-
Notifications
You must be signed in to change notification settings - Fork 503
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add documentation for detector rule creation updates #4499
Conversation
Signed-off-by: cwillum <[email protected]>
Signed-off-by: cwillum <[email protected]>
Signed-off-by: cwillum <[email protected]>
Signed-off-by: cwillum <[email protected]>
Signed-off-by: cwillum <[email protected]>
Signed-off-by: cwillum <[email protected]>
Signed-off-by: cwillum <[email protected]>
Signed-off-by: cwillum <[email protected]>
Signed-off-by: cwillum <[email protected]>
Signed-off-by: cwillum <[email protected]>
Signed-off-by: cwillum <[email protected]>
Signed-off-by: cwillum <[email protected]>
Signed-off-by: cwillum <[email protected]>
Signed-off-by: cwillum <[email protected]>
Signed-off-by: cwillum <[email protected]>
Signed-off-by: cwillum <[email protected]>
Signed-off-by: cwillum <[email protected]>
@amsiglan These are updates to detection rule creation. Could you have a look for technical accuracy when you find a chance? Thanks. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good!
Signed-off-by: cwillum <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@cwillum Please see my comments and changes and let me know if you have any questions. Thanks!
_security-analytics/index.md
Outdated
|
||
Rules, or threat detection rules, define the conditional logic applied to ingested log data that allows the system to identify an event of interest. Security Analytics uses prepackaged, open source [Sigma rules](https://github.com/SigmaHQ/sigma) as a starting point for describing relevant log events. But with their inherently flexible format and easy portability, Sigma rules provide users of Security Analytics with options for importing and customizing the rules. You can take advantage of these options using either Dashboards or the API. | ||
The security rules, or threat detection rules, define the conditional logic applied to ingested log data that allows the system to identify an event of interest. Security Analytics uses prepackaged, open source [Sigma rules](https://github.com/SigmaHQ/sigma) as a starting point for describing relevant log events. But with their inherently flexible format and easy portability, Sigma rules provide users of Security Analytics with options for importing and customizing the rules. You can take advantage of these options using either Dashboards or the API. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The security rules, or threat detection rules, define the conditional logic applied to ingested log data that allows the system to identify an event of interest. Security Analytics uses prepackaged, open source [Sigma rules](https://github.com/SigmaHQ/sigma) as a starting point for describing relevant log events. But with their inherently flexible format and easy portability, Sigma rules provide users of Security Analytics with options for importing and customizing the rules. You can take advantage of these options using either Dashboards or the API. | |
The security rules, or threat detection rules, define the conditional logic applied to ingested log data that allows the system to identify an event of interest. Security Analytics uses prepackaged, open-source [Sigma rules](https://github.com/SigmaHQ/sigma) as a starting point for describing relevant log events. But with their inherently flexible format and easy portability, Sigma rules provide Security Analytics users with options for importing and customizing the rules. You can take advantage of these options using either OpenSearch Dashboards or the API. |
Signed-off-by: cwillum <[email protected]>
Signed-off-by: cwillum <[email protected]>
…ect#4499) * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> --------- Signed-off-by: cwillum <[email protected]>
* fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> * fix#4413 detection rule updates Signed-off-by: cwillum <[email protected]> --------- Signed-off-by: cwillum <[email protected]>
Description
The detection rule creation UI was updated to be more intuitive for users. This requires update of text and screenshots.
Issues Resolved
Updated documentation based on previous description.
Fixes #4413
Checklist
For more information on following Developer Certificate of Origin and signing off your commits, please check here.