Skip to content

[Attack Discovery][Scheduling] Make "For each alert" a default action frequency#225890

Merged
e40pud merged 10 commits intoelastic:mainfrom
e40pud:security/genai/ad-schedule/default-action-frequency
Jul 2, 2025
Merged

[Attack Discovery][Scheduling] Make "For each alert" a default action frequency#225890
e40pud merged 10 commits intoelastic:mainfrom
e40pud:security/genai/ad-schedule/default-action-frequency

Conversation

@e40pud
Copy link
Contributor

@e40pud e40pud commented Jun 30, 2025

Summary

This came from a testing party which we did with the team on June 30th.

There are a list of attack specific fields which are helpful for the user while creating an action for the attack discovery schedule. Those fields are present within the context when the actions frequency set to "For each alert" and located under the context.attack.*.

While testing this functionality, @peluja1012 and @stephmilovic found it not clear that attack context fields are only present in case of "For each alert" frequency. One of the reasons was the fact that we set the "Summary of alerts" frequency as a default one.

Screenshot 2025-06-30 at 19 02 31

With these changes we improve the behaviour and make "For each alert" frequency a default one. This way user will have immediately the access to those context fields and more likely to use them.

Screenshot 2025-06-30 at 19 03 23

To test

  1. Navigate to the Attack Discovery page
  2. Open Settings flyout
  3. Open Schedule tab
  4. Click "Create new schedule" button
  5. Select one of the actions to add (slack, email etc.)

Expected behaviour: the "For each alert" frequency should be selected by default and context.attack.* fields should be available in the "Add variable" popover.

NOTES

The feature is hidden behind the feature flag (in kibana.dev.yml):

feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: true
  securitySolution.assistantAttackDiscoverySchedulingEnabled: true

@e40pud e40pud requested a review from andrew-goldstein June 30, 2025 17:08
@e40pud e40pud self-assigned this Jun 30, 2025
@e40pud e40pud added the release_note:skip Skip the PR/issue when compiling release notes label Jun 30, 2025
@e40pud e40pud requested review from a team as code owners June 30, 2025 17:08
@e40pud e40pud added Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. Team:Security Generative AI Security Generative AI backport:version Backport to applied version labels v9.1.0 v8.19.0 v9.2.0 labels Jun 30, 2025
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-solution (Team: SecuritySolution)

Copy link
Contributor

@andrew-goldstein andrew-goldstein left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @e40pud for improving the UX through this updated default! 🙏
✅ Desk tested locally
LGTM 🚀

@e40pud e40pud enabled auto-merge (squash) July 1, 2025 17:14
@e40pud e40pud disabled auto-merge July 2, 2025 07:45
@elasticmachine
Copy link
Contributor

💚 Build Succeeded

Metrics [docs]

Async chunks

Total size of all lazy-loaded chunks that will be downloaded as the user navigates the app

id before after diff
securitySolution 9.8MB 9.8MB +109.0B

History

cc @e40pud

@e40pud e40pud merged commit f606dec into elastic:main Jul 2, 2025
10 checks passed
@kibanamachine
Copy link
Contributor

Starting backport for target branches: 8.19, 9.1

https://github.com/elastic/kibana/actions/runs/16023199451

kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Jul 2, 2025
… frequency (elastic#225890)

## Summary

This came from a testing party which we did with the team on June 30th.

There are a list of attack specific fields which are helpful for the
user while creating an action for the attack discovery schedule. Those
fields are present within the context when the actions frequency set to
`"For each alert"` and located under the `context.attack.*`.

While testing this functionality, @peluja1012 and @stephmilovic found it
not clear that attack context fields are only present in case of `"For
each alert"` frequency. One of the reasons was the fact that we set the
`"Summary of alerts"` frequency as a default one.

<img width="944" alt="Screenshot 2025-06-30 at 19 02 31"
src="https://github.com/user-attachments/assets/7f7a8aba-c820-47be-8f10-04df50f5af67"
/>

With these changes we improve the behaviour and make `"For each alert"`
frequency a default one. This way user will have immediately the access
to those context fields and more likely to use them.

<img width="1259" alt="Screenshot 2025-06-30 at 19 03 23"
src="https://github.com/user-attachments/assets/1a5f44b7-2cf8-41b1-9bbd-c0507ef42eda"
/>

### To test

1. Navigate to the Attack Discovery page
2. Open Settings flyout
3. Open Schedule tab
4. Click "Create new schedule" button
5. Select one of the actions to add (slack, email etc.)

**Expected behaviour**: the `"For each alert"` frequency should be
selected by default and `context.attack.*` fields should be available in
the `"Add variable"` popover.

## NOTES

The feature is hidden behind the feature flag (in `kibana.dev.yml`):

```
feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: true
  securitySolution.assistantAttackDiscoverySchedulingEnabled: true
```

(cherry picked from commit f606dec)
kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Jul 2, 2025
… frequency (elastic#225890)

## Summary

This came from a testing party which we did with the team on June 30th.

There are a list of attack specific fields which are helpful for the
user while creating an action for the attack discovery schedule. Those
fields are present within the context when the actions frequency set to
`"For each alert"` and located under the `context.attack.*`.

While testing this functionality, @peluja1012 and @stephmilovic found it
not clear that attack context fields are only present in case of `"For
each alert"` frequency. One of the reasons was the fact that we set the
`"Summary of alerts"` frequency as a default one.

<img width="944" alt="Screenshot 2025-06-30 at 19 02 31"
src="https://github.com/user-attachments/assets/7f7a8aba-c820-47be-8f10-04df50f5af67"
/>

With these changes we improve the behaviour and make `"For each alert"`
frequency a default one. This way user will have immediately the access
to those context fields and more likely to use them.

<img width="1259" alt="Screenshot 2025-06-30 at 19 03 23"
src="https://github.com/user-attachments/assets/1a5f44b7-2cf8-41b1-9bbd-c0507ef42eda"
/>

### To test

1. Navigate to the Attack Discovery page
2. Open Settings flyout
3. Open Schedule tab
4. Click "Create new schedule" button
5. Select one of the actions to add (slack, email etc.)

**Expected behaviour**: the `"For each alert"` frequency should be
selected by default and `context.attack.*` fields should be available in
the `"Add variable"` popover.

## NOTES

The feature is hidden behind the feature flag (in `kibana.dev.yml`):

```
feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: true
  securitySolution.assistantAttackDiscoverySchedulingEnabled: true
```

(cherry picked from commit f606dec)
@kibanamachine
Copy link
Contributor

💚 All backports created successfully

Status Branch Result
8.19
9.1

Note: Successful backport PRs will be merged automatically after passing CI.

Questions ?

Please refer to the Backport tool documentation

kibanamachine added a commit that referenced this pull request Jul 2, 2025
…action frequency (#225890) (#226156)

# Backport

This will backport the following commits from `main` to `9.1`:
- [[Attack Discovery][Scheduling] Make "For each alert" a default action
frequency (#225890)](#225890)

<!--- Backport version: 9.6.6 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sorenlouv/backport)

<!--BACKPORT [{"author":{"name":"Ievgen
Sorokopud","email":"ievgen.sorokopud@elastic.co"},"sourceCommit":{"committedDate":"2025-07-02T10:54:45Z","message":"[Attack
Discovery][Scheduling] Make \"For each alert\" a default action
frequency (#225890)\n\n## Summary\n\nThis came from a testing party
which we did with the team on June 30th.\n\nThere are a list of attack
specific fields which are helpful for the\nuser while creating an action
for the attack discovery schedule. Those\nfields are present within the
context when the actions frequency set to\n`\"For each alert\"` and
located under the `context.attack.*`.\n\nWhile testing this
functionality, @peluja1012 and @stephmilovic found it\nnot clear that
attack context fields are only present in case of `\"For\neach alert\"`
frequency. One of the reasons was the fact that we set the\n`\"Summary
of alerts\"` frequency as a default one.\n\n<img width=\"944\"
alt=\"Screenshot 2025-06-30 at 19 02
31\"\nsrc=\"https://github.com/user-attachments/assets/7f7a8aba-c820-47be-8f10-04df50f5af67\"\n/>\n\nWith
these changes we improve the behaviour and make `\"For each
alert\"`\nfrequency a default one. This way user will have immediately
the access\nto those context fields and more likely to use them.\n\n<img
width=\"1259\" alt=\"Screenshot 2025-06-30 at 19 03
23\"\nsrc=\"https://github.com/user-attachments/assets/1a5f44b7-2cf8-41b1-9bbd-c0507ef42eda\"\n/>\n\n###
To test\n\n1. Navigate to the Attack Discovery page\n2. Open Settings
flyout\n3. Open Schedule tab\n4. Click \"Create new schedule\"
button\n5. Select one of the actions to add (slack, email
etc.)\n\n**Expected behaviour**: the `\"For each alert\"` frequency
should be\nselected by default and `context.attack.*` fields should be
available in\nthe `\"Add variable\"` popover.\n\n## NOTES\n\nThe feature
is hidden behind the feature flag (in
`kibana.dev.yml`):\n\n```\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: true\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
true\n```","sha":"f606dec7d5fbef8fc8b48847221ace3a4cf28924","branchLabelMapping":{"^v9.2.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","Team:
SecuritySolution","Team:Security Generative
AI","backport:version","v9.1.0","v8.19.0","v9.2.0"],"title":"[Attack
Discovery][Scheduling] Make \"For each alert\" a default action
frequency","number":225890,"url":"https://github.com/elastic/kibana/pull/225890","mergeCommit":{"message":"[Attack
Discovery][Scheduling] Make \"For each alert\" a default action
frequency (#225890)\n\n## Summary\n\nThis came from a testing party
which we did with the team on June 30th.\n\nThere are a list of attack
specific fields which are helpful for the\nuser while creating an action
for the attack discovery schedule. Those\nfields are present within the
context when the actions frequency set to\n`\"For each alert\"` and
located under the `context.attack.*`.\n\nWhile testing this
functionality, @peluja1012 and @stephmilovic found it\nnot clear that
attack context fields are only present in case of `\"For\neach alert\"`
frequency. One of the reasons was the fact that we set the\n`\"Summary
of alerts\"` frequency as a default one.\n\n<img width=\"944\"
alt=\"Screenshot 2025-06-30 at 19 02
31\"\nsrc=\"https://github.com/user-attachments/assets/7f7a8aba-c820-47be-8f10-04df50f5af67\"\n/>\n\nWith
these changes we improve the behaviour and make `\"For each
alert\"`\nfrequency a default one. This way user will have immediately
the access\nto those context fields and more likely to use them.\n\n<img
width=\"1259\" alt=\"Screenshot 2025-06-30 at 19 03
23\"\nsrc=\"https://github.com/user-attachments/assets/1a5f44b7-2cf8-41b1-9bbd-c0507ef42eda\"\n/>\n\n###
To test\n\n1. Navigate to the Attack Discovery page\n2. Open Settings
flyout\n3. Open Schedule tab\n4. Click \"Create new schedule\"
button\n5. Select one of the actions to add (slack, email
etc.)\n\n**Expected behaviour**: the `\"For each alert\"` frequency
should be\nselected by default and `context.attack.*` fields should be
available in\nthe `\"Add variable\"` popover.\n\n## NOTES\n\nThe feature
is hidden behind the feature flag (in
`kibana.dev.yml`):\n\n```\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: true\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
true\n```","sha":"f606dec7d5fbef8fc8b48847221ace3a4cf28924"}},"sourceBranch":"main","suggestedTargetBranches":["9.1","8.19"],"targetPullRequestStates":[{"branch":"9.1","label":"v9.1.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"main","label":"v9.2.0","branchLabelMappingKey":"^v9.2.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/225890","number":225890,"mergeCommit":{"message":"[Attack
Discovery][Scheduling] Make \"For each alert\" a default action
frequency (#225890)\n\n## Summary\n\nThis came from a testing party
which we did with the team on June 30th.\n\nThere are a list of attack
specific fields which are helpful for the\nuser while creating an action
for the attack discovery schedule. Those\nfields are present within the
context when the actions frequency set to\n`\"For each alert\"` and
located under the `context.attack.*`.\n\nWhile testing this
functionality, @peluja1012 and @stephmilovic found it\nnot clear that
attack context fields are only present in case of `\"For\neach alert\"`
frequency. One of the reasons was the fact that we set the\n`\"Summary
of alerts\"` frequency as a default one.\n\n<img width=\"944\"
alt=\"Screenshot 2025-06-30 at 19 02
31\"\nsrc=\"https://github.com/user-attachments/assets/7f7a8aba-c820-47be-8f10-04df50f5af67\"\n/>\n\nWith
these changes we improve the behaviour and make `\"For each
alert\"`\nfrequency a default one. This way user will have immediately
the access\nto those context fields and more likely to use them.\n\n<img
width=\"1259\" alt=\"Screenshot 2025-06-30 at 19 03
23\"\nsrc=\"https://github.com/user-attachments/assets/1a5f44b7-2cf8-41b1-9bbd-c0507ef42eda\"\n/>\n\n###
To test\n\n1. Navigate to the Attack Discovery page\n2. Open Settings
flyout\n3. Open Schedule tab\n4. Click \"Create new schedule\"
button\n5. Select one of the actions to add (slack, email
etc.)\n\n**Expected behaviour**: the `\"For each alert\"` frequency
should be\nselected by default and `context.attack.*` fields should be
available in\nthe `\"Add variable\"` popover.\n\n## NOTES\n\nThe feature
is hidden behind the feature flag (in
`kibana.dev.yml`):\n\n```\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: true\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
true\n```","sha":"f606dec7d5fbef8fc8b48847221ace3a4cf28924"}}]}]
BACKPORT-->

Co-authored-by: Ievgen Sorokopud <ievgen.sorokopud@elastic.co>
kibanamachine added a commit that referenced this pull request Jul 2, 2025
… action frequency (#225890) (#226155)

# Backport

This will backport the following commits from `main` to `8.19`:
- [[Attack Discovery][Scheduling] Make "For each alert" a default action
frequency (#225890)](#225890)

<!--- Backport version: 9.6.6 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sorenlouv/backport)

<!--BACKPORT [{"author":{"name":"Ievgen
Sorokopud","email":"ievgen.sorokopud@elastic.co"},"sourceCommit":{"committedDate":"2025-07-02T10:54:45Z","message":"[Attack
Discovery][Scheduling] Make \"For each alert\" a default action
frequency (#225890)\n\n## Summary\n\nThis came from a testing party
which we did with the team on June 30th.\n\nThere are a list of attack
specific fields which are helpful for the\nuser while creating an action
for the attack discovery schedule. Those\nfields are present within the
context when the actions frequency set to\n`\"For each alert\"` and
located under the `context.attack.*`.\n\nWhile testing this
functionality, @peluja1012 and @stephmilovic found it\nnot clear that
attack context fields are only present in case of `\"For\neach alert\"`
frequency. One of the reasons was the fact that we set the\n`\"Summary
of alerts\"` frequency as a default one.\n\n<img width=\"944\"
alt=\"Screenshot 2025-06-30 at 19 02
31\"\nsrc=\"https://github.com/user-attachments/assets/7f7a8aba-c820-47be-8f10-04df50f5af67\"\n/>\n\nWith
these changes we improve the behaviour and make `\"For each
alert\"`\nfrequency a default one. This way user will have immediately
the access\nto those context fields and more likely to use them.\n\n<img
width=\"1259\" alt=\"Screenshot 2025-06-30 at 19 03
23\"\nsrc=\"https://github.com/user-attachments/assets/1a5f44b7-2cf8-41b1-9bbd-c0507ef42eda\"\n/>\n\n###
To test\n\n1. Navigate to the Attack Discovery page\n2. Open Settings
flyout\n3. Open Schedule tab\n4. Click \"Create new schedule\"
button\n5. Select one of the actions to add (slack, email
etc.)\n\n**Expected behaviour**: the `\"For each alert\"` frequency
should be\nselected by default and `context.attack.*` fields should be
available in\nthe `\"Add variable\"` popover.\n\n## NOTES\n\nThe feature
is hidden behind the feature flag (in
`kibana.dev.yml`):\n\n```\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: true\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
true\n```","sha":"f606dec7d5fbef8fc8b48847221ace3a4cf28924","branchLabelMapping":{"^v9.2.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","Team:
SecuritySolution","Team:Security Generative
AI","backport:version","v9.1.0","v8.19.0","v9.2.0"],"title":"[Attack
Discovery][Scheduling] Make \"For each alert\" a default action
frequency","number":225890,"url":"https://github.com/elastic/kibana/pull/225890","mergeCommit":{"message":"[Attack
Discovery][Scheduling] Make \"For each alert\" a default action
frequency (#225890)\n\n## Summary\n\nThis came from a testing party
which we did with the team on June 30th.\n\nThere are a list of attack
specific fields which are helpful for the\nuser while creating an action
for the attack discovery schedule. Those\nfields are present within the
context when the actions frequency set to\n`\"For each alert\"` and
located under the `context.attack.*`.\n\nWhile testing this
functionality, @peluja1012 and @stephmilovic found it\nnot clear that
attack context fields are only present in case of `\"For\neach alert\"`
frequency. One of the reasons was the fact that we set the\n`\"Summary
of alerts\"` frequency as a default one.\n\n<img width=\"944\"
alt=\"Screenshot 2025-06-30 at 19 02
31\"\nsrc=\"https://github.com/user-attachments/assets/7f7a8aba-c820-47be-8f10-04df50f5af67\"\n/>\n\nWith
these changes we improve the behaviour and make `\"For each
alert\"`\nfrequency a default one. This way user will have immediately
the access\nto those context fields and more likely to use them.\n\n<img
width=\"1259\" alt=\"Screenshot 2025-06-30 at 19 03
23\"\nsrc=\"https://github.com/user-attachments/assets/1a5f44b7-2cf8-41b1-9bbd-c0507ef42eda\"\n/>\n\n###
To test\n\n1. Navigate to the Attack Discovery page\n2. Open Settings
flyout\n3. Open Schedule tab\n4. Click \"Create new schedule\"
button\n5. Select one of the actions to add (slack, email
etc.)\n\n**Expected behaviour**: the `\"For each alert\"` frequency
should be\nselected by default and `context.attack.*` fields should be
available in\nthe `\"Add variable\"` popover.\n\n## NOTES\n\nThe feature
is hidden behind the feature flag (in
`kibana.dev.yml`):\n\n```\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: true\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
true\n```","sha":"f606dec7d5fbef8fc8b48847221ace3a4cf28924"}},"sourceBranch":"main","suggestedTargetBranches":["9.1","8.19"],"targetPullRequestStates":[{"branch":"9.1","label":"v9.1.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"main","label":"v9.2.0","branchLabelMappingKey":"^v9.2.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/225890","number":225890,"mergeCommit":{"message":"[Attack
Discovery][Scheduling] Make \"For each alert\" a default action
frequency (#225890)\n\n## Summary\n\nThis came from a testing party
which we did with the team on June 30th.\n\nThere are a list of attack
specific fields which are helpful for the\nuser while creating an action
for the attack discovery schedule. Those\nfields are present within the
context when the actions frequency set to\n`\"For each alert\"` and
located under the `context.attack.*`.\n\nWhile testing this
functionality, @peluja1012 and @stephmilovic found it\nnot clear that
attack context fields are only present in case of `\"For\neach alert\"`
frequency. One of the reasons was the fact that we set the\n`\"Summary
of alerts\"` frequency as a default one.\n\n<img width=\"944\"
alt=\"Screenshot 2025-06-30 at 19 02
31\"\nsrc=\"https://github.com/user-attachments/assets/7f7a8aba-c820-47be-8f10-04df50f5af67\"\n/>\n\nWith
these changes we improve the behaviour and make `\"For each
alert\"`\nfrequency a default one. This way user will have immediately
the access\nto those context fields and more likely to use them.\n\n<img
width=\"1259\" alt=\"Screenshot 2025-06-30 at 19 03
23\"\nsrc=\"https://github.com/user-attachments/assets/1a5f44b7-2cf8-41b1-9bbd-c0507ef42eda\"\n/>\n\n###
To test\n\n1. Navigate to the Attack Discovery page\n2. Open Settings
flyout\n3. Open Schedule tab\n4. Click \"Create new schedule\"
button\n5. Select one of the actions to add (slack, email
etc.)\n\n**Expected behaviour**: the `\"For each alert\"` frequency
should be\nselected by default and `context.attack.*` fields should be
available in\nthe `\"Add variable\"` popover.\n\n## NOTES\n\nThe feature
is hidden behind the feature flag (in
`kibana.dev.yml`):\n\n```\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: true\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
true\n```","sha":"f606dec7d5fbef8fc8b48847221ace3a4cf28924"}}]}]
BACKPORT-->

Co-authored-by: Ievgen Sorokopud <ievgen.sorokopud@elastic.co>
kertal pushed a commit to kertal/kibana that referenced this pull request Jul 25, 2025
… frequency (elastic#225890)

## Summary

This came from a testing party which we did with the team on June 30th.

There are a list of attack specific fields which are helpful for the
user while creating an action for the attack discovery schedule. Those
fields are present within the context when the actions frequency set to
`"For each alert"` and located under the `context.attack.*`.

While testing this functionality, @peluja1012 and @stephmilovic found it
not clear that attack context fields are only present in case of `"For
each alert"` frequency. One of the reasons was the fact that we set the
`"Summary of alerts"` frequency as a default one.

<img width="944" alt="Screenshot 2025-06-30 at 19 02 31"
src="https://github.com/user-attachments/assets/7f7a8aba-c820-47be-8f10-04df50f5af67"
/>

With these changes we improve the behaviour and make `"For each alert"`
frequency a default one. This way user will have immediately the access
to those context fields and more likely to use them.

<img width="1259" alt="Screenshot 2025-06-30 at 19 03 23"
src="https://github.com/user-attachments/assets/1a5f44b7-2cf8-41b1-9bbd-c0507ef42eda"
/>

### To test

1. Navigate to the Attack Discovery page
2. Open Settings flyout
3. Open Schedule tab
4. Click "Create new schedule" button
5. Select one of the actions to add (slack, email etc.)

**Expected behaviour**: the `"For each alert"` frequency should be
selected by default and `context.attack.*` fields should be available in
the `"Add variable"` popover.

## NOTES

The feature is hidden behind the feature flag (in `kibana.dev.yml`):

```
feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: true
  securitySolution.assistantAttackDiscoverySchedulingEnabled: true
```
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

backport:version Backport to applied version labels release_note:skip Skip the PR/issue when compiling release notes Team:Security Generative AI Security Generative AI Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. v8.19.0 v9.1.0 v9.2.0

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants