You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[Security] New solution navigation for 9.2 (elastic#3405)
Resolveselastic#2590.
This PR:
* Removes the **Navigation menu** section. Explaining how to use the
navigation menu felt like overkill – the UI should be intuitive enough
not to need docs. Also, updating this section to account for the 9.2
changes while keeping it accurate for pre-9.2 versions would have made
the section complex by adding more versioning tags, without necessarily
adding much user value.
* Makes the wording around management and project settings sections more
general, so it applies to all 9.x versions. Since some items are moving
from **Stack Management** to a new **Data management** section,
maintaining precise lists of menu items for both 9.2 and pre-9.2
versions and serverless would have introduced more versioning/tagging
complexity. This also reduces maintenance complexity for future version
updates.
* Reorders sections to reflect the order of pages in the 9.2 UI.
* Adds missing sections for attack discovery and notes.
* Updates any mention of items that have moved from **Stack Management**
to **Data management**.
* Updates any screenshots that show the navigation menu.
Preview: [Elastic Security
UI](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/3405/solutions/security/get-started/elastic-security-ui)
Copy file name to clipboardExpand all lines: solutions/security/get-started/automatic-import.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -108,7 +108,7 @@ Using Automatic Import allows users to create new third-party data integrations
108
108
:::
109
109
110
110
14. Click **Add to an agent** to deploy your new integration and start collecting data, or click **View integration** to view detailed information about your new integration.
111
-
15. (Optional) Once you’ve added an integration, you can edit the ingest pipeline by going to **Project Settings → Stack Management → Ingest Pipelines**.
111
+
15. (Optional) Once you’ve added an integration, you can edit the ingest pipeline by going to the **Ingest Pipelines** page using the navigation menu or the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md).
112
112
113
113
::::{tip}
114
114
You can use the [Data Quality dashboard](/solutions/security/dashboards/data-quality-dashboard.md) to check the health of your data ingest pipelines and field mappings.
Copy file name to clipboardExpand all lines: solutions/security/get-started/elastic-security-ui.md
+48-61Lines changed: 48 additions & 61 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,15 +30,6 @@ Filter for alerts, events, processes, and other important security data by enter
30
30
* To save the current KQL query and any applied filters, select **Saved query menu** (), enter a name for the saved query, and select **Save saved query**.
31
31
32
32
33
-
## Navigation menu [navigation-menu-overview]
34
-
35
-
The navigation menu contains direct links and expandable groups, identified by the group icon ().
36
-
37
-
* Click a top-level link to go directly to its landing page, which contains links and information for related pages.
38
-
* Click a group’s icon () to open its flyout menu, which displays links to related pages within that group. Click a link in the flyout to navigate to its landing page.
39
-
* Click the **Collapse side navigation** icon () to collapse and expand the main navigation menu.
40
-
41
-
42
33
## Visualization actions [visualization-actions]
43
34
44
35
Many {{elastic-sec}} histograms, graphs, and tables display an **Inspect** button () when you hover over them. Click to examine the {{es}} queries used to retrieve data throughout the app.
@@ -101,7 +92,7 @@ Expand this section to access the following dashboards, which provide interactiv
101
92
102
93
- Overview
103
94
- Detection & Response
104
-
-Kubernetes (in {{stack}})
95
+
-{applies_to}`serverless: unavailable` Kubernetes
105
96
- Cloud Security Posture
106
97
- Cloud Native Vulnerability Management
107
98
- Entity Analytics
@@ -128,33 +119,48 @@ Expand this section to access the following pages:
128
119
View and manage alerts to monitor activity within your network. Refer to [Detections and alerts](/solutions/security/detect-and-alert.md) for more information.
129
120
130
121
131
-
### Findings [_findings]
122
+
### Attack discovery
132
123
133
-
Identify misconfigurations and vulnerabilities in your cloud infrastructure. For setup instructions, refer to [Cloud Security Posture Management](/solutions/security/cloud/cloud-security-posture-management.md), [Kubernetes Security Posture Management](/solutions/security/cloud/kubernetes-security-posture-management.md), or [Cloud Native Vulnerability Management](/solutions/security/cloud/cloud-native-vulnerability-management.md).
124
+
Use large language models (LLMs) to analyze alerts in your environment and identify threats. Refer to [](/solutions/security/ai/attack-discovery.md) for more information.
134
125
135
126
136
-
### Cases [_cases]
127
+
### Assets [security-ui-assets]
137
128
138
-
Open and track security issues. Refer to [Cases](/solutions/security/investigate/cases.md) to learn more.
129
+
The Assets section allows you to manage the following features:
*[Endpoints](/solutions/security/manage-elastic-defend/endpoints.md): View and manage hosts running {{elastic-defend}}.
135
+
*[Policies](/solutions/security/manage-elastic-defend/policies.md): View and manage {{elastic-defend}} integration policies.
136
+
*[Trusted applications](/solutions/security/manage-elastic-defend/trusted-applications.md): View and manage trusted Windows, macOS, and Linux applications.
137
+
*[Event filters](/solutions/security/manage-elastic-defend/event-filters.md): View and manage event filters, which allow you to filter endpoint events you don’t need to want stored in {{es}}.
138
+
*[Host isolation exceptions](/solutions/security/manage-elastic-defend/host-isolation-exceptions.md): View and manage host isolation exceptions, which specify IP addresses that can communicate with your hosts even when those hosts are blocked from your network.
139
+
*[Blocklist](/solutions/security/manage-elastic-defend/blocklist.md): View and manage the blocklist, which allows you to prevent specified applications from running on hosts, extending the list of processes that {{elastic-defend}} considers malicious.
140
+
*[Response actions history](/solutions/security/endpoint-response-actions/response-actions-history.md): Find the history of response actions performed on hosts.
142
141
143
-
Expand this section to access the following pages:
142
+
*[Cloud security](/solutions/security/cloud.md)
144
143
145
-
*[Timelines](../investigate/timeline.md): Investigate alerts and complex threats — such as lateral movement — in your network. Timelines are interactive and allow you to share your findings with other team members.
146
144
147
-
::::{tip}
148
-
Click the **Timeline** button at the bottom of the {{security-app}} to start an investigation.
145
+
### Cases [_cases]
149
146
150
-
::::
147
+
Open and track security issues. Refer to [Cases](/solutions/security/investigate/cases.md) to learn more.
151
148
152
-
*[Osquery](../investigate/osquery.md): Deploy Osquery with {{agent}}, then run and schedule queries.
153
149
150
+
### Entity analytics
151
+
```yaml {applies_to}
152
+
stack: ga 9.1
153
+
serverless: ga
154
+
```
155
+
156
+
:::{admonition} Requirements
157
+
To access this section, turn on the `securitySolution:enablePrivilegedUserMonitoring` [advanced setting](/solutions/security/get-started/configure-advanced-settings.md#access-privileged-user-monitoring).
158
+
:::
154
159
155
-
### Intelligence [_intelligence]
160
+
Expand this section to access the following pages:
156
161
157
-
The Intelligence section contains the Indicators page, which collects data from enabled threat intelligence feeds and provides a centralized view of indicators of compromise (IoCs). Refer to [Indicators of compromise](/troubleshoot/security/indicators-of-compromise.md) to learn more.
162
+
- [Entity analytics](/solutions/security/advanced-entity-analytics/overview.md): Access a comprehensive overview of entity risk scores and anomalies identified by prebuilt {{anomaly-jobs}}.
163
+
- [Privileged user monitoring](/solutions/security/advanced-entity-analytics/monitor-privileged-user-activitites.md): Set up your privileged users and monitor their activities to identify suspicious behavior.
158
164
159
165
160
166
### Explore [_explore]
@@ -168,38 +174,30 @@ Expand this section to access the following pages:
168
174
* [Users](/solutions/security/explore/users-page.md): Access a comprehensive overview of user data to help you understand authentication and user behavior within your environment.
169
175
170
176
171
-
### Assets[security-ui-assets]
177
+
### Investigations [security-ui-investigations]
172
178
173
-
The Assets section allows you to manage the following features:
179
+
Expand this section to access the following pages:
* [Timelines](../investigate/timeline.md): Investigate alerts and complex threats — such as lateral movement — in your network. Timelines are interactive and allow you to share your findings with other team members.
177
182
178
-
*[Endpoints](/solutions/security/manage-elastic-defend/endpoints.md): View and manage hosts running {{elastic-defend}}.
179
-
*[Policies](/solutions/security/manage-elastic-defend/policies.md): View and manage {{elastic-defend}} integration policies.
180
-
*[Trusted applications](/solutions/security/manage-elastic-defend/trusted-applications.md): View and manage trusted Windows, macOS, and Linux applications.
181
-
*[Event filters](/solutions/security/manage-elastic-defend/event-filters.md): View and manage event filters, which allow you to filter endpoint events you don’t need to want stored in {{es}}.
182
-
*[Host isolation exceptions](/solutions/security/manage-elastic-defend/host-isolation-exceptions.md): View and manage host isolation exceptions, which specify IP addresses that can communicate with your hosts even when those hosts are blocked from your network.
183
-
*[Blocklist](/solutions/security/manage-elastic-defend/blocklist.md): View and manage the blocklist, which allows you to prevent specified applications from running on hosts, extending the list of processes that {{elastic-defend}} considers malicious.
184
-
*[Response actions history](/solutions/security/endpoint-response-actions/response-actions-history.md): Find the history of response actions performed on hosts.
183
+
::::{tip}
184
+
Click the **Timeline** button at the bottom of the {{security-app}} to start an investigation.
185
185
186
-
*[Cloud security](/solutions/security/cloud.md)
186
+
::::
187
187
188
+
* [Notes](/solutions/security/investigate/notes.md): View and interact with all existing notes.
188
189
189
-
### Entity analytics
190
-
```yaml {applies_to}
191
-
stack: ga 9.1
192
-
serverless: ga
193
-
```
190
+
* [Osquery](../investigate/osquery.md): Deploy Osquery with {{agent}}, then run and schedule queries.
194
191
195
-
:::{admonition} Requirements
196
-
To access this section, turn on the `securitySolution:enablePrivilegedUserMonitoring` [advanced setting](/solutions/security/get-started/configure-advanced-settings.md#access-privileged-user-monitoring).
197
-
:::
198
192
199
-
Expand this section to access the following pages:
193
+
### Findings [_findings]
200
194
201
-
- [Entity analytics](/solutions/security/advanced-entity-analytics/overview.md): Access a comprehensive overview of entity risk scores and anomalies identified by prebuilt {{anomaly-jobs}}.
202
-
- [Privileged user monitoring](/solutions/security/advanced-entity-analytics/monitor-privileged-user-activitites.md): Set up your privileged users and monitor their activities to identify suspicious behavior.
195
+
Identify misconfigurations and vulnerabilities in your cloud infrastructure. For setup instructions, refer to [Cloud Security Posture Management](/solutions/security/cloud/cloud-security-posture-management.md), [Kubernetes Security Posture Management](/solutions/security/cloud/kubernetes-security-posture-management.md), or [Cloud Native Vulnerability Management](/solutions/security/cloud/cloud-native-vulnerability-management.md).
196
+
197
+
198
+
### Intelligence [_intelligence]
199
+
200
+
The Intelligence section contains the Indicators page, which collects data from enabled threat intelligence feeds and provides a centralized view of indicators of compromise (IoCs). Refer to [Indicators of compromise](/troubleshoot/security/indicators-of-compromise.md) to learn more.
203
201
204
202
205
203
### {{ml-cap}} [security-ui-ml-cap]
@@ -214,26 +212,15 @@ Quickly add security integrations that can ingest data and monitor your hosts.
214
212
215
213
Use additional API and analysis tools to interact with your data.
- [Billing](/deploy-manage/cloud-organization/billing/serverless-project-billing-dimensions.md) and [subscription](/deploy-manage/cloud-organization/billing/manage-subscription.md) options for your {{serverless-short}} project
222
+
- Indices, data streams, and rollups
223
+
- {applies_to}`serverless: ga` [Billing](/deploy-manage/cloud-organization/billing/serverless-project-billing-dimensions.md) and [subscription](/deploy-manage/cloud-organization/billing/manage-subscription.md) options for your {{serverless-short}} project
237
224
238
225
239
226
## Accessibility features [timeline-accessibility-features]
0 commit comments