Skip to content

Commit d15a540

Browse files
Merge branch 'main' into issue-2097-widget
2 parents 80089bf + 5e4f4c4 commit d15a540

19 files changed

+84
-60
lines changed

README.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,23 @@ Please view this template for guidance on creating issues: https://github.com/el
99
## Contributing to Elastic Security docs
1010

1111
If you are an Elastic employee and would like to contribute to Elastic Security documentation:
12+
1213
1. Please clone and fork the `security-docs` repo.
1314
2. Open an issue using the appropriate [template](https://github.com/elastic/security-docs/tree/master/.github/ISSUE_TEMPLATE).
1415
3. Check out the `main` branch and fetch the latest changes.
1516
4. Check out a new branch and make your changes.
1617
5. Save your changes and open a pull request.
17-
6. Tag the the `@security-docs` team and any other appropriate reviewers. We'll take care of merging and backporting.
18+
6. Add the `[@elastic/security-docs](https://github.com/orgs/elastic/teams/security-docs)` team and any other appropriate members as reviewers.
19+
7. Add the appropriate release version label, backport version label if appropriate, and team label to the PR.
20+
8. Once the docs team approves all changes, you can merge it. If a backport version label was added to a PR for stack versions 7.14.0 and newer, mergify will automatically open a backport PR.
21+
9. Merge the backport PR once it passes all CI checks.
22+
23+
### Preview documentation changes
24+
25+
Once the PR is opened, and the build complete, the changes can be previewed via this URL (replace `<YOUR_PR_NUMBER_HERE>` with the PR number):
26+
27+
```
28+
https://security-docs_<YOUR_PR_NUMBER_HERE>.docs-preview.app.elstc.co/guide/en/security/master
29+
```
30+
1831

docs/detections/alerts-ui-manage.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ NOTE: When updating alert results to include building block alerts, the Security
3939
[role="screenshot"]
4040
image::images/additional-filters.png[Alerts table with Additional filters menu highlighted]
4141

42-
* View detection alerts generated by a specific rule. Go to *Detect* -> *Rules*, then select a rule name in the table. The rule details page displays a comprehensive view of the rule's settings, and the Alerts table under the Trend histogram displays the alerts associated with the rule, including alerts from any previous or deleted revision of that rule.
42+
* View detection alerts generated by a specific rule. Go to *Manage* -> *Rules*, then select a rule name in the table. The rule details page displays a comprehensive view of the rule's settings, and the Alerts table under the Trend histogram displays the alerts associated with the rule, including alerts from any previous or deleted revision of that rule.
4343

4444
[float]
4545
[[customize-the-alerts-table]]

docs/detections/api/rules/rules-api-create.asciidoc

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -394,7 +394,7 @@ a value from the source event:
394394

395395
|rule_name_override |String |Sets which field in the source event is used to
396396
populate the alert's `signal.rule.name` value (in the UI, this value is
397-
displayed in the *Rule* column on the Detections page). When unspecified, the
397+
displayed on the *Rules* page in the *Rule* column). When unspecified, the
398398
rule's `name` value is used. The source field must be a string data type.
399399

400400
|severity_mapping |Object[] a|Overrides generated alerts' `severity` with
@@ -550,8 +550,7 @@ All fields are required:
550550
|==============================================
551551

552552
NOTE: Only threats described using the MITRE ATT&CK^TM^ framework are displayed
553-
in the UI (*Detections* -> *Manage detection rules* -> <rule
554-
name>).
553+
in the UI (*Manage* -> *Rules* -> *_Rule name_*).
555554

556555
===== Example requests
557556

docs/detections/api/rules/rules-api-export.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ You cannot export prebuilt rules, but they are available at https://github.com/e
1212
=================
1313
Although detection rule actions are included in the exported file, the connectors used by the actions are not included. Use the {kibana-ref}/managing-saved-objects.html#managing-saved-objects-export-objects[Saved Objects] UI in Kibana (*Stack Management* -> *Kibana* -> *Saved Objects*) or the Saved Objects APIs (experimental) to {kibana-ref}/saved-objects-api-export.html[export] and {kibana-ref}/saved-objects-api-import.html[import] any necessary connectors _before_ you export and import the detection rules.
1414
15-
Similarly, any value lists used for rule exceptions are not included in rule exports or imports. Use the <<edit-value-lists, Upload value lists>> UI (*Detect* -> *Rules* -> *Upload value lists*) to export and import value lists separately.
15+
Similarly, any value lists used for rule exceptions are not included in rule exports or imports. Use the <<edit-value-lists, Upload value lists>> UI (*Manage* -> *Rules* -> *Upload value lists*) to export and import value lists separately.
1616
=================
1717

1818
==== Request URL

docs/detections/api/rules/rules-api-import.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ NOTE: You need at least `Read` privileges for the `Action and Connectors` featur
1414
=================
1515
Although detection rule actions are included in the exported file, the connectors used by the actions are not included. Use the {kibana-ref}/managing-saved-objects.html#managing-saved-objects-export-objects[Saved Objects] UI in Kibana (*Stack Management* -> *Kibana* -> *Saved Objects*) or the Saved Objects APIs (experimental) to {kibana-ref}/saved-objects-api-export.html[export] and {kibana-ref}/saved-objects-api-import.html[import] any necessary connectors _before_ you export and import the detection rules.
1616
17-
Similarly, any value lists used for rule exceptions are not included in rule exports or imports. Use the <<edit-value-lists, Upload value lists>> UI (*Detect* -> *Rules* -> *Upload value lists*) to export and import value lists separately.
17+
Similarly, any value lists used for rule exceptions are not included in rule exports or imports. Use the <<edit-value-lists, Upload value lists>> UI (*Manage* -> *Rules* -> *Upload value lists*) to export and import value lists separately.
1818
=================
1919

2020
==== Request URL

docs/detections/api/rules/rules-api-update.asciidoc

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -310,7 +310,7 @@ a value from the source event:
310310

311311
|rule_name_override |String |Sets which field in the source event is used to
312312
populate the alert's `signal.rule.name` value (in the UI, this value is
313-
displayed in the *Rule* column on the Detections page). When unspecified, the
313+
displayed on the *Rules* page in the *Rule* column). When unspecified, the
314314
rule's `name` value is used. The source field must be a string data type.
315315

316316
|severity_mapping |Object[] a|Overrides generated alerts' `severity` with
@@ -427,8 +427,7 @@ technique:
427427
|==============================================
428428

429429
NOTE: Only threats described using the MITRE ATT&CK^TM^ framework are displayed
430-
in the UI (*Security* -> *Detections* -> *Manage detection rules* -> <rule
431-
name>).
430+
in the UI (*Manage* -> *Rules* -> *_Rule name_*).
432431

433432
===== Example request
434433

docs/detections/building-block-rule.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ image::images/alert-indices-ui.png[]
2626
By default, building block alerts are excluded from the Overview and Alerts pages.
2727
You can choose to include building block alerts on the Alerts page, which expands the number of alerts.
2828

29-
. Go to *Detect* -> *Alerts*.
29+
. Go to *Alerts*.
3030
. In the Alerts table, select *Additional filters* ->
3131
*Include building block alerts*, located on the far-right.
3232

docs/detections/detection-engine-intro.asciidoc

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@
33

44
= Detections and alerts
55

6-
Use the Detections feature to create and manage rules, and view the alerts
7-
these rules create. Rules periodically search indices (such as `endgame-*` and
8-
`filebeat-*`) for suspicious source events, and create alerts when a rule's
6+
Use the detection engine to create and manage rules and view the alerts
7+
these rules create. Rules periodically search indices (such as `logs-*` and
8+
`filebeat-*`) for suspicious source events and create alerts when a rule's
99
conditions are met. When an alert is created, its status is `Open`. To help
10-
track investigations, an alert's status can be set as `Open`, `Acknowledged`, or
11-
`Closed` (see <<detection-alert-status>>).
10+
track investigations, an alert's <<detection-alert-status,status>> can be set as
11+
`Open`, `Acknowledged`, or `Closed`.
1212

1313
[role="screenshot"]
14-
image::images/alert-page.png[Shows the Alerts page]
14+
image::images/alert-page.png[Alerts page]
1515

1616
In addition to creating <<rules-ui-create, your own rules>>, enable
1717
<<load-prebuilt-rules, Elastic prebuilt rules>> to immediately start detecting
@@ -195,26 +195,26 @@ NOTE: Ransomware prevention is a paid feature and is enabled by default if you h
195195
=== Resolve UI error messages
196196

197197
Depending on your privileges and whether detection system indices have already
198-
been created for the {kib} space, you might see an error message when you try
199-
to open the *Detections* page.
200-
201-
*`Let’s set up your detection engine`*
202-
203-
If you see this message, a user with specific privileges must visit the
204-
*Detections* page before you can view detection rules and alerts.
205-
See <<enable-detections-ui>> for a list of all the requirements.
198+
been created for the {kib} space, you might get one of these error messages when you
199+
open the *Alerts* or *Rules* page:
206200

201+
* *`Let’s set up your detection engine`*
202+
+
203+
If you get this message, a user with specific privileges must visit the
204+
*Alerts* or *Rules* page before you can view detection alerts and rules.
205+
Refer to <<enable-detections-ui>> for a list of all the requirements.
206+
+
207207
NOTE: For *self-managed* {stack} deployments only, this message may be displayed
208208
when the
209209
<<detections-permissions, `xpack.encryptedSavedObjects.encryptionKey`>>
210-
setting has not been added to the `kibana.yml` file. For more information, see <<detections-on-prem-requirements>>.
210+
setting has not been added to the `kibana.yml` file. For more information, refer to <<detections-on-prem-requirements>>.
211211

212-
*`Detection engine permissions required`*
213-
214-
If you see this message, you do not have the
212+
* *`Detection engine permissions required`*
213+
+
214+
If you get this message, you do not have the
215215
<<detections-permissions, required privileges>> to view the *Detections* feature,
216216
and you should contact your {kib} administrator.
217-
217+
+
218218
NOTE: For *self-managed* {stack} deployments only, this message may be
219219
displayed when the <<detections-permissions, `xpack.security.enabled`>>
220-
setting is not enabled in the `elasticsearch.yml` file. For more information, see <<detections-on-prem-requirements>>.
220+
setting is not enabled in the `elasticsearch.yml` file. For more information, refer to <<detections-on-prem-requirements>>.

docs/detections/detections-ui-exceptions.asciidoc

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ act as value delimiters.
4141
* Wildcards are not supported in rule exceptions or value lists. Values must be literal values.
4242
=========================
4343

44-
. Go to *Detect* -> *Rules*.
44+
. Go to *Manage* -> *Rules*.
4545
. Click *Upload value lists*. The *Upload value lists* window opens.
4646
+
4747
[role="screenshot"]
@@ -60,7 +60,7 @@ the new file are appended to the previously uploaded values.
6060

6161
To view, delete, or export existing value lists:
6262

63-
. Go to *Detect* -> *Rules*.
63+
. Go to *Manage* -> *Rules*.
6464
. Click *Upload value lists*. The *Upload value lists* window opens.
6565
. In the *Value lists* table, click the required action button.
6666

@@ -101,15 +101,15 @@ specific event in the sequence, update the rule's EQL statement. For example:
101101
--
102102
* To add an exception from the rule details page:
103103
.. Go to the rule details page of the rule to which you want to add an
104-
exception (*Detect* -> *Rules* -> *_<Rule name>_*).
104+
exception (*Manage* -> *Rules* -> *_<Rule name>_*).
105105
.. Scroll down below the rule details and select the *Exceptions* tab.
106106
+
107107
[role="screenshot"]
108108
image::images/exception-histogram.png[Detail of Exceptions tab, 75%]
109109
.. Click *Add new exception* -> *Add rule exception*.
110110

111111
* To add an exception from the Alerts table:
112-
.. Go to *Detect* -> *Alerts*.
112+
.. Go to *Alerts*.
113113
.. Scroll down to the Alerts table, go to the alert you want to create an exception for, click the *More Actions* menu (*...*), then select *Add rule exception*.
114114

115115
The *Add Rule Exception* flyout opens (the example below was opened from the Alerts table):
@@ -182,11 +182,11 @@ Additionally, to add an Endpoint exception to the Elastic Endpoint Security rule
182182
+
183183
--
184184
* To add an Endpoint exception from the rule details page:
185-
.. Go to the rule details page (*Detect* -> *Rules*), and then search for and select the Elastic *Endpoint Security* rule.
185+
.. Go to the rule details page (*Manage* -> *Rules*), and then search for and select the Elastic *Endpoint Security* rule.
186186
.. Scroll down to the *Trend* histogram and select the *Exceptions* tab.
187187
.. Click *Add new exception* -> *Add Endpoint exception*.
188188
* To add an Endpoint exception from the Alerts table:
189-
.. Go to *Detect* -> *Alerts*.
189+
.. Go to *Alerts*.
190190
.. Scroll down to the Alerts table, and from an {elastic-endpoint}
191191
alert, click the *More actions* menu (*...*), then select *Add Endpoint exception*.
192192
--
@@ -275,7 +275,7 @@ image::images/nested-exp.png[]
275275
[[manage-exceptions]]
276276
=== View and manage exception lists
277277

278-
The Exception lists table enables you to view and manage all exceptions that have been assigned to rules. To view the Exception lists table, go to *Detect* -> *Exception lists*.
278+
The Exception lists table enables you to view and manage all exceptions that have been assigned to rules. To view the Exception lists table, go to *Manage* -> *Exception lists*.
279279

280280
[role="screenshot"]
281281
image::images/exceptions-page.png[]

docs/detections/machine-learning/machine-learning.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@
33
= Anomaly Detection with Machine Learning
44

55
{ml-docs}/ml-ad-overview.html[{ml-cap}] functionality is available when
6-
you have the *{subscriptions}[appropriate license]*, are
7-
using a *{ess-trial}[cloud deployment]*, or are testing out a *Free Trial*.
6+
you have the appropriate subscription, are using a *{ess-trial}[cloud deployment]*,
7+
or are testing out a *Free Trial*. Refer to <<ml-requirements>>.
88

99
You can view the details of detected anomalies within the `Anomalies` table
1010
widget shown on the Hosts, Network, and associated details pages, or even narrow

0 commit comments

Comments
 (0)