You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/AI-for-security/connect-to-byo.asciidoc
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -180,10 +180,11 @@ Finally, configure the connector:
180
180
1. Log in to your Elastic deployment.
181
181
2. Navigate to **Stack Management → Connectors → Create Connector → OpenAI**. The OpenAI connector enables this use case because LM Studio uses the OpenAI SDK.
182
182
3. Name your connector to help keep track of the model version you are using.
183
-
4. Under **URL**, enter the domain name specified in your Nginx configuration file, followed by `/v1/chat/completions`.
184
-
5. Under **Default model**, enter `local-model`.
185
-
6. Under **API key**, enter the secret token specified in your Nginx configuration file.
186
-
7. Click **Save**.
183
+
4. Under **Select an OpenAI provider**, select **Other (OpenAI Compatible Service)**.
184
+
5. Under **URL**, enter the domain name specified in your Nginx configuration file, followed by `/v1/chat/completions`.
185
+
6. Under **Default model**, enter `local-model`.
186
+
7. Under **API key**, enter the secret token specified in your Nginx configuration file.
187
+
8. Click **Save**.
187
188
188
189
image::images/lms-edit-connector.png[The Edit connector page in the {security-app}, with appropriate values populated]
Copy file name to clipboardExpand all lines: docs/advanced-entity-analytics/api/asset-criticality-api-overview.asciidoc
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,4 +2,10 @@
2
2
[role="xpack"]
3
3
== Asset criticality API
4
4
5
-
You can manage <<asset-criticality, asset criticality>> records through the API. To use this API, you must first turn on the `securitySolution:enableAssetCriticality` <<enable-asset-criticality, advanced setting>>.
5
+
.New API Reference
6
+
[sidebar]
7
+
--
8
+
For the most up-to-date API details, refer to {api-kibana}/group/endpoint-security-entity-analytics-api[Entity Analytics APIs].
9
+
--
10
+
11
+
You can manage <<asset-criticality, asset criticality>> records through the API.
Copy file name to clipboardExpand all lines: docs/advanced-entity-analytics/asset-criticality.asciidoc
+6-9Lines changed: 6 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,12 +4,7 @@
4
4
.Requirements
5
5
[sidebar]
6
6
--
7
-
To view and assign asset criticality, you must:
8
-
9
-
* Have the appropriate user role.
10
-
* Turn on the `securitySolution:enableAssetCriticality` <<enable-asset-criticality, advanced setting>>.
11
-
12
-
For more information, refer to <<ers-requirements, Entity risk scoring prerequisites>>.
7
+
To view and assign asset criticality, you must have the appropriate user role. For more information, refer to <<ers-requirements, Entity risk scoring prerequisites>>.
13
8
--
14
9
15
10
The asset criticality feature allows you to classify your organization's entities based on various operational factors that are important to your organization. Through this classification, you can improve your threat detection capabilities by focusing your alert triage, threat-hunting, and investigation activities on high-impact entities.
@@ -30,7 +25,7 @@ Entities do not have a default asset criticality level. You can either assign as
30
25
31
26
When you assign, change, or unassign an individual entity's asset criticality level, that entity's risk score is immediately recalculated.
32
27
33
-
NOTE: If you assign asset criticality using the file import feature, risk scores are **not** immediately recalculated. The newly assigned or updated asset criticality levels will impact entity risk scores during the next hourly risk scoring calculation.
28
+
NOTE: If you assign asset criticality using the file import feature, risk scores are **not** immediately recalculated. However, you can trigger an immediate recalculation by clicking **Recalculate entity risk scores now**. Otherwise, the newly assigned or updated asset criticality levels will be factored in during the next hourly risk scoring calculation.
34
29
35
30
You can view, assign, change, or unassign asset criticality from the following places in the {elastic-sec} app:
36
31
@@ -78,13 +73,15 @@ host,host-001,extreme_impact
78
73
79
74
To import a file:
80
75
81
-
. Go to **Manage** → **Asset criticality**.
76
+
. Find **Entity Store** in the main menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
82
77
. Select or drag and drop the file you want to import.
83
78
+
84
79
NOTE: The file validation step highlights any lines that don't follow the required file structure. The asset criticality levels for those entities won't be assigned. We recommend that you fix any invalid lines and re-upload the file.
85
80
. Click **Assign**.
86
81
87
-
This process overwrites any previously assigned asset criticality levels for the entities included in the imported file. The newly assigned or updated asset criticality levels are immediately visible within all asset criticality workflows and will impact entity risk scores during the next risk scoring calculation.
82
+
This process overwrites any previously assigned asset criticality levels for the entities included in the imported file. The newly assigned or updated asset criticality levels are immediately visible within all asset criticality workflows.
83
+
84
+
You can trigger an immediate recalculation of entity risk scores by clicking **Recalculate entity risk scores now**. Otherwise, the newly assigned or updated asset criticality levels will be factored in during the next hourly risk scoring calculation.
Copy file name to clipboardExpand all lines: docs/advanced-entity-analytics/ers-req.asciidoc
+1-5Lines changed: 1 addition & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,15 +40,11 @@ Follow these guidelines to ensure clusters have adequate memory to handle data v
40
40
[discrete]
41
41
=== Known limitations
42
42
43
-
* You can only enable the risk scoring engine in a single {kib} space within a cluster.
44
-
45
-
* The risk scoring engine uses an internal user role to score all hosts and users, and doesn't respect privileges applied to custom users or roles. After you turn on the risk scoring engine for a {kib} space, all alerts in the space will contribute to host and user risk scores.
43
+
The risk scoring engine uses an internal user role to score all hosts and users, and doesn't respect privileges applied to custom users or roles. After you turn on the risk scoring engine for a {kib} space, all alerts in the space will contribute to host and user risk scores.
46
44
47
45
[discrete]
48
46
== Asset criticality
49
47
50
-
To use the asset criticality feature, turn on the `securitySolution:enableAssetCriticality` <<enable-asset-criticality, advanced setting>>.
Copy file name to clipboardExpand all lines: docs/advanced-entity-analytics/ml-req.asciidoc
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,6 +7,10 @@ To run and create {ml} jobs and rules, you need all of these:
7
7
* There must be at least one {ml} node in your cluster
8
8
* The `machine_learning_admin` user role
9
9
10
+
Additionally, to configure <<alert-suppression,alert suppression>> for {ml} rules, your role needs the following {kibana-ref}/kibana-role-management.html#adding_index_privileges[index privilege]:
11
+
12
+
* `read` permission for the `.ml-anomalies-*` index
13
+
10
14
For more information, go to {ml-docs}/setup.html[Set up {ml-features}].
Copy file name to clipboardExpand all lines: docs/cloud-native-security/kspm-get-started.asciidoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,14 +128,14 @@ If you are using the AWS visual editor to create and modify your IAM Policies, y
128
128
129
129
Follow AWS's https://aws.github.io/aws-eks-best-practices/security/docs/iam/#iam-roles-for-service-accounts-irsa[EKS Best Practices] documentation to use the https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html[IAM Role to Kubernetes Service-Account] (IRSA) feature to get temporary credentials and scoped permissions.
130
130
131
-
During setup, do not fill in any option in the "Setup Access" section. Instead click *Save and continue*.
131
+
IMPORTANT: During setup, do not fill in any option in the "Setup Access" section. Click *Save and continue*.
132
132
133
133
[discrete]
134
134
[[kspm-use-instance-role]]
135
135
==== Option 2 - Use default instance role
136
136
Follow AWS's https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html[IAM roles for Amazon EC2] documentation to create an IAM role using the IAM console, which automatically generates an instance profile.
137
137
138
-
During setup, do not fill in any option in the "Setup Access" section. Click *Save and continue*.
138
+
IMPORTANT: During setup, do not fill in any option in the "Setup Access" section. Click *Save and continue*.
Copy file name to clipboardExpand all lines: docs/dashboards/data-quality-dashboard.asciidoc
+14-6Lines changed: 14 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ Data does not appear in the dashboard until a user selects indices to check.
35
35
36
36
IMPORTANT: To customize which indices are checked when you click *Check all*, {security-guide}/data-views-in-sec.html[change the current data view].
37
37
38
-
* *Check a single index*: To check a single index, expand it using the arrow on the left. Checking a single index is faster than checking all indices.
38
+
* *Check a single index*: To check a single index, click the **Check now** button under **Actions**. Checking a single index is faster than checking all indices.
39
39
40
40
Once checked, an index's data quality results persist indefinitely. You can see when the index was last checked, and generate updated results at any time.
41
41
@@ -53,15 +53,24 @@ Click a node in the treemap to expand the corresponding index.
53
53
54
54
[discrete]
55
55
== Learn more about checked index fields
56
-
After an index is checked, an X (❌) or a checkmark (✅) appears in its *Result* column. The X (❌) indicates mapping problems in an index. To view index details, including which fields weren't successfully mapped, click the arrow next to the result to expand it.
56
+
After an index is checked, a **Pass** or **Fail** status appears. **Fail** indicates mapping problems in an index. To view index check details, including which fields weren't successfully mapped, click the **Check now** button under **Actions**.
57
57
58
58
[role="screenshot"]
59
59
image::images/data-qual-dash-detail.png[An expanded index with some failed results in the Data Quality dashboard]
60
60
61
-
When you expand a result, the *Summary* tab immediately helps you visualize the status of fields in that index. The other tabs display more details about particular fields, grouped by their mapping status.
61
+
The index check flyout provides more information about the status of fields in that index. Each of its tabs describe fields grouped by mapping status.
62
62
63
63
NOTE: Fields in the *Same family* category have the correct search behavior, but might have different storage or performance characteristics (for example, you can index strings to both `text` and `keyword` fields). To learn more, refer to {ref}/mapping-types.html[Field data types].
64
64
65
+
[discrete]
66
+
== View historical data quality results
67
+
68
+
You can review an index's data quality history by clicking **View history** under **Actions**, or by clicking the **History** tab in the details flyout. You can filter the results by time and **Pass** / **Fail** status. Click a historical check to expand it and view more details.
69
+
70
+
image::images/data-qual-dash-history.png[The Data Quality dashboard]
71
+
72
+
NOTE: Recent historical data includes the **Incompatible fields** and **Same family** views. Legacy historical data only includes the **Incompatible fields** view.
73
+
65
74
[discrete]
66
75
== Export data quality results
67
76
@@ -73,8 +82,7 @@ You can share data quality results to help track your team's remediation efforts
73
82
. Click *Copy to clipboard* to copy a Markdown report to your clipboard.
74
83
75
84
* Export results for one index:
76
-
. Expand an index that has at least one incompatible field by clicking the arrow to the left of its *Result*.
77
-
. From the *Summary* or *Incompatible fields* tab, select *Add to new case* to open a new <<cases-overview,case>>.
78
-
. From the *Summary*, *Incompatible fields*, or *Same family* tab, click *Copy to clipboard* to copy a Markdown report to your clipboard.
85
+
. View details for a checked index by clicking the **Check now** button under **Actions**.
86
+
. From the **Incompatible fields** tab, select **Add to new case** to open a new <<cases-overview,case>>.
79
87
80
88
NOTE: For more information about how to fix mapping problems, refer to {ref}/mapping.html[Mapping].
0 commit comments