Skip to content

Commit 377b42d

Browse files
authored
Merge branch 'main' into issue-2044-big
2 parents cd49d4c + afcf96f commit 377b42d

17 files changed

+96
-50
lines changed

docs/detections/api/rules/rules-api-create.asciidoc

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -413,6 +413,24 @@ must be an {es} date data type.
413413

414414
|==============================================
415415

416+
[[opt-fields-eql-create]]
417+
===== Optional fields for event correlation rules
418+
419+
[width="100%",options="header"]
420+
|==============================================
421+
|Name |Type |Description
422+
423+
|event_category_field |String
424+
|Contains the event classification, such as `process`, `file`, or `network`. This field is typically mapped as a field type in the {ref}/keyword.html[keyword family]. Defaults to the `event.category` ECS field.
425+
426+
|tiebreaker_field |String
427+
|Sets a secondary field for sorting events (in ascending, lexicographic order) if they have the same timestamp.
428+
429+
|timestamp_field |String
430+
|Contains the event timestamp used for sorting a sequence of events. This is different from `timestamp_override`, which is used for querying events within a range. Defaults to the `@timestamp` ECS field.
431+
432+
|==============================================
433+
416434
[[actions-object-schema]]
417435
===== `actions` schema
418436

docs/detections/api/rules/rules-api-import.asciidoc

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -66,3 +66,18 @@ curl -X POST "api/detection_engine/rules/_import?overwrite=true"
6666

6767
`200`::
6868
Indicates a successful call.
69+
70+
===== Example response
71+
72+
[source,json]
73+
--------------------------------------------------
74+
{
75+
"success": true,
76+
"success_count": 1,
77+
"rules_count": 1,
78+
"errors": [],
79+
"exceptions_errors": [],
80+
"exceptions_success": true,
81+
"exceptions_success_count": 0
82+
}
83+
--------------------------------------------------

docs/detections/api/rules/rules-api-update.asciidoc

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -329,6 +329,24 @@ must be an {es} date data type.
329329

330330
|==============================================
331331

332+
[[opt-fields-eql-update]]
333+
===== Optional fields for EQL rules
334+
335+
[width="100%",options="header"]
336+
|==============================================
337+
|Name |Type |Description
338+
339+
|event_category_field |String
340+
|Contains the event classification, such as `process`, `file`, or `network`. This field is typically mapped as a field type in the {ref}/keyword.html[keyword family]. Defaults to the `event.category` ECS field.
341+
342+
|tiebreaker_field |String
343+
|Sets a secondary field for sorting events (in ascending, lexicographic order) if they have the same timestamp.
344+
345+
|timestamp_field |String
346+
|Contains the event timestamp used for sorting a sequence of events. This is different from `timestamp_override`, which is used for querying events within a range. Defaults to the `@timestamp` ECS field.
347+
348+
|==============================================
349+
332350
[[actions-object-schema-update]]
333351
===== `actions` schema
334352

docs/detections/detections-ui-exceptions.asciidoc

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,16 +8,6 @@ processes and network activity to function without producing unnecessary noise.
88

99
You can add multiple exceptions to one rule.
1010

11-
[IMPORTANT]
12-
=====
13-
When you add an exception to the
14-
<<endpoint-rule-exceptions, Elastic Endpoint Security>> rule, you can select to
15-
add the exception to the Endpoint. When selected, the exception is added to
16-
both the detection rule *and* the Elastic Endpoint agent on your hosts.
17-
18-
{ref}/binary.html[Binary fields] are not supported in detection rule exceptions.
19-
=====
20-
2111
In addition to defining exception queries for source event values, you can use rule
2212
exceptions with value lists. Value lists are lists of items with
2313
the same {es} {ref}/mapping-types.html[data type]. You can create value lists
@@ -87,6 +77,8 @@ You can add exceptions to a rule from the rule details page or the Alerts table.
8777
When you add an exception, you can also close all alerts that meet the
8878
exception's criteria.
8979

80+
IMPORTANT: To ensure an exception is successfully applied, make sure that the fields you've defined for the exception query are correctly and consistently mapped in their respective indices. Refer to {ecs-ref}[ECS] to learn more about supported mappings.
81+
9082
[IMPORTANT]
9183
==============
9284
Be careful when adding exceptions to event correlation rules. Exceptions are evaluated against every event in the sequence, and when the exception matches _all_ event(s) in the sequence, alerts _are not_ generated. If the exception only matches _some_ of the events in the sequence, alerts _are_ generated.
@@ -167,6 +159,16 @@ Like detection rule exceptions, you can add Endpoint agent exceptions either by
167159

168160
You can also add Endpoint exceptions to rules that are associated with {elastic-endpoint} rule exceptions. To associate rules, when creating or editing a rule, select the <<rule-ui-advanced-params, *{elastic-endpoint} exceptions*>> option.
169161

162+
[IMPORTANT]
163+
=====
164+
When you add an exception to the
165+
<<endpoint-rule-exceptions, Elastic Endpoint Security>> rule, you can select to
166+
add the exception to the endpoint. When selected, the exception is added to
167+
both the detection rule *and* the {elastic-endpoint} agent on your hosts.
168+
169+
{ref}/binary.html[Binary fields] are not supported in detection rule exceptions.
170+
=====
171+
170172
[IMPORTANT]
171173
=============
172174
Exceptions added to the Elastic {endpoint-sec} rule affect all alerts sent
26.3 KB
Loading
628 Bytes
Loading

docs/detections/rules-ui-create.asciidoc

Lines changed: 8 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -164,18 +164,8 @@ For example, if `Group by` is `source.ip`, `destination.ip` and its `Threshold`
164164
+
165165
You can also leave the `Group by` field undefined. The rule then creates an alert when the number of search results is equal to or greater than the threshold value. If you set `Count` to limit the results by `process.name` >= 2, an alert will only be generated for source/destination IP pairs that appear with at least 2 unique process names across all events.
166166
+
167-
[IMPORTANT]
168-
==============
169-
Signals created by *threshold* rules are synthetic signals that do not resemble the source documents. The signal itself only contains data about the fields that were aggregated over (the `Group by` fields). Additionally, the signal contains "lookup" data for retrieving a *Timeline* of all of the source events that caused the threshold to be exceeded.
170-
If you wish to create an <<rule-notifications, *Action*>> based on a threshold rule, you can obtain values of the fields that were aggregated over by entering the following:
171-
```
172-
{{#context.alerts}}
173-
{{#signal.threshold_result.terms}}
174-
{{value}}
175-
{{/signal.threshold_result.terms}}
176-
{{/context.alerts}}
177-
```
178-
==============
167+
IMPORTANT: Alerts created by threshold rules are synthetic alerts that do not resemble the source documents. The alert itself only contains data about the fields that were aggregated over (the `Group by` fields). Other fields are omitted, because they can vary across all source documents that were counted toward the threshold. Additionally, you can reference the actual count of documents that exceeded the threshold from the `kibana.alert.threshold_result.count` field.
168+
179169
. Continue with <<preview-rules, previewing the rule>> (optional) or click *Continue* to <<rule-ui-basic-params, configure basic rule settings>>.
180170

181171
[discrete]
@@ -190,7 +180,7 @@ network connection:
190180
+
191181
** *Index patterns*: `winlogbeat-*`
192182
+
193-
> Winlogbeat ships Windows events to {elastic-sec}.
183+
Winlogbeat ships Windows events to {elastic-sec}.
194184

195185
** *EQL query*:
196186
+
@@ -215,6 +205,11 @@ image::images/eql-rule-query-example.png[]
215205
+
216206
NOTE: For sequence events, the {security-app} generates a single alert when all events listed in the sequence are detected. To see the matched sequence events in more detail, you can view the alert in the Timeline, and, if all events came from the same process, open the alert in Analyze Event view.
217207
+
208+
. (Optional) Click the EQL settings icon (image:images/eql-settings-icon.png[EQL settings icon,16,16]) to configure additional fields used by {ref}/eql.html#specify-a-timestamp-or-event-category-field[EQL search]:
209+
* *Event category field*: Contains the event classification, such as `process`, `file`, or `network`. This field is typically mapped as a field type in the {ref}/keyword.html[keyword family]. Defaults to the `event.category` ECS field.
210+
* *Tiebreaker field*: Sets a secondary field for sorting events (in ascending, lexicographic order) if they have the same timestamp.
211+
* *Timestamp field*: Contains the event timestamp used for sorting a sequence of events. This is different from the *Timestamp override* advanced setting, which is used for querying events within a range. Defaults to the `@timestamp` ECS field.
212+
+
218213
. Continue with <<preview-rules, previewing the rule>> (optional) or click *Continue* to <<rule-ui-basic-params, configure basic rule settings>>.
219214

220215
[discrete]
-571 KB
Binary file not shown.
Binary file not shown.
207 KB
Loading

0 commit comments

Comments
 (0)