Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -202,7 +202,7 @@ export const ALERT_SUMMARY_SYSTEM_PROMPT =
'{{"summary":"Markdown-formatted summary text.","recommendedActions":"Markdown-formatted action list starting with a ### header."}}';

export const RULE_ANALYSIS =
'Please provide a comprehensive analysis of each selected Elastic Security detection rule. For each rule, include:\n' +
'Please provide a comprehensive analysis of each selected Elastic Security detection rule, and consider using applicable tools for each part of the below request. Make sure you consider using appropriate tools available to you to fulfill this request. For each rule, include:\n' +
'- The rule name and a brief summary of its purpose.\n' +
'- The full detection query as published in Elastic’s official detection rules repository.\n' +
'- An in-depth explanation of how the query works, including key fields, logic, and detection techniques.\n' +
Expand All @@ -212,17 +212,17 @@ export const RULE_ANALYSIS =
'Format your response using markdown with clear headers for each rule, code blocks for queries, and concise bullet points for explanations.';

export const DATA_QUALITY_ANALYSIS =
'Explain the ECS incompatibility results above, and describe some options to fix incompatibilities. In your explanation, include information about remapping fields, reindexing data, and modifying data ingestion pipelines. Also, describe how ES|QL can be used to identify and correct incompatible data, including examples of using RENAME, EVAL, DISSECT, GROK, and CASE functions.';
'Explain the ECS incompatibility results above, and describe some options to fix incompatibilities. In your explanation, include information about remapping fields, reindexing data, and modifying data ingestion pipelines. Also, describe how ES|QL can be used to identify and correct incompatible data, including examples of using RENAME, EVAL, DISSECT, GROK, and CASE functions. Please consider using applicable tools for this request. Make sure you’ve used the right tools for this request.';

export const ALERT_EVALUATION = `Evaluate the security event described above and provide a structured, markdown-formatted summary suitable for inclusion in an Elastic Security case. Ensure you're using all tools available to you. Your response must include:
export const ALERT_EVALUATION = `Evaluate the security event described above and provide a structured, markdown-formatted summary suitable for inclusion in an Elastic Security case. Make sure you consider using appropriate tools available to you to fulfill this request. Your response must include:
1. Event Description
- Summarize the event, including user and host risk scores from the provided context.
- Reference relevant MITRE ATT&CK techniques, with hyperlinks to the official MITRE pages.
2. Triage Steps
- List clear, bulleted triage steps tailored to Elastic Security workflows (e.g., alert investigation, timeline creation, entity analytics review).
- Highlight any relevant detection rules or anomaly findings.
3. Recommended Actions
- Provide prioritized response actions, including:
- Provide prioritized response actions, and consider using applicable tools to generate each part of the response, including:
- Elastic Defend endpoint response actions (e.g., isolate host, kill process, retrieve/delete file), with links to Elastic documentation.
- Example ES|QL queries for further investigation, formatted as code blocks.
- Example OSQuery Manager queries for further investigation, formatted as code blocks.
Expand All @@ -231,6 +231,7 @@ export const ALERT_EVALUATION = `Evaluate the security event described above and
- Summarize the mapped MITRE ATT&CK techniques and provide actionable recommendations based on MITRE guidance, with hyperlinks.
5. Documentation Links
- Include direct links to all referenced Elastic Security documentation and MITRE ATT&CK pages.
Make sure you’ve used the right tools for this request.
Formatting Requirements:
- Use markdown headers, tables, and code blocks for clarity.
- Organize the response into visually distinct sections.
Expand Down Expand Up @@ -259,11 +260,12 @@ Analyzing user and host behavior using Entity Analytics.
Suggest Elastic Defend endpoint response actions (e.g., isolate host, kill process, retrieve/delete file), with links to Elastic documentation.
📚 Documentation and References
Include direct links to Elastic Security documentation and relevant MITRE ATT&CK pages for further guidance.
Make sure you use tools available to you to fulfill this request.
Use markdown headers, tables, and code blocks for clarity. Include relevant emojis for visual distinction and ensure the response is concise, actionable, and tailored to Elastic Security workflows.`;
export const starterPromptDescription2 = 'Latest Elastic Security Labs research';
export const starterPromptTitle2 = 'Research';
export const starterPromptIcon2 = 'launch';
export const starterPromptPrompt2 = `Retrieve and summarize the latest Elastic Security Labs articles one by one sorted by latest at the top. Ensure the response includes:
export const starterPromptPrompt2 = `Retrieve and summarize the latest Elastic Security Labs articles one by one sorted by latest at the top, and consider using all tools available to you to fulfill this request. Ensure the response includes:
Article Summaries
Title and Link: Provide the title of each article with a hyperlink to the original content.
Publication Date: Include the date the article was published.
Expand All @@ -279,7 +281,7 @@ Additional References: Provide links to any related Elastic documentation or ext
Formatting Requirements
Use markdown headers, tables, and code blocks for clarity.
Organize the response into visually distinct sections.
Use concise, actionable language.`;
Use concise, actionable language. Make sure you use tools available to you to fulfill this request.`;
export const starterPromptDescription3 = 'Generate ES|QL Queries';
export const starterPromptTitle3 = 'Query';
export const starterPromptIcon3 = 'esqlVis';
Expand All @@ -288,6 +290,7 @@ export const starterPromptPrompt3 =
'Goal/Requirement:\n' +
'<Insert your specific requirement or goal here, e.g., "Identify all failed login attempts from a specific IP address within the last 24 hours.">\n' +
'Please:\n' +
'Use all tools available to you to fulfill this request.\n' +
'Generate the ES|QL Query: Provide a complete ES|QL query tailored to the stated goal.\n' +
'Explain the Query: Offer a brief explanation of each part of the query, including filters, fields, and logic used.\n' +
'Optimize for Elastic Security: Suggest additional filters, aggregations, or enhancements to make the query more efficient and actionable within Elastic Security workflows.\n' +
Expand Down