Skip to content

Commit 94cbef5

Browse files
authored
[Docs]Security docs 7.9 updates (#75156) (#75250)
* security docs 7.9 updates * terminology * updates advanced settings * terminology * corrections
1 parent 94c59a8 commit 94cbef5

File tree

11 files changed

+59
-63
lines changed

11 files changed

+59
-63
lines changed

docs/management/advanced-options.asciidoc

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -224,19 +224,19 @@ might increase the search time. This setting is off by default. Users must opt-i
224224

225225
[float]
226226
[[kibana-siem-settings]]
227-
==== SIEM
227+
==== Security Solution
228228

229229
[horizontal]
230-
`siem:defaultAnomalyScore`:: The threshold above which Machine Learning job anomalies are displayed in the SIEM app.
231-
`siem:defaultIndex`:: A comma-delimited list of Elasticsearch indices from which the SIEM app collects events.
232-
`siem:ipReputationLinks`:: A JSON array containing links for verifying the reputation of an IP address. The links are displayed on
233-
{security-guide}/siem-ui-overview.html#network-ui[IP detail] pages.
234-
`siem:enableNewsFeed`:: Enables the security news feed on the SIEM *Overview*
230+
`securitySolution:defaultAnomalyScore`:: The threshold above which Machine Learning job anomalies are displayed in the Security app.
231+
`securitySolution:defaultIndex`:: A comma-delimited list of Elasticsearch indices from which the Security app collects events.
232+
`securitySolution:ipReputationLinks`:: A JSON array containing links for verifying the reputation of an IP address. The links are displayed on
233+
{security-guide}/network-page-overview.html[IP detail] pages.
234+
`securitySolution:enableNewsFeed`:: Enables the security news feed on the Security *Overview*
235235
page.
236-
`siem:newsFeedUrl`:: The URL from which the security news feed content is
236+
`securitySolution:newsFeedUrl`:: The URL from which the security news feed content is
237237
retrieved.
238-
`siem:refreshIntervalDefaults`:: The default refresh interval for the SIEM time filter, in milliseconds.
239-
`siem:timeDefaults`:: The default period of time in the SIEM time filter.
238+
`securitySolution:refreshIntervalDefaults`:: The default refresh interval for the Security time filter, in milliseconds.
239+
`securitySolution:timeDefaults`:: The default period of time in the Security time filter.
240240

241241
[float]
242242
[[kibana-timelion-settings]]

docs/siem/images/cases-ui.png

-160 KB
Loading

docs/siem/images/detections-ui.png

-215 KB
Loading

docs/siem/images/hosts-ui.png

-231 KB
Loading

docs/siem/images/ml-ui.png

-40.8 KB
Loading

docs/siem/images/network-ui.png

-382 KB
Loading

docs/siem/images/overview-ui.png

-206 KB
Loading

docs/siem/images/timeline-ui.png

-348 KB
Loading

docs/siem/index.asciidoc

Lines changed: 16 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,22 @@
11
[role="xpack"]
22
[[xpack-siem]]
3-
= SIEM
3+
= Elastic Security
44

55
[partintro]
66
--
77

8-
The SIEM app in Kibana provides an interactive workspace for security teams to
9-
triage events and perform initial investigations. It enables analysis of
10-
host-related and network-related security events as part of alert investigations
11-
or interactive threat hunting.
8+
Elastic Security combines SIEM threat detection features with endpoint
9+
prevention and response capabilities in one solution, including:
1210

11+
* A detection engine to identify attacks and system misconfiguration
12+
* A workspace for event triage and investigations
13+
* Interactive visualizations to investigate process relationships
14+
* Embedded case management and automated actions
15+
* Detection of signatureless attacks with prebuilt {ml} anomaly jobs and
16+
detection rules
1317

1418
[role="screenshot"]
15-
image::siem/images/overview-ui.png[SIEM Overview in Kibana]
16-
19+
image::siem/images/overview-ui.png[Elastic Security in Kibana]
1720

1821
[float]
1922
== Add data
@@ -31,15 +34,14 @@ https://www.elastic.co/products/beats/winlogbeat[{winlogbeat}], and
3134
https://www.elastic.co/products/beats/packetbeat[{packetbeat}]
3235
send security events and other data to Elasticsearch.
3336

34-
The default index patterns for SIEM events are `auditbeat-*`, `winlogbeat-*`,
35-
`filebeat-*`, `packetbeat-*`, `endgame-*`, and `apm-*-transaction*`. You can
36-
change the default index patterns in
37-
*Kibana > Management > Advanced Settings > siem:defaultIndex*.
37+
The default index patterns for Elastic Security events are `auditbeat-*`, `winlogbeat-*`,
38+
`filebeat-*`, `packetbeat-*`, `endgame-*`, `logs-*`, and `apm-*-transaction*`. To change the default pattern patterns, go to *Stack Management > Advanced Settings > securitySolution:defaultIndex*.
3839

3940
[float]
40-
=== Elastic Endpoint Sensor Management Platform
41+
=== Elastic Security endpoint agent
4142

42-
The Elastic Endpoint Sensor Management Platform (SMP) ships host and network events directly to the SIEM application, and is fully ECS compliant.
43+
The agent detects and protects against malware, and ships host and network
44+
events directly to Elastic Security.
4345

4446
[float]
4547
=== Elastic Common Schema (ECS) for normalizing data
@@ -49,7 +51,7 @@ used for storing event data in Elasticsearch. ECS helps users normalize their
4951
event data to better analyze, visualize, and correlate the data represented in
5052
their events.
5153

52-
SIEM can ingest and normalize events from ECS-compatible data sources.
54+
Elastic Security can ingest and normalize events from ECS-compatible data sources.
5355

5456
--
5557

docs/siem/machine-learning.asciidoc

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,12 @@
33
== Anomaly Detection with Machine Learning
44

55
For *{ess-trial}[Free Trial]*
6-
and *https://www.elastic.co/subscriptions[Platinum License]* deployments,
7-
Machine Learning functionality is available throughout the SIEM app. You can
8-
view the details of detected anomalies within the `Anomalies` table widget
9-
shown on the Hosts, Network and associated Details pages, or even narrow to
10-
the specific daterange of an anomaly from the `Max Anomaly Score` details in
11-
the overview of the Host and IP Details pages. Each of these interfaces also
12-
offer the ability to drag and drop details of the anomaly to Timeline, such
13-
as the `Entity` itself, or any of the associated `Influencers`.
6+
and *https://www.elastic.co/subscriptions[Platinum subscription]* deployments,
7+
Machine Learning functionality is available throughout Elastic Security. You can
8+
view the details of detected anomalies in the `Anomalies` table
9+
shown on the Hosts, Network and associated details pages. You can drag and drop
10+
anomaly details to Timeline, such as the `Entity` itself, or any of the
11+
associated `Influencers`.
1412

1513
[role="screenshot"]
1614
image::siem/images/ml-ui.png[Machine Learning - Max Anomaly Score]

0 commit comments

Comments
 (0)