You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/detections/detection-engine-intro.asciidoc
+10Lines changed: 10 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -88,6 +88,11 @@ Detection rules::
88
88
Background tasks that run periodically and produce alerts when suspicious
89
89
activity is detected.
90
90
91
+
[[term-sec-indices]]
92
+
{es-sec} indices::
93
+
Indices containing host and network source events (such as
94
+
`packetbeat-*`, `log-*`, and `winlogbeat-*`). When you <<rules-ui-create, create a new rule>>, the default index pattern corresponds to the <<update-sec-indices, values defined>> in the `securitySolution:defaultIndex`.
95
+
91
96
Endpoint exceptions::
92
97
<<term-exceptions, Exceptions>> added to both rules and Endpoint agents on
93
98
hosts. Endpoint exceptions can only be added when:
@@ -103,6 +108,11 @@ alerts.
103
108
External alerts::
104
109
Alerts {es-sec} receives from external systems, such as Suricata.
105
110
111
+
Threat indices::
112
+
Indices containing suspect field values. <<create-indicator-rule, Indicator match rules>> use these
113
+
indices to compare their field values with source event values contained in
114
+
<<term-sec-indices, {es-sec} indices>>.
115
+
106
116
[float]
107
117
[[detections-permissions]]
108
118
== Detections configuration and index privilege prerequisites
0 commit comments