658
[[update-api-key]]
5759
=== Update a rule's API key
5860

59-
When a user creates a new rule or saves edits to an existing rule, their current privileges are saved to {kibana-ref}/alerting-setup.html#alerting-authorization[the rule's API key]. If that user's privileges change in the future, the rule *_does not_* automatically update with the user's latest privileges — you must update the rule's API key to update its privileges.
61+
Each detection rule has its own {kibana-ref}/alerting-setup.html#alerting-authorization[API key], which determines the data and actions the rule is allowed to access. When a user creates a new rule or changes an existing rule, their current privileges are saved to the rule's API key. If that user's privileges change in the future, the rule *_does not_* automatically update with the user's latest privileges — you must update the rule's API key if you want to update its privileges.
62+
63+
IMPORTANT: A rule's API key is different from the API key you might have created for <<set-up-ccs-rules,authentication between local and remote clusters>>.
6064

6165
To update a rule's API key, log into the local cluster as a user with the privileges you want to apply to the rule, then do either of the following:
6266

docs/detections/visual-event-analyzer.asciidoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
[[visual-event-analyzer]]
22
[role="xpack"]
3-
== Visual event analyzer
3+
= Visual event analyzer
44

55
{elastic-sec} allows any event detected by {elastic-endpoint} to be analyzed using a process-based visual analyzer, which shows a graphical timeline of processes that led up to the alert and the events that occurred immediately after. Examining events in the visual event analyzer is useful to determine the origin of potentially malicious activity and other areas in your environment that may be compromised. It also enables security analysts to drill down into all related hosts, processes, and other events to aid in their investigations.
66

77
TIP: If you're experiencing performance degradation, you can <<exclude-cold-frozen-tiers, exclude cold and frozen tier data>> from analyzer queries.
88

99
[float]
1010
[[find-events-analyze]]
11-
=== Find events to analyze
11+
== Find events to analyze
1212

1313
You can only visualize events triggered by hosts configured with the {elastic-defend} integration or any `sysmon` data from `winlogbeat`.
1414

@@ -47,7 +47,7 @@ TIP: You can also analyze events from <<timelines-ui,Timelines>>.
4747

4848
[discrete]
4949
[[visual-analyzer-ui]]
50-
=== Visual event analyzer UI
50+
== Visual event analyzer UI
5151

5252
Within the visual analyzer, each cube represents a process, such as an executable file or network event. Click and drag in the analyzer to explore the hierarchy of all process relationships.
5353

@@ -98,7 +98,7 @@ image::images/graphical-view.png[]
9898

9999
[discrete]
100100
[[process-and-event-details]]
101-
=== Process and event details
101+
== Process and event details
102102

103103
To learn more about each related process, select the process in the left panel or the graphical view. The left panel displays process details such as:
104104

docs/es-overview.asciidoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
[[es-overview]]
22
[chapter, role="xpack"]
3-
= Elastic Security overview
3+
= {elastic-sec} overview
44

55
{elastic-sec} combines threat detection analytics, cloud native security, and endpoint protection capabilities in a single solution, so you can quickly detect, investigate, and respond to threats and vulnerabilities across your environment.
66

7-
Elastic Security provides:
7+
{elastic-sec} provides:
88

99
* A detection engine that identifies a wide range of threats
1010
* A workspace for event triage, investigation, and case management
@@ -16,7 +16,7 @@ Elastic Security provides:
1616
=== Learn more
1717

1818
* <<getting-started, Get started>>: Learn about system requirements, workspaces, configuration, and data ingestion.
19-
* <<es-ui-overview, Elastic Security UI overview>>: Navigate {elastic-sec}'s various tools and interfaces.
19+
* <<es-ui-overview, {elastic-sec} UI overview>>: Navigate {elastic-sec}'s various tools and interfaces.
2020
* <<about-rules, Detection rules>>: Use {elastic-sec}'s detection engine with custom and prebuilt rules.
2121
* <<cloud-native-security-overview, Cloud native security>>: Enable cloud native security capabilities such as Cloud and Kubernetes security posture management, cloud native vulnerability management, and cloud workload protection for Kubernetes and VMs.
2222
* <<install-endpoint, Install {elastic-defend}>>: Enable key endpoint protection capabilities like event collection and malicious activity prevention.

docs/events/index.asciidoc

Lines changed: 0 additions & 8 deletions
This file was deleted.
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
[[investigations-tools]]
2+
3+
= Investigation tools
4+
5+
The following sections describe tools for investigating security events and tracking security issues directly in the {security-app}.
6+
7+
include::timeline-ui-overview.asciidoc[leveloffset=+1]
8+
include::timeline-templates.asciidoc[leveloffset=+2]
9+
include::../detections/visual-event-analyzer.asciidoc[leveloffset=+1]
10+
include::../cloud-native-security/session-view.asciidoc[leveloffset=+1]
11+
include::../osquery/osquery-index.asciidoc[leveloffset=+1]

0 commit comments

Comments
 (0)