Skip to content

Commit

Permalink
[8.x] [DE Team][8.16] Case system action being added for rules (backp…
Browse files Browse the repository at this point in the history
…ort #5703) (#5845)

* [DE Team][8.16] Case system action being added for rules (#5703)

* First draft

* Fixed header level

(cherry picked from commit 13530ea)

* Delete docs/serverless directory and its contents

---------

Co-authored-by: Nastasha Solomon <[email protected]>
Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
  • Loading branch information
3 people committed Sep 17, 2024
1 parent e599446 commit 219e7ae
Show file tree
Hide file tree
Showing 534 changed files with 13 additions and 17,816 deletions.
29 changes: 13 additions & 16 deletions docs/detections/rules-ui-create.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ To create a new detection rule, follow these steps:
. Configure basic rule settings.
. Configure advanced rule settings (optional).
. Set the rule's schedule.
. Set up alert notifications (optional).
. Set up rule actions (optional).
. Set up response actions (optional).

.Requirements
Expand Down Expand Up @@ -616,9 +616,6 @@ run exactly at its scheduled time.
`Additional look-back time` are _not_ created.
==============
. Click *Continue*. The *Rule actions* pane is displayed.
+
[role="screenshot"]
image::images/available-action-types.png[Available connector types]

. Do either of the following:

Expand All @@ -627,23 +624,26 @@ image::images/available-action-types.png[Available connector types]

[float]
[[rule-notifications]]
=== Set up alert notifications (optional)
=== Set up rule actions (optional)

Use {kib} Actions to set up notifications sent via other systems when alerts
Use {kib} actions to set up notifications sent via other systems when alerts
are generated.

NOTE: To use {kib} Actions for alert notifications, you need the
NOTE: To use {kib} actions for alert notifications, you need the
https://www.elastic.co/subscriptions[appropriate license] and your role needs *All* privileges for the *Action and Connectors* feature. For more information, see <<case-permissions>>.

. Select a connector type to determine how notifications are sent. For example, if you select the {jira} connector, notifications are sent to your {jira} system.
+
NOTE: Each action type requires a connector. Connectors store the
[NOTE]
=====
Each action type requires a connector. Connectors store the
information required to send the notification from the external system. You can
configure connectors while creating the rule or in *{stack-manage-app}* -> *{connectors-ui}*. For more
information, see {kibana-ref}/action-types.html[Action and connector types].
+
[role="screenshot"]
image::images/available-action-types.png[Available connector types]
Some connectors that perform actions require less configuration. For example, you do not need to set the action frequency or variables for the {kibana-ref}/cases-action-type.html[Cases connector]
=====

. After you select a connector, set its action frequency to define when notifications are sent:

Expand Down Expand Up @@ -775,18 +775,15 @@ Example using the mustache "current element" notation `{{.}}` to output all the

[float]
[[rule-response-action]]
=== Set up response actions (optional)
Use Response Actions to set up additional functionality that will run whenever a rule executes:
==== Set up response actions (optional)
Use response actions to set up additional functionality that will run whenever a rule executes:

* **Osquery**: Include live Osquery queries with a custom query rule. When an alert is generated, Osquery automatically collects data on the system related to the alert. Refer to <<osquery-response-action>> to learn more.

* **{elastic-defend}**: Automatically run response actions on an endpoint when rule conditions are met. For example, you can automatically isolate a host or terminate a process when specific activities or events are detected on the host. Refer to <<automated-response-actions>> to learn more.

IMPORTANT: Host isolation involves quarantining a host from the network to prevent further spread of threats and limit potential damage. Be aware that automatic host isolation can cause unintended consequences, such as disrupting legitimate user activities or blocking critical business processes.

[role="screenshot"]
image::images/available-response-actions.png[Shows available response actions]

[discrete]
[[preview-rules]]
=== Preview your rule (optional)
Expand Down
39 changes: 0 additions & 39 deletions docs/serverless/AI-for-security/ai-assistant-alert-triage.mdx

This file was deleted.

21 changes: 0 additions & 21 deletions docs/serverless/AI-for-security/ai-assistant-esql-queries.mdx

This file was deleted.

Loading

0 comments on commit 219e7ae

Please sign in to comment.