|
3 | 3 |
|
4 | 4 | = Detections and alerts |
5 | 5 |
|
6 | | -Use the Detections feature to create and manage rules, and view the alerts |
7 | | -these rules create. Rules periodically search indices (such as `endgame-*` and |
8 | | -`filebeat-*`) for suspicious source events, and create alerts when a rule's |
| 6 | +Use the detection engine to create and manage rules and view the alerts |
| 7 | +these rules create. Rules periodically search indices (such as `logs-*` and |
| 8 | +`filebeat-*`) for suspicious source events and create alerts when a rule's |
9 | 9 | conditions are met. When an alert is created, its status is `Open`. To help |
10 | | -track investigations, an alert's status can be set as `Open`, `Acknowledged`, or |
11 | | -`Closed` (see <<detection-alert-status>>). |
| 10 | +track investigations, an alert's <<detection-alert-status,status>> can be set as |
| 11 | +`Open`, `Acknowledged`, or `Closed`. |
12 | 12 |
|
13 | 13 | [role="screenshot"] |
14 | | -image::images/alert-page.png[Shows the Alerts page] |
| 14 | +image::images/alert-page.png[Alerts page] |
15 | 15 |
|
16 | 16 | In addition to creating <<rules-ui-create, your own rules>>, enable |
17 | 17 | <<load-prebuilt-rules, Elastic prebuilt rules>> to immediately start detecting |
@@ -195,26 +195,26 @@ NOTE: Ransomware prevention is a paid feature and is enabled by default if you h |
195 | 195 | === Resolve UI error messages |
196 | 196 |
|
197 | 197 | Depending on your privileges and whether detection system indices have already |
198 | | -been created for the {kib} space, you might see an error message when you try |
199 | | -to open the *Detections* page. |
200 | | - |
201 | | -*`Let’s set up your detection engine`* |
202 | | - |
203 | | -If you see this message, a user with specific privileges must visit the |
204 | | -*Detections* page before you can view detection rules and alerts. |
205 | | -See <<enable-detections-ui>> for a list of all the requirements. |
| 198 | +been created for the {kib} space, you might get one of these error messages when you |
| 199 | +open the *Alerts* or *Rules* page: |
206 | 200 |
|
| 201 | +* *`Let’s set up your detection engine`* |
| 202 | ++ |
| 203 | +If you get this message, a user with specific privileges must visit the |
| 204 | +*Alerts* or *Rules* page before you can view detection alerts and rules. |
| 205 | +Refer to <<enable-detections-ui>> for a list of all the requirements. |
| 206 | ++ |
207 | 207 | NOTE: For *self-managed* {stack} deployments only, this message may be displayed |
208 | 208 | when the |
209 | 209 | <<detections-permissions, `xpack.encryptedSavedObjects.encryptionKey`>> |
210 | | -setting has not been added to the `kibana.yml` file. For more information, see <<detections-on-prem-requirements>>. |
| 210 | +setting has not been added to the `kibana.yml` file. For more information, refer to <<detections-on-prem-requirements>>. |
211 | 211 |
|
212 | | -*`Detection engine permissions required`* |
213 | | - |
214 | | -If you see this message, you do not have the |
| 212 | +* *`Detection engine permissions required`* |
| 213 | ++ |
| 214 | +If you get this message, you do not have the |
215 | 215 | <<detections-permissions, required privileges>> to view the *Detections* feature, |
216 | 216 | and you should contact your {kib} administrator. |
217 | | - |
| 217 | ++ |
218 | 218 | NOTE: For *self-managed* {stack} deployments only, this message may be |
219 | 219 | displayed when the <<detections-permissions, `xpack.security.enabled`>> |
220 | | -setting is not enabled in the `elasticsearch.yml` file. For more information, see <<detections-on-prem-requirements>>. |
| 220 | +setting is not enabled in the `elasticsearch.yml` file. For more information, refer to <<detections-on-prem-requirements>>. |
0 commit comments