-
Notifications
You must be signed in to change notification settings - Fork 193
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Prebuilt detection rules: new UI for installing and upgrading (#3552)
* Rename tab, button - "Installed Rules" tab - "Add Elastic rules" button * Fix docs bug: duplicating prebuilt rules outdated instructions * Add Asciidoc frontmatter * Update "Install and enable" section * Add "Update rules" section * Break out prebuilt rules topic, add images * Add frontmatter, li'l cleanup * Fix x-docs link * Add section on tag categories Addresses #3525 * Revise description frontmatter * Update image, add use case * Update ref in Container Workload Protection * Apply suggestions from reviews 1st round Co-authored-by: Nastasha Solomon <79124755+nastasha-solomon@users.noreply.github.com> Co-authored-by: Georgii Gorbachev <banderror@gmail.com> * Explain cost of duplicating rules * Rename page Renamed file for good measure (though not necessary) * Tighten up images * Apply feedback from Kseniia * Remove outdated video * Revise & move download section * Apply suggestions from Janeen's review Co-authored-by: Janeen Mikell Roberts <57149392+jmikell821@users.noreply.github.com> * Remove download section, update xref --------- Co-authored-by: Nastasha Solomon <79124755+nastasha-solomon@users.noreply.github.com> Co-authored-by: Georgii Gorbachev <banderror@gmail.com> Co-authored-by: Janeen Mikell Roberts <57149392+jmikell821@users.noreply.github.com>
- Loading branch information
1 parent
986f614
commit 42a3e6c
Showing
12 changed files
with
153 additions
and
98 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,121 @@ | ||
[[prebuilt-rules-management]] | ||
== Install and manage Elastic prebuilt rules | ||
|
||
:frontmatter-description: Start detections quickly with prebuilt rules designed and updated by Elastic. | ||
:frontmatter-tags-products: [security] | ||
:frontmatter-tags-content-type: [how-to] | ||
:frontmatter-tags-user-goals: [manage] | ||
|
||
Follow these guidelines to start using the {es-sec-app}'s <<prebuilt-rules, prebuilt rules>>, keep them updated, and make sure they have the data needed to run successfully. | ||
|
||
* <<load-prebuilt-rules>> | ||
* <<prebuilt-rule-tags>> | ||
* <<select-all-prebuilt-rules>> | ||
* <<update-prebuilt-rules>> | ||
* <<rule-prerequisites>> | ||
|
||
[NOTE] | ||
==== | ||
* Prebuilt rules don't start running by default. You must first install the rules, then enable them. After installation, only a few prebuilt rules will be enabled by default, such as the Endpoint Security rule. | ||
* You can't modify most settings on Elastic prebuilt rules. You can only edit <<rule-notifications, rule actions>> and <<add-exceptions, add exceptions>>. If you want to modify other settings on a prebuilt rule, you must first duplicate it, then make your changes to the duplicated rule. However, your customized rule is entirely separate from the original prebuilt rule, and will not get updates from Elastic if the prebuilt rule is updated. | ||
==== | ||
|
||
[float] | ||
[[load-prebuilt-rules]] | ||
=== Install and enable Elastic prebuilt rules | ||
|
||
. Go to *Manage* -> *Rules*. The badge next to *Add Elastic rules* shows the number of prebuilt rules available for installation. | ||
+ | ||
[role="screenshot"] | ||
image::images/prebuilt-rules-add-badge.png[The Add Elastic Rules page] | ||
|
||
. Click *Add Elastic rules*, then do one of the following: | ||
* Install all available rules: Click *Install all*. | ||
* Install a single rule: Click *Install rule* for that rule. | ||
* Install multiple rules: Select the rules and click *Install _x_ selected rule(s)*. | ||
+ | ||
TIP: Use the search bar and *Tags* filter to find the rules you want to install. For example, filter by `OS: Windows` if your environment only includes Windows endpoints. For more on tag categories, refer to <<prebuilt-rule-tags>>. | ||
+ | ||
[role="screenshot"] | ||
image::images/prebuilt-rules-add.png[The Add Elastic Rules page] | ||
|
||
. Go back to the *Rules* page, search or filter for any rules you want to run, and do either of the following: | ||
|
||
* Enable a single rule: Turn on the rule's *Enabled* switch. | ||
* Enable multiple rules: Select the rules, then click *Bulk actions* -> *Enable*. | ||
|
||
Once you enable a rule, it starts running on its configured schedule. To confirm that it's running successfully, check its *Last response* status in the rules table, or open the rule's details page and check the <<rule-execution-logs, *Execution results*>> tab. | ||
|
||
[float] | ||
[[prebuilt-rule-tags]] | ||
=== Prebuilt rule tags | ||
|
||
Each prebuilt rule includes several tags identifying the rule's purpose, detection method, associated resources, and other information to help categorize your rules. These tags are category-value pairs; for example, `OS: Windows` indicates rules designed for Windows endpoints. Categories include: | ||
|
||
* `Data Source`: The application, cloud provider, data shipper, or Elastic integration providing data for the rule. | ||
* `Domain`: A general category of data source types (such as cloud, endpoint, or network). | ||
* `OS`: The host operating system, which could be considered another data source type. | ||
* `Resources`: Additional rule resources such as investigation guides. | ||
* `Rule Type`: Identifies if the rule depends on specialized resources (such as machine learning jobs or threat intelligence indicators), or if it's a higher-order rule built from other rules' alerts. | ||
* `Tactic`: MITRE ATT&CK tactics that the rule addresses. | ||
* `Threat`: Specific threats the rule detects (such as Cobalt Strike or BPFDoor). | ||
* `Use Case`: The type of activity the rule detects and its purpose. Use cases include: | ||
** `Active Directory Monitoring`: Detects changes related to Active Directory. | ||
** `Asset Visibility`: Detects changes to specified asset types. | ||
** `Configuration Audit`: Detects undesirable configuration changes. | ||
** `Guided Onboarding`: Example rule, used for {elastic-sec}'s guided onboarding tour. | ||
** `Identity and Access Audit`: Detects activity related to identity and access management (IAM). | ||
** `Log Auditing`: Detects activity on log configurations or storage. | ||
** `Network Security Monitoring`: Detects network security configuration activity. | ||
** `Threat Detection`: Detects threats. | ||
** `Vulnerability`: Detects exploitation of specific vulnerabilities. | ||
|
||
[float] | ||
[[select-all-prebuilt-rules]] | ||
=== Select and duplicate all prebuilt rules | ||
|
||
. Go to *Manage* -> *Rules*, then select the *Elastic rules* filter. | ||
. Click *Select all _x_ rules* above the rules table. | ||
. Click *Bulk actions* -> *Duplicate*. | ||
. Select whether to duplicate the rules' exceptions, then click *Duplicate*. | ||
|
||
You can then modify the duplicated rules and, if required, delete the prebuilt ones. However, your customized rules are entirely separate from the original prebuilt rules, and will not get updates from Elastic if the prebuilt rules are updated. | ||
|
||
[float] | ||
[[update-prebuilt-rules]] | ||
=== Update Elastic prebuilt rules | ||
|
||
Elastic regularly updates prebuilt rules to optimize their performance and ensure they detect the latest threats and techniques. When updated versions are available for your installed prebuilt rules, the *Rule Updates* tab appears on the *Rules* page, allowing you to update your installed rules with the latest versions. | ||
|
||
. Go to *Manage* -> *Rules*, then select the *Rule Updates* tab. | ||
+ | ||
NOTE: The *Rule Updates* tab doesn't appear if all your installed prebuilt rules are up to date. | ||
+ | ||
[role="screenshot"] | ||
image::images/prebuilt-rules-update.png[The Rule Updates tab on the Rules page] | ||
|
||
. Do one of the following: | ||
* Update all available rules: Click *Update all*. | ||
* Update a single rule: Click *Update rule* for that rule. | ||
* Update multiple rules: Select the rules and click *Update _x_ selected rule(s)*. | ||
+ | ||
TIP: Use the search bar and *Tags* filter to find the rules you want to update. For example, filter by `OS: Windows` if your environment only includes Windows endpoints. For more on tag categories, refer to <<prebuilt-rule-tags>>. | ||
|
||
[float] | ||
[[rule-prerequisites]] | ||
=== Confirm rule prerequisites | ||
|
||
Many Elastic prebuilt rules are designed to work with specific Elastic integrations and data fields. These prerequisites are identified in the *Related integrations* and *Required fields* fields on a rule's details page (*Manage* -> *Rules*, then click a rule's name). *Related integrations* also displays each integration's installation status and includes links for installing and configuring the listed integrations. | ||
|
||
Additionally, the *Setup guide* section provides guidance on setting up the rule's requirements. | ||
|
||
[role="screenshot"] | ||
image::images/rule-details-prerequisites.png[Rule details page with Related integrations, Required fields, and Setup guide highlighted] | ||
|
||
You can also check rules' related integrations in the *Installed Rules* and *Rule Monitoring* tables. Click the *integrations* badge to display the related integrations in a popup. | ||
|
||
[role="screenshot"] | ||
image::images/rules-table-related-integrations.png[Rules table with related integrations popup,75%] | ||
|
||
TIP: You can hide the *integrations* badge in the rules tables. Go to *{kib}* -> *Stack Management* -> *Advanced Settings*, then turn off `securitySolution:showRelatedIntegrations`. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.