Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

"About building blocks" and "MITRE ATT&CK® coverage" pages #442

Closed
wants to merge 5 commits into from
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Binary file removed images/serverless--detections-alert-indices-ui.png
Binary file not shown.

This file was deleted.

This file was deleted.

2 changes: 2 additions & 0 deletions raw-migrated-files/docs-content/serverless/security-ui.md
Original file line number Diff line number Diff line change
Expand Up @@ -113,6 +113,8 @@ Expand this section to access the following pages:
:class: screenshot
:::

% When we delete this page, we can also delete the serverless--detections-rules-coverage.png file because it's no longer referenced in the Security docs or elsewhere.

* [**MITRE ATT&CK® coverage**](../../../solutions/security/detect-and-alert/mitre-attandckr-coverage.md): Review your coverage of MITRE ATT&CK® tactics and techniques, based on installed rules.

:::{image} ../../../images/serverless--detections-rules-coverage.png
Expand Down
28 changes: 0 additions & 28 deletions raw-migrated-files/security-docs/security/building-block-rule.md

This file was deleted.

55 changes: 0 additions & 55 deletions raw-migrated-files/security-docs/security/rules-coverage.md

This file was deleted.

4 changes: 0 additions & 4 deletions raw-migrated-files/toc.yml
Original file line number Diff line number Diff line change
Expand Up @@ -416,7 +416,6 @@ toc:
- file: docs-content/serverless/security-benchmark-rules-kspm.md
- file: docs-content/serverless/security-benchmark-rules.md
- file: docs-content/serverless/security-blocklist.md
- file: docs-content/serverless/security-building-block-rules.md
- file: docs-content/serverless/security-cases-open-manage.md
- file: docs-content/serverless/security-cases-overview.md
- file: docs-content/serverless/security-cases-requirements.md
Expand Down Expand Up @@ -497,7 +496,6 @@ toc:
- file: docs-content/serverless/security-response-actions-history.md
- file: docs-content/serverless/security-response-actions.md
- file: docs-content/serverless/security-rule-monitoring-dashboard.md
- file: docs-content/serverless/security-rules-coverage.md
- file: docs-content/serverless/security-rules-create.md
- file: docs-content/serverless/security-rules-ui-management.md
- file: docs-content/serverless/security-runtime-fields.md
Expand Down Expand Up @@ -794,7 +792,6 @@ toc:
- file: security-docs/security/behavioral-detection-use-cases.md
- file: security-docs/security/benchmark-rules.md
- file: security-docs/security/blocklist.md
- file: security-docs/security/building-block-rule.md
- file: security-docs/security/case-permissions.md
- file: security-docs/security/cases-manage-settings.md
- file: security-docs/security/cases-open-manage.md
Expand Down Expand Up @@ -875,7 +872,6 @@ toc:
- file: security-docs/security/response-actions-history.md
- file: security-docs/security/response-actions.md
- file: security-docs/security/rule-monitoring-dashboard.md
- file: security-docs/security/rules-coverage.md
- file: security-docs/security/rules-ui-create.md
- file: security-docs/security/rules-ui-management.md
- file: security-docs/security/runtime-fields.md
Expand Down
33 changes: 28 additions & 5 deletions solutions/security/detect-and-alert/about-building-block-rules.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,11 +4,34 @@ mapped_urls:
- https://www.elastic.co/guide/en/serverless/current/security-building-block-rules.html
---

# About building block rules
# Use building block rules [security-building-block-rules]

% What needs to be done: Lift-and-shift
Create building block rules when you do not want to see their generated alerts in the UI. This is useful when you want:

* A record of low-risk alerts without producing noise in the Alerts table.
* Rules that execute on the alert indices (`.alerts-security.alerts-<kibana space>`). You can then use building block rules to create hidden alerts that act as a basis for an *ordinary* rule to generate visible alerts.


## Set up rules that run on alert indices [security-building-block-rules-set-up-rules-that-run-on-alert-indices]

To create a rule that searches alert indices, select **Index Patterns** as the rule’s **Source** and enter the index pattern for alert indices (`.alerts-security.alerts-*`):

:::{image} ../../../images/security-detections-alert-indices-ui.png
:alt: Detections alert indices UI
:class: screenshot
:::


## View building block alerts in the UI [security-building-block-rules-view-building-block-alerts-in-the-ui]

By default, building block alerts are excluded from the Overview and Alerts pages. You can choose to include building block alerts on the Alerts page, which expands the number of alerts.

1. Find **Alerts** in the navigation menu or by using the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md).
2. In the Alerts table, select **Additional filters** → **Include building block alerts**, located on the far-right.

::::{note}
On a building block rule details page, the rule’s alerts are displayed (by default, **Include building block alerts** is selected).

::::

% Use migrated content from existing pages that map to this page:

% - [ ] ./raw-migrated-files/security-docs/security/building-block-rule.md
% - [ ] ./raw-migrated-files/docs-content/serverless/security-building-block-rules.md
59 changes: 54 additions & 5 deletions solutions/security/detect-and-alert/mitre-attandckr-coverage.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,11 +4,60 @@ mapped_urls:
- https://www.elastic.co/guide/en/serverless/current/security-rules-coverage.html
---

# MITRE ATT&CK® coverage
# MITRE ATT&CK® coverage [rules-coverage]

% What needs to be done: Lift-and-shift
The **MITRE ATT&CK® coverage** page shows which [MITRE ATT&CK®](https://attack.mitre.org) adversary tactics and techniques are covered by your installed and enabled detection rules. This includes both Elastic prebuilt rules and custom rules.

% Use migrated content from existing pages that map to this page:
Mirroring the MITRE ATT&CK® framework, columns represent major tactics, and cells within each column represent a tactic’s related techniques. Cells are darker when a technique has more rules matching the current filters, as indicated in the **Legend** at the top.

% - [ ] ./raw-migrated-files/security-docs/security/rules-coverage.md
% - [ ] ./raw-migrated-files/docs-content/serverless/security-rules-coverage.md
To access the **MITRE ATT&CK® coverage** page, find **Detection rules (SIEM)** in the navigation menu or look for “Detection rules (SIEM)” using the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md), then go to **MITRE ATT&CK® coverage**.

%The following note was included in Serverless docs too, despite it having details that are only relevant for ESS users. Will need to revisit this note at a later time to apply the proper versioning notes or to update.

::::{note}
This page only includes the detection rules you currently have installed, and only rules that are mapped to MITRE ATT&CK®. The coverage page maps detections to the following [MITRE ATT&CK® version](https://attack.mitre.org/resources/updates/updates-april-2024) used by {{elastic-sec}}: `v15.1`. Elastic prebuilt rules that aren’t installed and custom rules that are either unmapped or mapped to a deprecated tactic or technique will not appear on the coverage map.

You can map custom rules to tactics in **Advanced settings** when creating or editing a rule.

::::


:::{image} ../../../images/security-rules-coverage.png
:alt: MITRE ATT&CK® coverage page
:class: screenshot
:::


## Filter rules [_filter_rules]

Use the drop-down filters at the top of the page to control which of your installed detection rules are included in calculating coverage.

* **Installed rule status**: Select to include **Enabled rules**, **Disabled rules**, or both.
* **Installed rule type**: Select to include **Elastic rules** (prebuilt rules), **Custom rules** (user-created rules), or both.

You can also search for a tactic or technique name, technique number, or rule name in the search bar. The search bar acts as a filter for the coverage grid: only rules matching the search term will be included.

::::{note}
Searches for tactics and techniques must match exactly, are case sensitive, and do *not* support wildcards.
::::



## Expand and collapse cells [_expand_and_collapse_cells]

Click **Collapse cells** or **Expand cells** to change how much information the cells display. Cells always include the technique’s name and the number of sub-techniques covered by enabled rules. Expand the cells to also display counts of disabled and enabled rules for each technique.

::::{note}
The counts inside cells are affected by how you filter the page. For example, if you filter the **Installed rule status** to only include **Enabled rules**, then all disabled rule counts will be 0 because disabled rules are filtered out.
::::



## Enable rules [_enable_rules]

You can quickly enable all the rules for a specific technique that you’ve installed, but not enabled. Click the technique’s cell, then click **Enable all disabled** in the popup that appears.


## Learn more about techniques and sub-techniques [_learn_more_about_techniques_and_sub_techniques]

For more information on a specific technique and its sub-techniques, click the technique’s cell, then click the title in the popup that appears. This opens a new browser tab with the technique’s MITRE ATT&CK® documentation.
Loading