Skip to content

Commit 4ad8f62

Browse files
mergify[bot]kqualters-elasticbenironsidejmikell821nastasha-solomon
authored
[8.4] [DOCS] Alerts now shown in process tree (backport #2309) (#2354)
Co-authored-by: Kevin Qualters <[email protected]> Co-authored-by: Benjamin Ironside Goldstein <[email protected]> Co-authored-by: Janeen Mikell-Straughn <[email protected]> Co-authored-by: nastasha-solomon <[email protected]>
1 parent 4cdf48b commit 4ad8f62

File tree

2 files changed

+18
-6
lines changed

2 files changed

+18
-6
lines changed
259 KB
Loading

docs/detections/visual-event-analyzer.asciidoc

Lines changed: 18 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
[role="xpack"]
33
== Visual event analyzer
44

5-
{elastic-sec} allows any event detected by {elastic-endpoint} to be analyzed using a process-based visual analyzer, which shows a graphical timeline of processes that led up to the alert and the events that occurred immediately after. Viewing events in the visual event analyzer is useful to determine the origin of potentially malicious activity and other areas in your environment that may be compromised. It also enables security analysts to drill down into all related hosts, processes, and other events to aid in their investigations.
5+
{elastic-sec} allows any event detected by {elastic-endpoint} to be analyzed using a process-based visual analyzer, which shows a graphical timeline of processes that led up to the alert and the events that occurred immediately after. Examining events in the visual event analyzer is useful to determine the origin of potentially malicious activity and other areas in your environment that may be compromised. It also enables security analysts to drill down into all related hosts, processes, and other events to aid in their investigations.
66

77
[float]
88
[[find-events-analyze]]
@@ -17,9 +17,9 @@ In KQL, this translates to any event with the `agent.type` set to either:
1717

1818
To find events that can be visually analyzed:
1919

20-
. First, view a list of events by doing one of the following:
20+
. First, display a list of events by doing one of the following:
2121
* Go to *Explore* -> *Hosts*, then select the *Events* tab. A list of all your hosts' events appears at the bottom of the page.
22-
* Go to *Alerts*, then scroll down to view the Alerts table.
22+
* Go to *Alerts*, then scroll down to the Alerts table.
2323
. Filter events that can be visually analyzed by entering either of the following queries in the KQL search bar, then selecting *Enter*:
2424
** `agent.type:"endpoint" and process.entity_id :*`
2525
+
@@ -49,7 +49,7 @@ TIP: You can also analyze events from <<timelines-ui,Timelines>>.
4949

5050
Within the visual analyzer, each cube represents a process, such as an executable file or network event. Click and drag in the analyzer to explore the hierarchy of all process relationships.
5151

52-
To understand what fields were used to create the process, select the **Process Tree** to view the schema that created the graphical view. The fields included are:
52+
To understand what fields were used to create the process, select the **Process Tree** to show the schema that created the graphical view. The fields included are:
5353

5454
* `SOURCE`: Can be either `endpoint` or `winlogbeat`
5555
* `ID`: Event field that uniquely identifies a node
@@ -58,7 +58,7 @@ To understand what fields were used to create the process, select the **Process
5858
[role="screenshot"]
5959
image::images/process-schema.png[]
6060

61-
View the **Legend** to understand the state of each process node.
61+
Click the **Legend** to show the state of each process node.
6262

6363
[role="screenshot"]
6464
image::images/node-legend.png[]
@@ -96,6 +96,7 @@ To learn more about each related process, select the process in the left panel o
9696
* The `process-pid`
9797
* The user name and domain that ran the process
9898
* Any other relevant process information
99+
* Any associated alerts
99100

100101
[role="screenshot"]
101102
image::images/process-details.png[]
@@ -109,9 +110,20 @@ Events are categorized based on the `event.category` value.
109110
[role="screenshot"]
110111
image::images/event-type.png[]
111112

112-
When you select an `event.category` pill, all the events within that category are listed in the left panel. To view more details about a specific event, select it from the list.
113+
When you select an `event.category` pill, all the events within that category are listed in the left panel. To display more details about a specific event, select it from the list.
113114

114115
[role="screenshot"]
115116
image::images/event-details.png[]
116117

117118
NOTE: In {stack} versions 7.10.0 and newer, there is no limit to the number of events that can be associated with a process. However, in {stack} versions 7.9.0 and earlier, each process is limited to only 100 events.
119+
120+
To examine alerts associated with the event, select the alert pill (*_x_ alert*). The left pane lists the total number of associated alerts, and alerts are ordered from oldest to newest. Each alert shows the type of event that produced it (`event.category`), the event timestamp (`@timestamp`), and rule that generated the alert (`kibana.alert.rule.name`). Click on the rule name to open the alert's details.
121+
122+
In the example screenshot below, five alerts were generated by the analyzed event (`lsass.exe`). The left pane displays the associated alerts and basic information about each one.
123+
124+
preview::[]
125+
126+
NOTE: This is a https://www.elastic.co/pricing[Platinum or Enterprise subscription] feature. In addition, to display it in {elastic-security} you must add the `xpack.securitySolution.enableExperimental: ['insightsRelatedAlertsByProcessAncestry']` feature flag to the `kibana.yml` file.
127+
128+
[role="screenshot"]
129+
image::images/alert-pill.png[]

0 commit comments

Comments
 (0)