[Security] [Serverless: Mar 31] Update prebuilt ML jobs documentation with EA changes#5348
Conversation
Vale Linting ResultsSummary: 92 suggestions found 💡 Suggestions (92)
The Vale linter checks documentation changes against the Elastic Docs style guide. To use Vale locally or report issues, refer to Elastic style guide for Vale. |
🔍 Preview links for changed docs⏳ Building and deploying preview... View progress This comment will be updated with preview links when the build is complete. |
susan-shu-c
left a comment
There was a problem hiding this comment.
Thanks for the changes, Kirti!
| @@ -17,6 +17,12 @@ products: | |||
|
|
|||
| These {{anomaly-jobs}} automatically detect file system and network anomalies on your hosts. They appear in the **Anomaly Detection** interface of the {{security-app}} in {{kib}} when you have data that matches their configuration. For more information, refer to [Anomaly detection with machine learning](/solutions/security/advanced-entity-analytics/anomaly-detection.md). | |||
|
|
|||
| ::::{note} | |||
| With version 9.4, Elastic Stack introduces support for Entity Analytics (EA), adding new fields for proper entity resolution. The machine learning jobs created from this version onward are designed to leverage these fields. | |||
There was a problem hiding this comment.
| With version 9.4, Elastic Stack introduces support for Entity Analytics (EA), adding new fields for proper entity resolution. The machine learning jobs created from this version onward are designed to leverage these fields. | |
| With version 9.4, the Elastic Stack introduces support for Entity Analytics (EA), adding new fields for proper entity resolution. The machine learning jobs created from this version onward are designed to leverage these fields. |
| | gcp_audit_high_distinct_count_error_message_ea | Looks for a spike in the rate of an action where the event outcome is a failure. Spikes might indicate an impending service failure but could also be byproducts of attempted or successful persistence, privilege escalation, defense evasion, discovery, lateral movement, or collection activity by a threat actor. | [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_gcp_audit/ml/gcp_audit_high_distinct_count_error_message_ea.json)| [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_gcp_audit/ml/datafeed_gcp_audit_high_distinct_count_error_message_ea.json)| [GCP Audit](https://www.elastic.co/docs/reference/integrations/gcp/audit) | | ||
| | gcp_audit_rare_error_code_ea | Looks for unusual errors. Rare and unusual errors might indicate an impending service failure but they can also be byproducts of attempted or successful persistence, privilege escalation, defense evasion, discovery, lateral movement, or collection activity by a threat actor. | [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_gcp_audit/ml/gcp_audit_rare_error_code_ea.json)| [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_gcp_audit/ml/datafeed_gcp_audit_rare_error_code_ea.json)| [GCP Audit](https://www.elastic.co/docs/reference/integrations/gcp/audit) | | ||
| | gcp_audit_rare_method_for_a_city_ea | Looks for GCP actions that, while not inherently suspicious or atypical, are sourcing from a geolocation (city) that is unexpected. This can be the result of compromised credentials or keys. | [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_gcp_audit/ml/gcp_audit_rare_method_for_a_city_ea.json)| [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_gcp_audit/ml/datafeed_gcp_audit_rare_method_for_a_city_ea.json)| [GCP Audit](https://www.elastic.co/docs/reference/integrations/gcp/audit) | | ||
| | gcp_audit_rare_method_for_a_country_ea | Looks for GCP actions calls that, while not inherently suspicious or aytpical, are sourcing from a geolocation (country) that is unexpected. This can be the result of compromised credentials or keys. | [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_gcp_audit/ml/gcp_audit_rare_method_for_a_country_ea.json)| [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_gcp_audit/ml/datafeed_gcp_audit_rare_method_for_a_country_ea.json)| [GCP Audit](https://www.elastic.co/docs/reference/integrations/gcp/audit) | |
There was a problem hiding this comment.
| | gcp_audit_rare_method_for_a_country_ea | Looks for GCP actions calls that, while not inherently suspicious or aytpical, are sourcing from a geolocation (country) that is unexpected. This can be the result of compromised credentials or keys. | [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_gcp_audit/ml/gcp_audit_rare_method_for_a_country_ea.json)| [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_gcp_audit/ml/datafeed_gcp_audit_rare_method_for_a_country_ea.json)| [GCP Audit](https://www.elastic.co/docs/reference/integrations/gcp/audit) | | |
| | gcp_audit_rare_method_for_a_country_ea | Looks for GCP actions calls that, while not inherently suspicious or atypical, are sourcing from a geolocation (country) that is unexpected. This can be the result of compromised credentials or keys. | [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_gcp_audit/ml/gcp_audit_rare_method_for_a_country_ea.json)| [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_gcp_audit/ml/datafeed_gcp_audit_rare_method_for_a_country_ea.json)| [GCP Audit](https://www.elastic.co/docs/reference/integrations/gcp/audit) | |
There was a problem hiding this comment.
If this is a typo from the job, let's take the opportunity to update the jobs as well
| | lmd_high_mean_rdp_session_duration_ea | Detects unusually high mean of RDP session duration. | [{{elastic-defend}}](https://www.elastic.co/docs/reference/integrations/endpoint) | windows | | ||
| | lmd_high_var_rdp_session_duration_ea | Detects unusually high variance in RDP session duration. | [{{elastic-defend}}](https://www.elastic.co/docs/reference/integrations/endpoint) | windows | | ||
| | lmd_high_sum_rdp_number_of_processes_ea | Detects unusually high number of processes started in a single RDP session. | [{{elastic-defend}}](https://www.elastic.co/docs/reference/integrations/endpoint) | windows | | ||
| | lmd_unusual_time_weekday_rdp_session_start_ea | Detects an RDP session started at an usual time or weekday. | [{{elastic-defend}}](https://www.elastic.co/docs/reference/integrations/endpoint) | windows | |
There was a problem hiding this comment.
| | lmd_unusual_time_weekday_rdp_session_start_ea | Detects an RDP session started at an usual time or weekday. | [{{elastic-defend}}](https://www.elastic.co/docs/reference/integrations/endpoint) | windows | | |
| | lmd_unusual_time_weekday_rdp_session_start_ea | Detects an RDP session started at an unusual time or weekday. | [{{elastic-defend}}](https://www.elastic.co/docs/reference/integrations/endpoint) | windows | |
There was a problem hiding this comment.
If this is a typo from the job, let's take the opportunity to update the jobs as well
|
@elastic/docs Could you take a look at the changes? |
| | rare_error_code | Looks for unusual errors. Rare and unusual errors may simply indicate an impending service failure but they can also be byproducts of attempted or successful persistence, privilege escalation, defense evasion, discovery, lateral movement, or collection activity by a threat actor. | [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_cloudtrail/ml/rare_error_code.json)| [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_cloudtrail/ml/datafeed_rare_error_code.json)| [AWS](https://www.elastic.co/docs/reference/integrations/aws/cloudtrail) | | ||
| | rare_method_for_a_city | Looks for AWS API calls that, while not inherently suspicious or abnormal, are sourcing from a geolocation (city) that is unusual. This can be the result of compromised credentials or keys. | [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_cloudtrail/ml/rare_method_for_a_city.json)| [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_cloudtrail/ml/datafeed_rare_method_for_a_city.json)| [AWS](https://www.elastic.co/docs/reference/integrations/aws/cloudtrail) | | ||
| | rare_method_for_a_country | Looks for AWS API calls that, while not inherently suspicious or abnormal, are sourcing from a geolocation (country) that is unusual. This can be the result of compromised credentials or keys. | [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_cloudtrail/ml/rare_method_for_a_country.json)| [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_cloudtrail/ml/datafeed_rare_method_for_a_country.json)| [AWS](https://www.elastic.co/docs/reference/integrations/aws/cloudtrail) | | ||
| | rare_method_for_a_username_ea | Looks for AWS API calls that, while not inherently suspicious or atypical, are sourcing from a user context that does not normally call the method. This can be the result of compromised credentials or keys as someone uses a valid account to persist, move laterally, or exfil data. | [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_cloudtrail/ml/rare_method_for_a_username_ea.json)| [code](https://github.com/elastic/kibana/blob/main/x-pack/platform/plugins/shared/ml/server/models/data_recognizer/modules/security_cloudtrail/ml/datafeed_rare_method_for_a_username_ea.json)| [AWS](https://www.elastic.co/docs/reference/integrations/aws/cloudtrail) | | ||
|
|
||
|
|
||
| ## Security: GCP Audit logs [security-gcp-audit] |
There was a problem hiding this comment.
We should make a note that these jobs now require the GCP audit integration version 2.47.2.
|
This commit updates the PR for structure and doc conventions:
|
|
@natasha-moore-elastic This PR is ready to merge. |
Thanks @sodhikirti07, I will merge it when the dev changes are live in serverless (next week's release) |
Summary
Relates to:
These changes are staged for
9.4release.Generative AI disclosure