896b9cddbc
* [DOCS] Updates for navigation redesign * Getting started * Set up text * Discover * Dashboard, Graph, ML, Maps, APM, SIEM, Dev tools * Dev Tools, Stack Monitoring, Management * Management * Final changes * [DOCS] Updates for navigation redesign * [DOCS] Updates CCR monitoring screenshots * updates SIEM screenshot and Cases overview text * Added Brandon's APM image * [DOCS] Refines CCR shard screenshot * Removed merge conflict image file Co-authored-by: lcawl <lcawley@elastic.co> Co-authored-by: Ben Skelker <ben.skelker@elastic.co>
107 lines
3.5 KiB
Plaintext
107 lines
3.5 KiB
Plaintext
[role="xpack"]
|
|
[[siem-ui]]
|
|
== Using the SIEM UI
|
|
|
|
The SIEM app is a highly interactive workspace for security analysts. It is
|
|
designed to be discoverable, clickable, draggable and droppable, expandable and
|
|
collapsible, resizable, moveable, and so forth. You start with an overview. Then
|
|
you can use the interactive UI to drill down into areas of interest.
|
|
|
|
[float]
|
|
[[hosts-ui]]
|
|
=== Hosts
|
|
|
|
The Hosts view provides key metrics regarding host-related security events, and
|
|
data tables and widgets that let you interact with the Timeline Event Viewer.
|
|
You can drill down for deeper insights, and drag and drop items of interest from
|
|
the Hosts view tables to Timeline for further investigation.
|
|
|
|
[role="screenshot"]
|
|
image::siem/images/hosts-ui.png[]
|
|
|
|
|
|
[float]
|
|
[[network-ui]]
|
|
=== Network
|
|
|
|
The Network view provides key network activity metrics, facilitates
|
|
investigation time enrichment, and provides network event tables that enable
|
|
interaction with the Timeline. You can drill down for deeper insights, and drag
|
|
and drop items of interest from the Network view to Timeline for further
|
|
investigation.
|
|
|
|
[role="screenshot"]
|
|
image::siem/images/network-ui.png[]
|
|
|
|
[float]
|
|
[[detections-ui]]
|
|
=== Detections (beta)
|
|
|
|
The Detections feature automatically searches for threats and creates
|
|
signals when they are detected. Signal detection rules define the conditions
|
|
for creating signals. The SIEM app comes with prebuilt rules that search for
|
|
suspicious activity on your network and hosts. Additionally, you can
|
|
create your own rules.
|
|
|
|
See {siem-guide}/detection-engine-overview.html[Detections] in the SIEM
|
|
Guide for information on managing detection rules and signals via the UI
|
|
or the Detections API.
|
|
|
|
[role="screenshot"]
|
|
image::siem/images/detections-ui.png[]
|
|
|
|
[float]
|
|
[[cases-ui]]
|
|
=== Cases (beta)
|
|
|
|
Cases are used to open and track security issues directly in SIEM.
|
|
Cases list the original reporter and all users who contribute to a case
|
|
(`participants`). Case comments support Markdown syntax, and allow linking to
|
|
saved Timelines. Additionally, you can send cases to external systems from
|
|
within SIEM (currently ServiceNow and Jira).
|
|
|
|
For information about opening, updating, and closing cases, see
|
|
{siem-guide}/cases-overview.html[Cases] in the SIEM Guide.
|
|
|
|
[role="screenshot"]
|
|
image::siem/images/cases-ui.png[]
|
|
|
|
[float]
|
|
[[timelines-ui]]
|
|
=== Timeline
|
|
|
|
Timeline is your workspace for threat hunting and alert investigations.
|
|
|
|
[role="screenshot"]
|
|
image::siem/images/timeline-ui.png[SIEM Timeline]
|
|
|
|
You can drag objects of interest into the Timeline Event Viewer to create
|
|
exactly the query filter you need. You can drag items from table widgets within
|
|
Hosts and Network pages, or even from within Timeline itself.
|
|
|
|
A timeline is responsive and persists as you move through the SIEM app
|
|
collecting data.
|
|
|
|
See the {siem-guide}[SIEM Guide] for more details on data sources and an
|
|
overview of UI elements and capabilities.
|
|
|
|
[float]
|
|
[[sample-workflow]]
|
|
=== Sample workflow
|
|
|
|
An analyst notices a suspicious user ID that warrants further investigation, and
|
|
clicks a url that links to the SIEM app.
|
|
|
|
The analyst uses the tables, widgets, and filtering and search capabilities in
|
|
the SIEM app to get to the bottom of the alert. The analyst can drag items of
|
|
interest to the timeline for further analysis.
|
|
|
|
Within the timeline, the analyst can investigate further--drilling down,
|
|
searching, and filtering--and add notes and pin items of interest.
|
|
|
|
The analyst can name the timeline, write summary notes, and share it with others
|
|
if appropriate.
|
|
|
|
|
|
|