You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* New entity store features
* Moves flyout docs to new page
* fix formatting
(cherry picked from commit 2dcbce3)
Co-authored-by: natasha-moore-elastic <137783811+natasha-moore-elastic@users.noreply.github.com>
There are several ways you can incorporate discoveries into your {elastic-sec} workflows:
90
90
91
-
* Click an entity's name to open the user or host details flyout and view more details that may be relevant to your investigation.
91
+
* Click an entity's name to open the entity details flyout and view more details that may be relevant to your investigation.
92
92
* Hover over an entity's name to either add the entity to Timeline (image:images/icon-add-to-timeline.png[Add to timeline icon,17,18]) or copy its field name and value to the clipboard (image:images/icon-copy.png[Copy to clipboard icon,17,18]).
93
93
* Click **Take action**, then select **Add to new case** or **Add to existing case** to add a discovery to a <<cases-overview, case>>. This makes it easy to share the information with your team and other stakeholders.
94
94
* Click **Investigate in timeline** to explore the discovery in <<timelines-ui, Timeline>>.
Copy file name to clipboardExpand all lines: docs/advanced-entity-analytics/advanced-entity-analytics-overview.asciidoc
+2-1Lines changed: 2 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
[[advanced-entity-analytics-overview]]
2
2
= Advanced Entity Analytics
3
3
4
-
Advanced Entity Analytics generates a set of threat detection and risk analytics that allows you to expedite alert triage and hunt for new threats from within an entity's environment. This feature combines the power of the SIEM detection engine and Elastic's {ml} capabilities to identify unusual user behaviors and generate comprehensive risk analytics for hostsand users.
4
+
Advanced Entity Analytics generates a set of threat detection and risk analytics that allows you to expedite alert triage and hunt for new threats from within an entity's environment. This feature combines the power of the SIEM detection engine and Elastic's {ml} capabilities to identify unusual user behaviors and generate comprehensive risk analytics for hosts, users, and services.
5
5
6
6
Advanced Entity Analytics provides two key capabilities:
TIP: We recommend that you prioritize <<alert-triaging, alert triaging>> to identify anomalies or abnormal behavior patterns.
14
14
@@ -18,10 +18,7 @@ TIP: We recommend that you prioritize <<alert-triaging, alert triaging>> to iden
18
18
19
19
From the Entity Analytics dashboard, you can access entity key performance indicators (KPIs), risk scores, and levels. You can also click the number link in the **Alerts** column to investigate and analyze the alerts on the Alerts page.
20
20
21
-
If you have enabled the <<entity-store, entity store>>, the dashboard also displays the <<entity-entities, **Entities** section>>, where you can view all hosts and users along with their risk and asset criticality data.
If you have enabled the <<entity-store, entity store>>, the dashboard also displays the <<entity-entities, **Entities** section>>, where you can view all hosts, users, and services along with their risk and asset criticality data.
25
22
26
23
[discrete]
27
24
[[alert-triaging]]
@@ -34,15 +31,15 @@ You can prioritize alert triaging to analyze alerts associated with risky or bus
34
31
35
32
Use the Alerts table to investigate and analyze:
36
33
37
-
* Hostand user risk levels
38
-
* Hostand user risk scores
34
+
* Host, user, and service risk levels
35
+
* Host, user, and service risk scores
39
36
* Asset criticality
40
37
41
38
To display entity risk score and asset criticality data in the Alerts table, select **Fields**, and add the following:
* `user.risk.calculated_level`, `host.risk.calculated_level`, or `service.risk.calculated_level`
41
+
* `user.risk.calculated_score_norm`, `host.risk.calculated_score_norm`, or `service.risk.calculated_score_norm`
42
+
* `user.asset.criticality`, `host.asset.criticality`, or `service.asset.criticality`
46
43
47
44
Learn more about <<customize-the-alerts-table, customizing the Alerts table>>.
48
45
@@ -59,24 +56,24 @@ NOTE: If you change the entity's criticality level after an alert is generated,
59
56
60
57
* Use the drop-down filter controls to filter alerts by entity risk level or asset criticality level. To do this, <<drop-down-filter-controls, edit the default controls>> to filter by:
61
58
62
-
** `user.risk.calculated_level`or `host.risk.calculated_level` for entity risk level:
59
+
** `user.risk.calculated_level`, `host.risk.calculated_level`, or `service.risk.calculated_level` for entity risk level:
63
60
+
64
61
[role="screenshot"]
65
62
image::images/filter-by-host-risk-level.png[Alerts filtered by high host risk level]
66
63
67
-
** `user.asset.criticality`or `host.asset.criticality` for asset criticality level:
64
+
** `user.asset.criticality`, `host.asset.criticality`, or `service.asset.criticality` for asset criticality level:
68
65
+
69
66
[role="screenshot"]
70
67
image::images/filter-by-asset-criticality.png[Filter alerts by asset criticality level]
71
68
72
69
* To group alerts by entity risk level or asset criticality level, select **Group alerts by**, then select **Custom field** and search for:
73
70
74
-
** `host.risk.calculated_level`or `user.risk.calculated_level` for entity risk level:
71
+
** `host.risk.calculated_level`, `user.risk.calculated_level`, or `service.risk.calculated_level` for entity risk level:
75
72
+
76
73
[role="screenshot"]
77
74
image::images/group-by-host-risk-level.png[Alerts grouped by host risk levels]
78
75
79
-
** `host.asset.criticality`or `user.asset.criticality` for asset criticality level:
76
+
** `host.asset.criticality`, `user.asset.criticality`, or `service.asset.criticality` for asset criticality level:
80
77
+
81
78
[role="screenshot"]
82
79
image::images/group-by-asset-criticality.png[Alerts grouped by entity asset criticality levels]
@@ -87,7 +84,7 @@ image::images/group-by-asset-criticality.png[Alerts grouped by entity asset crit
87
84
... Expand a risk level group (for example, **High**) or an asset criticality group (for example, **high_impact**).
88
85
... Select **Sort fields** → **Pick fields to sort by**.
@@ -112,7 +113,7 @@ The risk scoring engine dynamically factors in an entity's asset criticality, al
112
113
113
114
To view the impact of asset criticality on an entity's risk score, follow these steps:
114
115
115
-
. Open the <<host-details-flyout, host details flyout>> or <<user-details-flyout, user details flyout>>. The risk summary section shows asset criticality's contribution to the overall risk score.
116
+
. Open the <<entity-details-flyout, entity details flyout>>. The risk summary section shows asset criticality's contribution to the overall risk score.
116
117
. Click **View risk contributions** to open the flyout's left panel.
117
118
. In the **Risk contributions** section, verify the entity's criticality level from the time the alert was generated.
Copy file name to clipboardExpand all lines: docs/advanced-entity-analytics/entity-risk-scoring.asciidoc
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ If you’ve installed the original user and host risk score modules, refer to {s
8
8
9
9
Entity risk scoring is an advanced {elastic-sec} analytics feature that helps security analysts detect changes in an entity's risk posture, hunt for new threats, and prioritize incident response.
10
10
11
-
Entity risk scoring allows you to monitor risk score changes of hostsand users in your environment. When generating advanced scoring analytics, the risk scoring engine utilizes threats from its end-to-end XDR use cases, such as SIEM, cloud, and endpoint. It leverages the Elastic SIEM detection engine to generate hostand user risk scores from the last 30 days.
11
+
Entity risk scoring allows you to monitor risk score changes of hosts, users, and services in your environment. When generating advanced scoring analytics, the risk scoring engine utilizes threats from its end-to-end XDR use cases, such as SIEM, cloud, and endpoint. It leverages the Elastic SIEM detection engine to generate host, user, and service risk scores from the last 30 days.
12
12
13
13
It also generates risk scores on a recurring interval, and allows for easy onboarding and management. The engine is built to factor in risks from all {elastic-sec} use cases, and allows you to customize and control how and when risk is calculated.
14
14
@@ -38,7 +38,7 @@ NOTE: Entities without any alerts, or with only `Closed` alerts, are not assigne
38
38
+
39
39
NOTE: When <<turn-on-risk-engine, turning on the risk engine>>, you can choose to also include `Closed` alerts in risk scoring calculations.
40
40
41
-
. The engine groups alerts by `host.name`or `user.name`, and aggregates the individual alert risk scores (`kibana.alert.risk_score`) such that alerts with higher risk scores contribute more than alerts with lower risk scores. The resulting aggregated risk score is assigned to the **Alerts** category in the entity's <<host-risk-summary, risk summary>>.
41
+
. The engine groups alerts by `host.name`, `user.name`, or `service.name`, and aggregates the individual alert risk scores (`kibana.alert.risk_score`) such that alerts with higher risk scores contribute more than alerts with lower risk scores. The resulting aggregated risk score is assigned to the **Alerts** category in the entity's <<entity-risk-summary, risk summary>>.
42
42
43
43
. The engine then verifies the entity's <<asset-criticality, asset criticality level>>. If there is no asset criticality assigned, the entity risk score remains equal to the aggregated score from the **Alerts** category. If a criticality level is assigned, the engine updates the risk score based on the default risk weight for each criticality level. The asset criticality risk input is assigned to the **Asset Criticality** category in the entity's risk summary.
Copy file name to clipboardExpand all lines: docs/advanced-entity-analytics/entity-store.asciidoc
+11-5Lines changed: 11 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -18,11 +18,11 @@ The entity store allows you to query, reconcile, maintain, and persist entity me
18
18
19
19
The entity store can hold any entity type observed by {elastic-sec}. It allows you to view and query select entities represented in your indices without needing to perform real-time searches of observable data. The entity store extracts entities from all indices in the {elastic-sec} <<default-data-view-security, default data view>>.
20
20
21
-
When the entity store is enabled, the following resources are generated for each entity type (hostsand users):
21
+
When the entity store is enabled, the following resources are generated for each entity type (hosts, users, and services):
22
22
23
23
* {es} resources, such as transforms, ingest pipelines, and enrich policies.
24
24
* Data and fields for each entity.
25
-
* The `.entities.v1.latest.security_user_<space-id>`and `.entities.v1.latest.security_host_<space-id>` indices, which contain field mappings for hostsand users respectively. You can query these indices to see a list of fields that are mapped in the entity store.
25
+
* The `.entities.v1.latest.security_user_<space-id>`, `.entities.v1.latest.security_host_<space-id>`, and `.entities.v1.latest.security_services_<space-id>` indices, which contain field mappings for hosts, users, and services respectively. You can query these indices to see a list of fields that are mapped in the entity store.
26
26
27
27
[discrete]
28
28
[[enable-entity-store]]
@@ -39,13 +39,19 @@ Once you enable the entity store, the Entity Analytics dashboard displays the <<
39
39
[[clear-entity-store]]
40
40
== Clear entity store data
41
41
42
-
Once the entity store is enabled, you may want to clear the stored data and start fresh. For example, if you normalized the `user.name`or `host.name` fields, clearing the entity store data would allow you to repopulate the entity store with the updated, normalized values. This action removes all previously extracted entity information, enabling new data extraction and analysis.
42
+
Once the entity store is enabled, you may want to clear the stored data and start fresh. For example, if you normalized the `user.name`, `host.name`, or `service.name` fields, clearing the entity store data would allow you to repopulate the entity store with the updated, normalized values. This action removes all previously extracted entity information, enabling new data extraction and analysis.
43
43
44
44
Clearing entity store data does not delete your source data, assigned entity risk scores, or asset criticality assignments.
45
45
46
-
CAUTION: Clearing entity store data permanently deletes persisted userand host records, and data is no longer available for analysis. Proceed with caution, as this cannot be undone.
46
+
CAUTION: Clearing entity store data permanently deletes persisted user, host, and service records, and data is no longer available for analysis. Proceed with caution, as this cannot be undone.
47
47
48
48
To clear entity data:
49
49
50
50
. Find **Entity Store** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
51
-
. On the **Entity Store** page, select **Clear**.
51
+
. On the **Entity Store** page, select **Clear**.
52
+
53
+
[discrete]
54
+
[[verify-engine-status]]
55
+
== Verify engine status
56
+
57
+
Once the entity store is enabled, the **Entity Store** page displays the **Engine Status** tab, where you can verify which engines are installed and their statuses. This tab shows a list of installed resources for each installed entity. Click the resource link to navigate to the resource page and view more information.
Copy file name to clipboardExpand all lines: docs/advanced-entity-analytics/ers-req.asciidoc
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ Follow these guidelines to ensure clusters have adequate memory to handle data v
40
40
[discrete]
41
41
=== Known limitations
42
42
43
-
The risk scoring engine uses an internal user role to score all hostsand users, and doesn't respect privileges applied to custom users or roles. After you turn on the risk scoring engine for a {kib} space, all alerts in the space will contribute to hostand user risk scores.
43
+
The risk scoring engine uses an internal user role to score all hosts, users, and services, and doesn't respect privileges applied to custom users or roles. After you turn on the risk scoring engine for a {kib} space, all alerts in the space will contribute to host, user, and service risk scores.
Copy file name to clipboardExpand all lines: docs/advanced-entity-analytics/turn-on-risk-engine.asciidoc
+1-4Lines changed: 1 addition & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -6,15 +6,12 @@ IMPORTANT: To use entity risk scoring, your role must have the appropriate privi
6
6
[discrete]
7
7
== Preview risky entities
8
8
9
-
You can preview risky entities before installing the latest risk engine. The preview shows the riskiest hostsand users found in the 1000 sampled entities during the time frame selected in the date picker.
9
+
You can preview risky entities before installing the latest risk engine. The preview shows the riskiest hosts, users, and services found in the 1000 sampled entities during the time frame selected in the date picker.
10
10
11
11
NOTE: The preview is limited to two risk scores per {kib} instance.
12
12
13
13
To preview risky entities, find **Entity Risk Score** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
14
14
15
-
[role="screenshot"]
16
-
image::images/preview-risky-entities.png[Preview of risky entities]
0 commit comments