Skip to content
Merged
Show file tree
Hide file tree
Changes from 9 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/cases/cases-manage-settings.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
:frontmatter-tags-content-type: [how-to]
:frontmatter-tags-user-goals: [analyze]

To change case closure options and add custom fields, templates, and connectors for external incident management systems, go to *Cases* -> *Settings*.
To change case closure options and add custom fields, templates, and connectors for external incident management systems, find **Cases** in the navigation menu or search for `Security/Cases` by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then click **Settings**.

[role="screenshot"]
image::images/cases-settings.png[Shows the case settings page]
Expand Down
6 changes: 3 additions & 3 deletions docs/cases/cases-manage.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ You can create and manage cases using the UI or the <<cases-api-overview>>.
Open a new case to keep track of security issues and share their details with
colleagues.

. Go to *Cases*, then click *Create case*. If no cases exist, the Cases table will be empty and you'll be prompted to create one by clicking the *Create case* button inside the table.
. Find **Cases** in the navigation menu or search for `Security/Cases` by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then click *Create case*. If no cases exist, the Cases table will be empty and you'll be prompted to create one by clicking the *Create case* button inside the table.

. If you defined <<cases-templates,templates>>, you can optionally select one to use its default field values. preview:[]

Expand Down Expand Up @@ -232,7 +232,7 @@ The following attachments are _not_ exported:

To export a case:

. Open the main menu, go to *Stack Management -> {kib}*, then select the *Saved Objects* tab.
. Find *Saved Objects* in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
. Search for the case by choosing a saved object type or entering the case title in the search bar.
. Select one or more cases, then click the *Export* button.
. Click *Export*. A confirmation message that your file is downloading displays.
Expand All @@ -249,7 +249,7 @@ image::images/cases-export-button.png[Shows the export saved objects workflow]

To import a case:

. Open the main menu, go to *Stack Management -> {kib}*, then select the *Saved Objects* tab.
. Find *Saved Objects* in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
. Click *Import*.
. Select the NDJSON file containing the exported case and configure the import options.
. Click *Import*.
Expand Down
4 changes: 1 addition & 3 deletions docs/cases/indicators-of-compromise.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -29,9 +29,7 @@ An indicator, also referred to as an IoC, is a piece of information associated w
Install a threat intelligence integration to add indicators to the Indicators page.


. Choose one of the following:
* From the {security-app} main menu, go to *Intelligence* -> *Indicators* -> *Add Integrations*.
* From the {kib} main menu, click *Add integrations*.
. From the {security-app}, click *Add Integrations*.
. In the search bar, search for `Threat Intelligence` to get a list of threat intelligence integrations.
. Select a threat intelligence integration, then complete the integration's guided installation.
+
Expand Down
6 changes: 4 additions & 2 deletions docs/cloud-native-security/session-view.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,8 @@ NOTE: To view Linux session data from your Kubernetes infrastructure, you'll nee
Session View uses process data collected by the {elastic-defend} integration,
but this data is not always collected by default. To confirm that Session View data is enabled:

. Go to *Manage* -> *Policies*, and edit one or more of your {elastic-defend} integration policies.
. Find **Policies** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
. Select one or more of your {elastic-defend} integration policies to edit.
. Select the *Policy settings* tab, then scroll down to the Linux event collection section near the bottom.
. Check the box for *Process* events, and turn on the *Collect session data* toggle.
. If you want to include file and network alerts in Session View, check the boxes for *Network* and *File* events.
Expand Down Expand Up @@ -124,7 +125,8 @@ From a security perspective, terminal output is important because it offers a me

To enable terminal output data capture:

. Go to *Manage* -> *Policies*, then select one or more of your {elastic-defend} integration policies to edit.
. Find **Policies** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
. Select one or more of your {elastic-defend} integration policies to edit.
. On the *Policy settings* tab, scroll down to the Linux event collection section near the bottom of the page
and select the *Collect session data* and *Capture terminal output* options.

Expand Down
4 changes: 2 additions & 2 deletions docs/detections/visual-event-analyzer.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -20,8 +20,8 @@ In KQL, this translates to any event with the `agent.type` set to either:
To find events that can be visually analyzed:

. First, display a list of events by doing one of the following:
* Go to *Explore* -> *Hosts*, then select the *Events* tab. A list of all your hosts' events appears at the bottom of the page.
* Go to *Alerts*, then scroll down to the Alerts table.
* Find **Hosts** in the main menu, or search for `Security/Explore/Hosts` by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then select the *Events* tab. A list of all your hosts' events appears at the bottom of the page.
* Find **Alerts** in the main menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then scroll down to the Alerts table.
. Filter events that can be visually analyzed by entering either of the following queries in the KQL search bar, then selecting *Enter*:
** `agent.type:"endpoint" and process.entity_id :*`
+
Expand Down
9 changes: 5 additions & 4 deletions docs/events/timeline-templates.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -74,7 +74,8 @@ filter (refer to <<pivot>>).
. Choose one of the following:
+

** Go to **Timelines** → **Templates**, then click **Create new Timeline template**.
** Find **Timelines** in the main menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
** Select the **Templates** tab, then click **Create new Timeline template**.
** Go to the Timeline bar (which is at the bottom of most pages), click the image:images/add-new-timeline-button.png[Click the add new button,20,20] button, then click **Create new Timeline template**.
** From an open Timeline or Timeline template, click **New** -> **New Timeline template**.

Expand Down Expand Up @@ -112,13 +113,13 @@ value is retrieved from the alert's `process.name` field.

You can view, duplicate, export, delete, and create templates from existing Timelines:

. Go to *Timelines* -> *Templates*.
. Find **Timelines** in the main menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then select the **Templates** tab.

+
[role="screenshot"]
image::images/all-actions-timeline-ui.png[]

. Click the *All actions* icon in the relevant row, and then select the action:
. Click the *All actions* icon in the relevant row, and then select the action:

* *Create timeline from template* (refer to <<create-timeline-template>>)
* *Duplicate template*
Expand All @@ -138,7 +139,7 @@ NOTE: You cannot delete prebuilt templates.
You can import and export Timeline templates, which enables importing templates
from one space or {elastic-sec} instance to another. Exported templates are saved in an `ndjson` file.

. Go to *Timelines* -> *Templates*.
. Find **Timelines** in the main menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then select the **Templates** tab.
. To export templates, do one of the following:

* To export one template, click the *All actions* icon in the relevant row and
Expand Down
4 changes: 2 additions & 2 deletions docs/events/timeline-ui-overview.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ retrieved from the alert. For more information, refer to <<timeline-templates-ui

To make a new Timeline, choose one of the following:

* Go to **Timelines**, then click **Create new Timeline**.
* Find **Timelines** in the main menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then click **Create new Timeline**.
* Go to the Timeline bar (which is at the bottom of most pages), click the image:images/add-new-timeline-button.png[Click the add new button,20,20] button, then click **Create new Timeline template**.
* From an open Timeline or Timeline template, click **New** -> **New Timeline**.

Expand Down Expand Up @@ -174,7 +174,7 @@ space or {elastic-sec} instance to another. Exported Timelines are saved as `.nd

To export Timelines:

* Go to *Timelines*.
* Find **Timelines** in the main menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
* Either click the *All actions* menu in the relevant row and select *Export selected*, or select multiple Timelines and then click *Bulk actions* -> *Export selected*.

To import Timelines:
Expand Down
5 changes: 4 additions & 1 deletion docs/osquery/invest-guide-run-osquery.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,8 @@ image::images/osquery-investigation-guide.png[Shows a live query in an investiga

NOTE: You can only add Osquery to investigation guides for custom rules because prebuilt rules cannot be edited.

. Go to *Rules* -> *Detection rules (SIEM)*, select a rule, then click *Edit rule settings* on the rule details page.
. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the main menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
. Select a rule to open the its details, then click *Edit rule settings*.
. Select the *About* tab, then expand the rule's advanced settings.
. Scroll down to the Investigation guide section. In the toolbar, click the *Osquery* button (image:images/osquery-button.png[Click the Osquery button,20,20]).
.. Add a descriptive label for the query; for example, `Search for executables`.
Expand All @@ -39,6 +40,8 @@ image::images/setup-osquery-investigation-guide.png[width=70%][height=70%][Shows
[[run-live-queries-ig]]
=== Run live queries from an investigation guide

. Go to the *Rules* page. To access it, find **Detection rules (SIEM)** in the main menu or look for “Detection rules (SIEM)” using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
. Select a rule to open the its details.
. Go to *Rules* -> *Detection rules (SIEM)*, then select a rule to open its details.
. Go to the About section of the rule details page and click *Investigation guide*.
. Click the query. The Run Osquery pane displays with the *Query* field autofilled. Do the following:
Expand Down