Skip to content

[Security Solution] Enable endpoint actions for events #206857

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged

Conversation

christineweng
Copy link
Contributor

@christineweng christineweng commented Jan 15, 2025

Summary

This PR enabled endpoint actions for generic events (in addition to alerts). We want to allow users to perform endpoint related actions like isolate host and respond in the flyout. Main use case is to perform endpoint actions when investigating in analyzer.

Before
image

After
Enabled for events when host uses elastic defend
image

Disabled when host cannot be isolated
image

Checklist

  • Unit or functional tests were updated or added to match the most common scenarios
  • The PR description includes the appropriate Release Notes section, and the correct release_note:* label is applied per the guidelines

@christineweng christineweng self-assigned this Jan 15, 2025
@christineweng christineweng added release_note:enhancement Team:Threat Hunting:Investigations Security Solution Threat Hunting Investigations Team backport:version Backport to applied version labels v9.1.0 v8.19.0 labels Mar 4, 2025
@christineweng christineweng force-pushed the endpoint-action-in-event-flyout branch from 7f0dd26 to b396bf6 Compare March 4, 2025 03:30
@christineweng christineweng marked this pull request as ready for review March 4, 2025 15:21
@christineweng christineweng requested review from a team as code owners March 4, 2025 15:21
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-threat-hunting-investigations (Team:Threat Hunting:Investigations)

@christineweng christineweng changed the title [Security Solution] POC - Enable endpoint actions for events [Security Solution] Enable endpoint actions for events Mar 4, 2025
@pzl pzl requested review from paul-tavares and removed request for pzl March 4, 2025 15:41
@szwarckonrad szwarckonrad requested review from tomsonpl and removed request for szwarckonrad March 5, 2025 08:41
Copy link
Contributor

@tomsonpl tomsonpl left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good to me, however not sure what was the reason to limiting this to Alerts only in the first place.
@paul-tavares do you remember by any chance?

@paul-tavares
Copy link
Contributor

"...not sure what was the reason to limiting this to Alerts only in the first place. @paul-tavares do you remember by any chance?"

I don't remember now we made that decision when Endgame come over to Elastic. Perhaps because we only foresaw users doing actions on host while responding to a threat. That being said, adding it events has been something that we have been wanting todo for a while now. You could ask Caitlyn for more background on here is you like - she may remember more details.


@christineweng - I'll review this sometime today. Sorry for the delay.

Copy link
Contributor

@paul-tavares paul-tavares left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good. Thank you for working on this and enabling it. I checked out the PR and loaded endpoint, sentinelone and Microsoft data and it all seems to work as we expect it. 👍

Remember to let the docs team know to list this as new functionality in the release notes (for serverless first since this will be released there first).

@christineweng
Copy link
Contributor Author

@tomsonpl @paul-tavares Thank you both for the review! Here is the doc issue

Copy link
Contributor

@lgestc lgestc left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

investigations changes looking good

@christineweng christineweng force-pushed the endpoint-action-in-event-flyout branch from f1b281b to 10d6734 Compare March 14, 2025 19:43
@elasticmachine
Copy link
Contributor

💛 Build succeeded, but was flaky

Failed CI Steps

Test Failures

  • [job] [logs] FTR Configs #108 / ObservabilityApp Observability Rules page Create rules form "after each" hook for "Should allow the user to select consumers when creating ES query rules"
  • [job] [logs] FTR Configs #108 / ObservabilityApp Observability Rules page Create rules form Should allow the user to select consumers when creating ES query rules

Metrics [docs]

Async chunks

Total size of all lazy-loaded chunks that will be downloaded as the user navigates the app

id before after diff
securitySolution 8.9MB 8.9MB -222.0B

History

cc @christineweng

@christineweng christineweng merged commit c329ccf into elastic:main Mar 14, 2025
9 checks passed
@kibanamachine
Copy link
Contributor

Starting backport for target branches: 8.x

https://github.com/elastic/kibana/actions/runs/13865657818

kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Mar 14, 2025
## Summary

This PR enabled endpoint actions for generic events (in addition to
alerts). We want to allow users to perform endpoint related actions like
isolate host and respond in the flyout. Main use case is to perform
endpoint actions when investigating in analyzer.

**Before**

![image](https://github.com/user-attachments/assets/29464129-49ad-4816-9713-c5b3c6c0f06e)

**After**
Enabled for events when host uses elastic defend

![image](https://github.com/user-attachments/assets/0298022e-5606-4878-8ccd-b63a83d1feb0)

Disabled when host cannot be isolated

![image](https://github.com/user-attachments/assets/6aaf8fee-c83c-47f7-909b-5042be066f48)

### Checklist

- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [x] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)

(cherry picked from commit c329ccf)
@kibanamachine
Copy link
Contributor

💚 All backports created successfully

Status Branch Result
8.x

Note: Successful backport PRs will be merged automatically after passing CI.

Questions ?

Please refer to the Backport tool documentation

kibanamachine added a commit that referenced this pull request Mar 14, 2025
#214666)

# Backport

This will backport the following commits from `main` to `8.x`:
- [[Security Solution] Enable endpoint actions for events
(#206857)](#206857)

<!--- Backport version: 9.6.6 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sorenlouv/backport)

<!--BACKPORT
[{"author":{"name":"christineweng","email":"18648970+christineweng@users.noreply.github.com"},"sourceCommit":{"committedDate":"2025-03-14T21:28:30Z","message":"[Security
Solution] Enable endpoint actions for events (#206857)\n\n##
Summary\n\nThis PR enabled endpoint actions for generic events (in
addition to\nalerts). We want to allow users to perform endpoint related
actions like\nisolate host and respond in the flyout. Main use case is
to perform\nendpoint actions when investigating in
analyzer.\n\n**Before**\n\n![image](https://github.com/user-attachments/assets/29464129-49ad-4816-9713-c5b3c6c0f06e)\n\n**After**\nEnabled
for events when host uses elastic
defend\n\n![image](https://github.com/user-attachments/assets/0298022e-5606-4878-8ccd-b63a83d1feb0)\n\nDisabled
when host cannot be
isolated\n\n![image](https://github.com/user-attachments/assets/6aaf8fee-c83c-47f7-909b-5042be066f48)\n\n###
Checklist\n\n- [x] [Unit or
functional\ntests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)\nwere
updated or added to match the most common scenarios\n- [x] The PR
description includes the appropriate Release Notes section,\nand the
correct `release_note:*` label is applied per
the\n[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)","sha":"c329ccf87bda02effc2670318cbe386d6bdf3e74","branchLabelMapping":{"^v9.1.0$":"main","^v8.19.0$":"8.x","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:enhancement","Team:Threat
Hunting:Investigations","backport:version","v9.1.0","v8.19.0"],"title":"[Security
Solution] Enable endpoint actions for
events","number":206857,"url":"https://github.com/elastic/kibana/pull/206857","mergeCommit":{"message":"[Security
Solution] Enable endpoint actions for events (#206857)\n\n##
Summary\n\nThis PR enabled endpoint actions for generic events (in
addition to\nalerts). We want to allow users to perform endpoint related
actions like\nisolate host and respond in the flyout. Main use case is
to perform\nendpoint actions when investigating in
analyzer.\n\n**Before**\n\n![image](https://github.com/user-attachments/assets/29464129-49ad-4816-9713-c5b3c6c0f06e)\n\n**After**\nEnabled
for events when host uses elastic
defend\n\n![image](https://github.com/user-attachments/assets/0298022e-5606-4878-8ccd-b63a83d1feb0)\n\nDisabled
when host cannot be
isolated\n\n![image](https://github.com/user-attachments/assets/6aaf8fee-c83c-47f7-909b-5042be066f48)\n\n###
Checklist\n\n- [x] [Unit or
functional\ntests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)\nwere
updated or added to match the most common scenarios\n- [x] The PR
description includes the appropriate Release Notes section,\nand the
correct `release_note:*` label is applied per
the\n[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)","sha":"c329ccf87bda02effc2670318cbe386d6bdf3e74"}},"sourceBranch":"main","suggestedTargetBranches":["8.x"],"targetPullRequestStates":[{"branch":"main","label":"v9.1.0","branchLabelMappingKey":"^v9.1.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/206857","number":206857,"mergeCommit":{"message":"[Security
Solution] Enable endpoint actions for events (#206857)\n\n##
Summary\n\nThis PR enabled endpoint actions for generic events (in
addition to\nalerts). We want to allow users to perform endpoint related
actions like\nisolate host and respond in the flyout. Main use case is
to perform\nendpoint actions when investigating in
analyzer.\n\n**Before**\n\n![image](https://github.com/user-attachments/assets/29464129-49ad-4816-9713-c5b3c6c0f06e)\n\n**After**\nEnabled
for events when host uses elastic
defend\n\n![image](https://github.com/user-attachments/assets/0298022e-5606-4878-8ccd-b63a83d1feb0)\n\nDisabled
when host cannot be
isolated\n\n![image](https://github.com/user-attachments/assets/6aaf8fee-c83c-47f7-909b-5042be066f48)\n\n###
Checklist\n\n- [x] [Unit or
functional\ntests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)\nwere
updated or added to match the most common scenarios\n- [x] The PR
description includes the appropriate Release Notes section,\nand the
correct `release_note:*` label is applied per
the\n[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)","sha":"c329ccf87bda02effc2670318cbe386d6bdf3e74"}},{"branch":"8.x","label":"v8.19.0","branchLabelMappingKey":"^v8.19.0$","isSourceBranch":false,"state":"NOT_CREATED"}]}]
BACKPORT-->

Co-authored-by: christineweng <18648970+christineweng@users.noreply.github.com>
clintandrewhall pushed a commit to clintandrewhall/kibana that referenced this pull request Mar 20, 2025
## Summary

This PR enabled endpoint actions for generic events (in addition to
alerts). We want to allow users to perform endpoint related actions like
isolate host and respond in the flyout. Main use case is to perform
endpoint actions when investigating in analyzer.

**Before**

![image](https://github.com/user-attachments/assets/29464129-49ad-4816-9713-c5b3c6c0f06e)

**After**
Enabled for events when host uses elastic defend

![image](https://github.com/user-attachments/assets/0298022e-5606-4878-8ccd-b63a83d1feb0)

Disabled when host cannot be isolated

![image](https://github.com/user-attachments/assets/6aaf8fee-c83c-47f7-909b-5042be066f48)

### Checklist

- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [x] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)
CAWilson94 pushed a commit to CAWilson94/kibana that referenced this pull request Mar 22, 2025
## Summary

This PR enabled endpoint actions for generic events (in addition to
alerts). We want to allow users to perform endpoint related actions like
isolate host and respond in the flyout. Main use case is to perform
endpoint actions when investigating in analyzer.

**Before**

![image](https://github.com/user-attachments/assets/29464129-49ad-4816-9713-c5b3c6c0f06e)

**After**
Enabled for events when host uses elastic defend

![image](https://github.com/user-attachments/assets/0298022e-5606-4878-8ccd-b63a83d1feb0)

Disabled when host cannot be isolated

![image](https://github.com/user-attachments/assets/6aaf8fee-c83c-47f7-909b-5042be066f48)

### Checklist

- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [x] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport:version Backport to applied version labels release_note:enhancement Team:Threat Hunting:Investigations Security Solution Threat Hunting Investigations Team v8.19.0 v9.1.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants