You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/detections/api/rules/rules-api-create.asciidoc
+18Lines changed: 18 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -413,6 +413,24 @@ must be an {es} date data type.
413
413
414
414
|==============================================
415
415
416
+
[[opt-fields-eql-create]]
417
+
===== Optional fields for event correlation rules
418
+
419
+
[width="100%",options="header"]
420
+
|==============================================
421
+
|Name |Type |Description
422
+
423
+
|event_category_field |String
424
+
|Contains the event classification, such as `process`, `file`, or `network`. This field is typically mapped as a field type in the {ref}/keyword.html[keyword family]. Defaults to the `event.category` ECS field.
425
+
426
+
|tiebreaker_field |String
427
+
|Sets a secondary field for sorting events (in ascending, lexicographic order) if they have the same timestamp.
428
+
429
+
|timestamp_field |String
430
+
|Contains the event timestamp used for sorting a sequence of events. This is different from `timestamp_override`, which is used for querying events within a range. Defaults to the `@timestamp` ECS field.
Copy file name to clipboardExpand all lines: docs/detections/api/rules/rules-api-update.asciidoc
+18Lines changed: 18 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -329,6 +329,24 @@ must be an {es} date data type.
329
329
330
330
|==============================================
331
331
332
+
[[opt-fields-eql-update]]
333
+
===== Optional fields for EQL rules
334
+
335
+
[width="100%",options="header"]
336
+
|==============================================
337
+
|Name |Type |Description
338
+
339
+
|event_category_field |String
340
+
|Contains the event classification, such as `process`, `file`, or `network`. This field is typically mapped as a field type in the {ref}/keyword.html[keyword family]. Defaults to the `event.category` ECS field.
341
+
342
+
|tiebreaker_field |String
343
+
|Sets a secondary field for sorting events (in ascending, lexicographic order) if they have the same timestamp.
344
+
345
+
|timestamp_field |String
346
+
|Contains the event timestamp used for sorting a sequence of events. This is different from `timestamp_override`, which is used for querying events within a range. Defaults to the `@timestamp` ECS field.
Copy file name to clipboardExpand all lines: docs/detections/detections-ui-exceptions.asciidoc
+12-10Lines changed: 12 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,16 +8,6 @@ processes and network activity to function without producing unnecessary noise.
8
8
9
9
You can add multiple exceptions to one rule.
10
10
11
-
[IMPORTANT]
12
-
=====
13
-
When you add an exception to the
14
-
<<endpoint-rule-exceptions, Elastic Endpoint Security>> rule, you can select to
15
-
add the exception to the Endpoint. When selected, the exception is added to
16
-
both the detection rule *and* the Elastic Endpoint agent on your hosts.
17
-
18
-
{ref}/binary.html[Binary fields] are not supported in detection rule exceptions.
19
-
=====
20
-
21
11
In addition to defining exception queries for source event values, you can use rule
22
12
exceptions with value lists. Value lists are lists of items with
23
13
the same {es} {ref}/mapping-types.html[data type]. You can create value lists
@@ -87,6 +77,8 @@ You can add exceptions to a rule from the rule details page or the Alerts table.
87
77
When you add an exception, you can also close all alerts that meet the
88
78
exception's criteria.
89
79
80
+
IMPORTANT: To ensure an exception is successfully applied, make sure that the fields you've defined for the exception query are correctly and consistently mapped in their respective indices. Refer to {ecs-ref}[ECS] to learn more about supported mappings.
81
+
90
82
[IMPORTANT]
91
83
==============
92
84
Be careful when adding exceptions to event correlation rules. Exceptions are evaluated against every event in the sequence, and when the exception matches _all_ event(s) in the sequence, alerts _are not_ generated. If the exception only matches _some_ of the events in the sequence, alerts _are_ generated.
@@ -167,6 +159,16 @@ Like detection rule exceptions, you can add Endpoint agent exceptions either by
167
159
168
160
You can also add Endpoint exceptions to rules that are associated with {elastic-endpoint} rule exceptions. To associate rules, when creating or editing a rule, select the <<rule-ui-advanced-params, *{elastic-endpoint} exceptions*>> option.
169
161
162
+
[IMPORTANT]
163
+
=====
164
+
When you add an exception to the
165
+
<<endpoint-rule-exceptions, Elastic Endpoint Security>> rule, you can select to
166
+
add the exception to the endpoint. When selected, the exception is added to
167
+
both the detection rule *and* the {elastic-endpoint} agent on your hosts.
168
+
169
+
{ref}/binary.html[Binary fields] are not supported in detection rule exceptions.
170
+
=====
171
+
170
172
[IMPORTANT]
171
173
=============
172
174
Exceptions added to the Elastic {endpoint-sec} rule affect all alerts sent
Copy file name to clipboardExpand all lines: docs/detections/rules-ui-create.asciidoc
+8-13Lines changed: 8 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -164,18 +164,8 @@ For example, if `Group by` is `source.ip`, `destination.ip` and its `Threshold`
164
164
+
165
165
You can also leave the `Group by` field undefined. The rule then creates an alert when the number of search results is equal to or greater than the threshold value. If you set `Count` to limit the results by `process.name` >= 2, an alert will only be generated for source/destination IP pairs that appear with at least 2 unique process names across all events.
166
166
+
167
-
[IMPORTANT]
168
-
==============
169
-
Signals created by *threshold* rules are synthetic signals that do not resemble the source documents. The signal itself only contains data about the fields that were aggregated over (the `Group by` fields). Additionally, the signal contains "lookup" data for retrieving a *Timeline* of all of the source events that caused the threshold to be exceeded.
170
-
If you wish to create an <<rule-notifications, *Action*>> based on a threshold rule, you can obtain values of the fields that were aggregated over by entering the following:
171
-
```
172
-
{{#context.alerts}}
173
-
{{#signal.threshold_result.terms}}
174
-
{{value}}
175
-
{{/signal.threshold_result.terms}}
176
-
{{/context.alerts}}
177
-
```
178
-
==============
167
+
IMPORTANT: Alerts created by threshold rules are synthetic alerts that do not resemble the source documents. The alert itself only contains data about the fields that were aggregated over (the `Group by` fields). Other fields are omitted, because they can vary across all source documents that were counted toward the threshold. Additionally, you can reference the actual count of documents that exceeded the threshold from the `kibana.alert.threshold_result.count` field.
168
+
179
169
. Continue with <<preview-rules, previewing the rule>> (optional) or click *Continue* to <<rule-ui-basic-params, configure basic rule settings>>.
180
170
181
171
[discrete]
@@ -190,7 +180,7 @@ network connection:
190
180
+
191
181
** *Index patterns*: `winlogbeat-*`
192
182
+
193
-
> Winlogbeat ships Windows events to {elastic-sec}.
NOTE: For sequence events, the {security-app} generates a single alert when all events listed in the sequence are detected. To see the matched sequence events in more detail, you can view the alert in the Timeline, and, if all events came from the same process, open the alert in Analyze Event view.
217
207
+
208
+
. (Optional) Click the EQL settings icon (image:images/eql-settings-icon.png[EQL settings icon,16,16]) to configure additional fields used by {ref}/eql.html#specify-a-timestamp-or-event-category-field[EQL search]:
209
+
* *Event category field*: Contains the event classification, such as `process`, `file`, or `network`. This field is typically mapped as a field type in the {ref}/keyword.html[keyword family]. Defaults to the `event.category` ECS field.
210
+
* *Tiebreaker field*: Sets a secondary field for sorting events (in ascending, lexicographic order) if they have the same timestamp.
211
+
* *Timestamp field*: Contains the event timestamp used for sorting a sequence of events. This is different from the *Timestamp override* advanced setting, which is used for querying events within a range. Defaults to the `@timestamp` ECS field.
212
+
+
218
213
. Continue with <<preview-rules, previewing the rule>> (optional) or click *Continue* to <<rule-ui-basic-params, configure basic rule settings>>.
0 commit comments