Skip to content

[AI4DSOC] [Attack discovery] Enable the Attack discovery alerts and Attack discovery scheduling feature flags by default#228327

Merged
andrew-goldstein merged 9 commits intoelastic:mainfrom
andrew-goldstein:update_attack_discovery_feature_flags
Jul 18, 2025
Merged

[AI4DSOC] [Attack discovery] Enable the Attack discovery alerts and Attack discovery scheduling feature flags by default#228327
andrew-goldstein merged 9 commits intoelastic:mainfrom
andrew-goldstein:update_attack_discovery_feature_flags

Conversation

@andrew-goldstein
Copy link
Copy Markdown
Contributor

@andrew-goldstein andrew-goldstein commented Jul 16, 2025

[AI4DSOC] [Attack discovery] Enable the Attack discovery alerts and Attack discovery scheduling feature flags by default

This PR programmatically enables (by default) the Attack discovery alerts and Attack discovery scheduling feature flags.

Together, these features enable:

  • Persistence of Attack discoveries as alerts
  • Scheduling Attack discoveries, with support for actions, and cases integration
  • Open | Acknowledged | Closed workflow statuses for Attack discoveries
  • A new UI for searching and sharing previously created Attack discoveries

This PR enables the feature flags by default, as illustrated by the following screenshot:

attack_discovery_after

Above: Attack discovery alerts and scheduling are enabled by default

When the feature flags are manually disabled, the Attack discovery page looks like the following screenshot:

feature_flag_off

Above: The feature flags are manually disabled in the screenshot above

Desk testing

  1. Remove any old feature flag entries that may be present in config/kibana.dev.yml, like the following example:
feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: false
  securitySolution.assistantAttackDiscoverySchedulingEnabled: false
  1. Start a local development instance of Kibana

  2. Navigate to Security > Attack discovery

Expected result

  • The call to action buttons at the top of the page include the Run and Schedule buttons, as illustrated by the following animated gif:

03_cta_tooltips

  • The layout of page is similar to the following screenshot:

attack_discovery_after

  1. Disable the feature flags by adding the following entries to config/kibana.dev.yml:
feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: false
  securitySolution.assistantAttackDiscoverySchedulingEnabled: false
  1. Once again, navigate to Security > Attack discovery

Expected results

  • The call to action button at the top of the page is Generate
  • The Schedule call to action button does NOT appear
  • The layout of the page is similar to the following screenshot:

feature_flag_off

@andrew-goldstein andrew-goldstein self-assigned this Jul 16, 2025
@andrew-goldstein andrew-goldstein requested a review from a team as a code owner July 16, 2025 21:08
@andrew-goldstein andrew-goldstein added release_note:skip Skip the PR/issue when compiling release notes Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. Team:Security Generative AI Security Generative AI backport:version Backport to applied version labels v9.1.0 v8.19.0 v9.2.0 labels Jul 16, 2025
@elasticmachine
Copy link
Copy Markdown
Contributor

Pinging @elastic/security-solution (Team: SecuritySolution)

Copy link
Copy Markdown
Member

@spong spong left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

FF change LGTM! 👍

@andrew-goldstein andrew-goldstein force-pushed the update_attack_discovery_feature_flags branch 2 times, most recently from 4eaf3a5 to bf3873d Compare July 17, 2025 03:00
@andrew-goldstein andrew-goldstein requested review from a team as code owners July 17, 2025 03:00
@andrew-goldstein
Copy link
Copy Markdown
Contributor Author

Files by Code Owner

elastic/kibana-presentation

  • x-pack/platform/test/api_integration/apis/maps/maps_telemetry.ts

elastic/response-ops

  • x-pack/platform/plugins/shared/alerting/server/integration_tests/snapshots/alert_as_data_fields.test.ts.snap
  • x-pack/platform/plugins/shared/alerting/server/integration_tests/alert_as_data_fields.test.ts
  • x-pack/platform/plugins/shared/task_manager/server/integration_tests/snapshots/task_priority_check.test.ts.snap
  • x-pack/platform/test/alerting_api_integration/spaces_only/tests/alerting/group4/check_registered_rule_types.ts
  • x-pack/platform/test/plugin_api_integration/test_suites/task_manager/check_registered_task_types.ts

@andrew-goldstein andrew-goldstein force-pushed the update_attack_discovery_feature_flags branch from 21a4377 to 41861c6 Compare July 17, 2025 05:01
Copy link
Copy Markdown
Contributor

@nreese nreese left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

kibana-presentation changes to functional test expects - LGTM
code review only

andrew-goldstein and others added 9 commits July 18, 2025 09:49
…and _Attack discovery scheduling_ feature flags by default

This PR programmatically enables (by default) the [Attack discovery alerts](elastic#218906) and [Attack discovery scheduling](elastic#217917) feature flags.

Together, these features enable:

- Persistence of Attack discoveries as alerts
- Scheduling Attack discoveries, with support for actions, and cases integration
- Open | Acknowledged | Closed workflow statuses for Attack discoveries
- A new UI for searching and sharing previously created Attack discoveries

This PR enables the feature flags by default, as illustrated by the following screenshot:

![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)

_Above: Attack discovery alerts and scheduling are enabled by default_

When the feature flags are manually _disabled_, the Attack discovery page looks like the following screenshot:

![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)

_Above: The feature flags are manually disabled in the screenshot above_

### Desk testing

1) **Remove** any old feature flag entries that may be present in `config/kibana.dev.yml`, like the following example:

```yaml
feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: false
  securitySolution.assistantAttackDiscoverySchedulingEnabled: false
```

2) Start a local development instance of Kibana

3) Navigate to Security > Attack discovery

**Expected result**

- The call to action buttons at the top of the page include the `Run` and `Schedule` buttons, as illustrated by the following animated gif:

![03_cta_tooltips](https://github.com/user-attachments/assets/f43b39dc-a184-43db-a812-16e97798186f)

- The layout of page is similar to the following screenshot:

![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)

4) Disable the feature flags by adding the following entries to `config/kibana.dev.yml`:

```yaml
feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: false
  securitySolution.assistantAttackDiscoverySchedulingEnabled: false
```

5) Once again, navigate to Security > Attack discovery

**Expected results**

- The call to action button at the top of the page is `Generate`
- The `Schedule` call to action button does NOT appear
- The layout of the page is similar to the following screenshot:

![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)
…flags service with the correct attributes
…uld return the correct telemetry values for map saved objects
…es should check changes on all registered task types
…y.ts to fix FTR Configs elastic#116 / Maps endpoints apis maps_telemetry should return the correct telemetry values for map saved objects
@andrew-goldstein andrew-goldstein force-pushed the update_attack_discovery_feature_flags branch from 13e169f to 9740a39 Compare July 18, 2025 13:49
@elasticmachine
Copy link
Copy Markdown
Contributor

💛 Build succeeded, but was flaky

Failed CI Steps

Metrics [docs]

✅ unchanged

History

cc @andrew-goldstein

Copy link
Copy Markdown
Contributor

@pmuellr pmuellr left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ResponseOps changes LGTM

@andrew-goldstein andrew-goldstein merged commit 90ed7a1 into elastic:main Jul 18, 2025
12 checks passed
@andrew-goldstein andrew-goldstein deleted the update_attack_discovery_feature_flags branch July 18, 2025 20:51
@kibanamachine
Copy link
Copy Markdown
Contributor

Starting backport for target branches: 8.19, 9.1

https://github.com/elastic/kibana/actions/runs/16380083981

kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Jul 18, 2025
…ttack discovery scheduling feature flags by default (elastic#228327)

## [AI4DSOC] [Attack discovery] Enable the _Attack discovery alerts_ and _Attack discovery scheduling_ feature flags by default

This PR programmatically enables (by default) the [Attack discovery alerts](elastic#218906) and [Attack discovery scheduling](elastic#217917) feature flags.

Together, these features enable:

- Persistence of Attack discoveries as alerts
- Scheduling Attack discoveries, with support for actions, and cases integration
- Open | Acknowledged | Closed workflow statuses for Attack discoveries
- A new UI for searching and sharing previously created Attack discoveries

This PR enables the feature flags by default, as illustrated by the following screenshot:

![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)

_Above: Attack discovery alerts and scheduling are enabled by default_

When the feature flags are manually _disabled_, the Attack discovery page looks like the following screenshot:

![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)

_Above: The feature flags are manually disabled in the screenshot above_

### Desk testing

1) **Remove** any old feature flag entries that may be present in `config/kibana.dev.yml`, like the following example:

```yaml
feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: false
  securitySolution.assistantAttackDiscoverySchedulingEnabled: false
```

2) Start a local development instance of Kibana

3) Navigate to Security > Attack discovery

**Expected result**

- The call to action buttons at the top of the page include the `Run` and `Schedule` buttons, as illustrated by the following animated gif:

![03_cta_tooltips](https://github.com/user-attachments/assets/f43b39dc-a184-43db-a812-16e97798186f)

- The layout of page is similar to the following screenshot:

![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)

4) Disable the feature flags by adding the following entries to `config/kibana.dev.yml`:

```yaml
feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: false
  securitySolution.assistantAttackDiscoverySchedulingEnabled: false
```

5) Once again, navigate to Security > Attack discovery

**Expected results**

- The call to action button at the top of the page is `Generate`
- The `Schedule` call to action button does NOT appear
- The layout of the page is similar to the following screenshot:

![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)

(cherry picked from commit 90ed7a1)
kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Jul 18, 2025
…ttack discovery scheduling feature flags by default (elastic#228327)

## [AI4DSOC] [Attack discovery] Enable the _Attack discovery alerts_ and _Attack discovery scheduling_ feature flags by default

This PR programmatically enables (by default) the [Attack discovery alerts](elastic#218906) and [Attack discovery scheduling](elastic#217917) feature flags.

Together, these features enable:

- Persistence of Attack discoveries as alerts
- Scheduling Attack discoveries, with support for actions, and cases integration
- Open | Acknowledged | Closed workflow statuses for Attack discoveries
- A new UI for searching and sharing previously created Attack discoveries

This PR enables the feature flags by default, as illustrated by the following screenshot:

![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)

_Above: Attack discovery alerts and scheduling are enabled by default_

When the feature flags are manually _disabled_, the Attack discovery page looks like the following screenshot:

![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)

_Above: The feature flags are manually disabled in the screenshot above_

### Desk testing

1) **Remove** any old feature flag entries that may be present in `config/kibana.dev.yml`, like the following example:

```yaml
feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: false
  securitySolution.assistantAttackDiscoverySchedulingEnabled: false
```

2) Start a local development instance of Kibana

3) Navigate to Security > Attack discovery

**Expected result**

- The call to action buttons at the top of the page include the `Run` and `Schedule` buttons, as illustrated by the following animated gif:

![03_cta_tooltips](https://github.com/user-attachments/assets/f43b39dc-a184-43db-a812-16e97798186f)

- The layout of page is similar to the following screenshot:

![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)

4) Disable the feature flags by adding the following entries to `config/kibana.dev.yml`:

```yaml
feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: false
  securitySolution.assistantAttackDiscoverySchedulingEnabled: false
```

5) Once again, navigate to Security > Attack discovery

**Expected results**

- The call to action button at the top of the page is `Generate`
- The `Schedule` call to action button does NOT appear
- The layout of the page is similar to the following screenshot:

![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)

(cherry picked from commit 90ed7a1)
@kibanamachine
Copy link
Copy Markdown
Contributor

💚 All backports created successfully

Status Branch Result
8.19
9.1

Note: Successful backport PRs will be merged automatically after passing CI.

Questions ?

Please refer to the Backport tool documentation

kibanamachine added a commit that referenced this pull request Jul 18, 2025
… and Attack discovery scheduling feature flags by default (#228327) (#228678)

# Backport

This will backport the following commits from `main` to `9.1`:
- [[AI4DSOC] [Attack discovery] Enable the Attack discovery alerts and
Attack discovery scheduling feature flags by default
(#228327)](#228327)

<!--- Backport version: 9.6.6 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sorenlouv/backport)

<!--BACKPORT [{"author":{"name":"Andrew
Macri","email":"andrew.macri@elastic.co"},"sourceCommit":{"committedDate":"2025-07-18T20:51:39Z","message":"[AI4DSOC]
[Attack discovery] Enable the Attack discovery alerts and Attack
discovery scheduling feature flags by default (#228327)\n\n## [AI4DSOC]
[Attack discovery] Enable the _Attack discovery alerts_ and _Attack
discovery scheduling_ feature flags by default\n\nThis PR
programmatically enables (by default) the [Attack discovery
alerts](#218906) and [Attack
discovery scheduling](#217917)
feature flags.\n\nTogether, these features enable:\n\n- Persistence of
Attack discoveries as alerts\n- Scheduling Attack discoveries, with
support for actions, and cases integration\n- Open | Acknowledged |
Closed workflow statuses for Attack discoveries\n- A new UI for
searching and sharing previously created Attack discoveries\n\nThis PR
enables the feature flags by default, as illustrated by the following
screenshot:\n\n![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)\n\n_Above:
Attack discovery alerts and scheduling are enabled by default_\n\nWhen
the feature flags are manually _disabled_, the Attack discovery page
looks like the following
screenshot:\n\n![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)\n\n_Above:
The feature flags are manually disabled in the screenshot above_\n\n###
Desk testing\n\n1) **Remove** any old feature flag entries that may be
present in `config/kibana.dev.yml`, like the following
example:\n\n```yaml\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: false\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
false\n```\n\n2) Start a local development instance of Kibana\n\n3)
Navigate to Security > Attack discovery\n\n**Expected result**\n\n- The
call to action buttons at the top of the page include the `Run` and
`Schedule` buttons, as illustrated by the following animated
gif:\n\n![03_cta_tooltips](https://github.com/user-attachments/assets/f43b39dc-a184-43db-a812-16e97798186f)\n\n-
The layout of page is similar to the following
screenshot:\n\n![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)\n\n4)
Disable the feature flags by adding the following entries to
`config/kibana.dev.yml`:\n\n```yaml\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: false\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
false\n```\n\n5) Once again, navigate to Security > Attack
discovery\n\n**Expected results**\n\n- The call to action button at the
top of the page is `Generate`\n- The `Schedule` call to action button
does NOT appear\n- The layout of the page is similar to the following
screenshot:\n\n![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)","sha":"90ed7a1f6d6330222d681773f722d4dea2f485e8","branchLabelMapping":{"^v9.2.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","Team:
SecuritySolution","Team:Security Generative
AI","backport:version","v9.1.0","v8.19.0","v9.2.0"],"title":"[AI4DSOC]
[Attack discovery] Enable the Attack discovery alerts and Attack
discovery scheduling feature flags by
default","number":228327,"url":"https://github.com/elastic/kibana/pull/228327","mergeCommit":{"message":"[AI4DSOC]
[Attack discovery] Enable the Attack discovery alerts and Attack
discovery scheduling feature flags by default (#228327)\n\n## [AI4DSOC]
[Attack discovery] Enable the _Attack discovery alerts_ and _Attack
discovery scheduling_ feature flags by default\n\nThis PR
programmatically enables (by default) the [Attack discovery
alerts](#218906) and [Attack
discovery scheduling](#217917)
feature flags.\n\nTogether, these features enable:\n\n- Persistence of
Attack discoveries as alerts\n- Scheduling Attack discoveries, with
support for actions, and cases integration\n- Open | Acknowledged |
Closed workflow statuses for Attack discoveries\n- A new UI for
searching and sharing previously created Attack discoveries\n\nThis PR
enables the feature flags by default, as illustrated by the following
screenshot:\n\n![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)\n\n_Above:
Attack discovery alerts and scheduling are enabled by default_\n\nWhen
the feature flags are manually _disabled_, the Attack discovery page
looks like the following
screenshot:\n\n![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)\n\n_Above:
The feature flags are manually disabled in the screenshot above_\n\n###
Desk testing\n\n1) **Remove** any old feature flag entries that may be
present in `config/kibana.dev.yml`, like the following
example:\n\n```yaml\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: false\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
false\n```\n\n2) Start a local development instance of Kibana\n\n3)
Navigate to Security > Attack discovery\n\n**Expected result**\n\n- The
call to action buttons at the top of the page include the `Run` and
`Schedule` buttons, as illustrated by the following animated
gif:\n\n![03_cta_tooltips](https://github.com/user-attachments/assets/f43b39dc-a184-43db-a812-16e97798186f)\n\n-
The layout of page is similar to the following
screenshot:\n\n![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)\n\n4)
Disable the feature flags by adding the following entries to
`config/kibana.dev.yml`:\n\n```yaml\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: false\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
false\n```\n\n5) Once again, navigate to Security > Attack
discovery\n\n**Expected results**\n\n- The call to action button at the
top of the page is `Generate`\n- The `Schedule` call to action button
does NOT appear\n- The layout of the page is similar to the following
screenshot:\n\n![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)","sha":"90ed7a1f6d6330222d681773f722d4dea2f485e8"}},"sourceBranch":"main","suggestedTargetBranches":["9.1","8.19"],"targetPullRequestStates":[{"branch":"9.1","label":"v9.1.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"main","label":"v9.2.0","branchLabelMappingKey":"^v9.2.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/228327","number":228327,"mergeCommit":{"message":"[AI4DSOC]
[Attack discovery] Enable the Attack discovery alerts and Attack
discovery scheduling feature flags by default (#228327)\n\n## [AI4DSOC]
[Attack discovery] Enable the _Attack discovery alerts_ and _Attack
discovery scheduling_ feature flags by default\n\nThis PR
programmatically enables (by default) the [Attack discovery
alerts](#218906) and [Attack
discovery scheduling](#217917)
feature flags.\n\nTogether, these features enable:\n\n- Persistence of
Attack discoveries as alerts\n- Scheduling Attack discoveries, with
support for actions, and cases integration\n- Open | Acknowledged |
Closed workflow statuses for Attack discoveries\n- A new UI for
searching and sharing previously created Attack discoveries\n\nThis PR
enables the feature flags by default, as illustrated by the following
screenshot:\n\n![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)\n\n_Above:
Attack discovery alerts and scheduling are enabled by default_\n\nWhen
the feature flags are manually _disabled_, the Attack discovery page
looks like the following
screenshot:\n\n![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)\n\n_Above:
The feature flags are manually disabled in the screenshot above_\n\n###
Desk testing\n\n1) **Remove** any old feature flag entries that may be
present in `config/kibana.dev.yml`, like the following
example:\n\n```yaml\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: false\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
false\n```\n\n2) Start a local development instance of Kibana\n\n3)
Navigate to Security > Attack discovery\n\n**Expected result**\n\n- The
call to action buttons at the top of the page include the `Run` and
`Schedule` buttons, as illustrated by the following animated
gif:\n\n![03_cta_tooltips](https://github.com/user-attachments/assets/f43b39dc-a184-43db-a812-16e97798186f)\n\n-
The layout of page is similar to the following
screenshot:\n\n![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)\n\n4)
Disable the feature flags by adding the following entries to
`config/kibana.dev.yml`:\n\n```yaml\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: false\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
false\n```\n\n5) Once again, navigate to Security > Attack
discovery\n\n**Expected results**\n\n- The call to action button at the
top of the page is `Generate`\n- The `Schedule` call to action button
does NOT appear\n- The layout of the page is similar to the following
screenshot:\n\n![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)","sha":"90ed7a1f6d6330222d681773f722d4dea2f485e8"}}]}]
BACKPORT-->

Co-authored-by: Andrew Macri <andrew.macri@elastic.co>
delanni pushed a commit that referenced this pull request Jul 21, 2025
…s and Attack discovery scheduling feature flags by default (#228327) (#228677)

# Backport

This will backport the following commits from `main` to `8.19`:
- [[AI4DSOC] [Attack discovery] Enable the Attack discovery alerts and
Attack discovery scheduling feature flags by default
(#228327)](#228327)

<!--- Backport version: 9.6.6 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sorenlouv/backport)

<!--BACKPORT [{"author":{"name":"Andrew
Macri","email":"andrew.macri@elastic.co"},"sourceCommit":{"committedDate":"2025-07-18T20:51:39Z","message":"[AI4DSOC]
[Attack discovery] Enable the Attack discovery alerts and Attack
discovery scheduling feature flags by default (#228327)\n\n## [AI4DSOC]
[Attack discovery] Enable the _Attack discovery alerts_ and _Attack
discovery scheduling_ feature flags by default\n\nThis PR
programmatically enables (by default) the [Attack discovery
alerts](#218906) and [Attack
discovery scheduling](#217917)
feature flags.\n\nTogether, these features enable:\n\n- Persistence of
Attack discoveries as alerts\n- Scheduling Attack discoveries, with
support for actions, and cases integration\n- Open | Acknowledged |
Closed workflow statuses for Attack discoveries\n- A new UI for
searching and sharing previously created Attack discoveries\n\nThis PR
enables the feature flags by default, as illustrated by the following
screenshot:\n\n![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)\n\n_Above:
Attack discovery alerts and scheduling are enabled by default_\n\nWhen
the feature flags are manually _disabled_, the Attack discovery page
looks like the following
screenshot:\n\n![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)\n\n_Above:
The feature flags are manually disabled in the screenshot above_\n\n###
Desk testing\n\n1) **Remove** any old feature flag entries that may be
present in `config/kibana.dev.yml`, like the following
example:\n\n```yaml\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: false\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
false\n```\n\n2) Start a local development instance of Kibana\n\n3)
Navigate to Security > Attack discovery\n\n**Expected result**\n\n- The
call to action buttons at the top of the page include the `Run` and
`Schedule` buttons, as illustrated by the following animated
gif:\n\n![03_cta_tooltips](https://github.com/user-attachments/assets/f43b39dc-a184-43db-a812-16e97798186f)\n\n-
The layout of page is similar to the following
screenshot:\n\n![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)\n\n4)
Disable the feature flags by adding the following entries to
`config/kibana.dev.yml`:\n\n```yaml\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: false\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
false\n```\n\n5) Once again, navigate to Security > Attack
discovery\n\n**Expected results**\n\n- The call to action button at the
top of the page is `Generate`\n- The `Schedule` call to action button
does NOT appear\n- The layout of the page is similar to the following
screenshot:\n\n![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)","sha":"90ed7a1f6d6330222d681773f722d4dea2f485e8","branchLabelMapping":{"^v9.2.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","Team:
SecuritySolution","Team:Security Generative
AI","backport:version","v9.1.0","v8.19.0","v9.2.0"],"title":"[AI4DSOC]
[Attack discovery] Enable the Attack discovery alerts and Attack
discovery scheduling feature flags by
default","number":228327,"url":"https://github.com/elastic/kibana/pull/228327","mergeCommit":{"message":"[AI4DSOC]
[Attack discovery] Enable the Attack discovery alerts and Attack
discovery scheduling feature flags by default (#228327)\n\n## [AI4DSOC]
[Attack discovery] Enable the _Attack discovery alerts_ and _Attack
discovery scheduling_ feature flags by default\n\nThis PR
programmatically enables (by default) the [Attack discovery
alerts](#218906) and [Attack
discovery scheduling](#217917)
feature flags.\n\nTogether, these features enable:\n\n- Persistence of
Attack discoveries as alerts\n- Scheduling Attack discoveries, with
support for actions, and cases integration\n- Open | Acknowledged |
Closed workflow statuses for Attack discoveries\n- A new UI for
searching and sharing previously created Attack discoveries\n\nThis PR
enables the feature flags by default, as illustrated by the following
screenshot:\n\n![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)\n\n_Above:
Attack discovery alerts and scheduling are enabled by default_\n\nWhen
the feature flags are manually _disabled_, the Attack discovery page
looks like the following
screenshot:\n\n![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)\n\n_Above:
The feature flags are manually disabled in the screenshot above_\n\n###
Desk testing\n\n1) **Remove** any old feature flag entries that may be
present in `config/kibana.dev.yml`, like the following
example:\n\n```yaml\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: false\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
false\n```\n\n2) Start a local development instance of Kibana\n\n3)
Navigate to Security > Attack discovery\n\n**Expected result**\n\n- The
call to action buttons at the top of the page include the `Run` and
`Schedule` buttons, as illustrated by the following animated
gif:\n\n![03_cta_tooltips](https://github.com/user-attachments/assets/f43b39dc-a184-43db-a812-16e97798186f)\n\n-
The layout of page is similar to the following
screenshot:\n\n![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)\n\n4)
Disable the feature flags by adding the following entries to
`config/kibana.dev.yml`:\n\n```yaml\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: false\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
false\n```\n\n5) Once again, navigate to Security > Attack
discovery\n\n**Expected results**\n\n- The call to action button at the
top of the page is `Generate`\n- The `Schedule` call to action button
does NOT appear\n- The layout of the page is similar to the following
screenshot:\n\n![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)","sha":"90ed7a1f6d6330222d681773f722d4dea2f485e8"}},"sourceBranch":"main","suggestedTargetBranches":["9.1","8.19"],"targetPullRequestStates":[{"branch":"9.1","label":"v9.1.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"main","label":"v9.2.0","branchLabelMappingKey":"^v9.2.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/228327","number":228327,"mergeCommit":{"message":"[AI4DSOC]
[Attack discovery] Enable the Attack discovery alerts and Attack
discovery scheduling feature flags by default (#228327)\n\n## [AI4DSOC]
[Attack discovery] Enable the _Attack discovery alerts_ and _Attack
discovery scheduling_ feature flags by default\n\nThis PR
programmatically enables (by default) the [Attack discovery
alerts](#218906) and [Attack
discovery scheduling](#217917)
feature flags.\n\nTogether, these features enable:\n\n- Persistence of
Attack discoveries as alerts\n- Scheduling Attack discoveries, with
support for actions, and cases integration\n- Open | Acknowledged |
Closed workflow statuses for Attack discoveries\n- A new UI for
searching and sharing previously created Attack discoveries\n\nThis PR
enables the feature flags by default, as illustrated by the following
screenshot:\n\n![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)\n\n_Above:
Attack discovery alerts and scheduling are enabled by default_\n\nWhen
the feature flags are manually _disabled_, the Attack discovery page
looks like the following
screenshot:\n\n![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)\n\n_Above:
The feature flags are manually disabled in the screenshot above_\n\n###
Desk testing\n\n1) **Remove** any old feature flag entries that may be
present in `config/kibana.dev.yml`, like the following
example:\n\n```yaml\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: false\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
false\n```\n\n2) Start a local development instance of Kibana\n\n3)
Navigate to Security > Attack discovery\n\n**Expected result**\n\n- The
call to action buttons at the top of the page include the `Run` and
`Schedule` buttons, as illustrated by the following animated
gif:\n\n![03_cta_tooltips](https://github.com/user-attachments/assets/f43b39dc-a184-43db-a812-16e97798186f)\n\n-
The layout of page is similar to the following
screenshot:\n\n![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)\n\n4)
Disable the feature flags by adding the following entries to
`config/kibana.dev.yml`:\n\n```yaml\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: false\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
false\n```\n\n5) Once again, navigate to Security > Attack
discovery\n\n**Expected results**\n\n- The call to action button at the
top of the page is `Generate`\n- The `Schedule` call to action button
does NOT appear\n- The layout of the page is similar to the following
screenshot:\n\n![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)","sha":"90ed7a1f6d6330222d681773f722d4dea2f485e8"}}]}]
BACKPORT-->

Co-authored-by: Andrew Macri <andrew.macri@elastic.co>
Bluefinger pushed a commit to Bluefinger/kibana that referenced this pull request Jul 22, 2025
…ttack discovery scheduling feature flags by default (elastic#228327)

## [AI4DSOC] [Attack discovery] Enable the _Attack discovery alerts_ and _Attack discovery scheduling_ feature flags by default

This PR programmatically enables (by default) the [Attack discovery alerts](elastic#218906) and [Attack discovery scheduling](elastic#217917) feature flags.

Together, these features enable:

- Persistence of Attack discoveries as alerts
- Scheduling Attack discoveries, with support for actions, and cases integration
- Open | Acknowledged | Closed workflow statuses for Attack discoveries
- A new UI for searching and sharing previously created Attack discoveries

This PR enables the feature flags by default, as illustrated by the following screenshot:

![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)

_Above: Attack discovery alerts and scheduling are enabled by default_

When the feature flags are manually _disabled_, the Attack discovery page looks like the following screenshot:

![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)

_Above: The feature flags are manually disabled in the screenshot above_

### Desk testing

1) **Remove** any old feature flag entries that may be present in `config/kibana.dev.yml`, like the following example:

```yaml
feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: false
  securitySolution.assistantAttackDiscoverySchedulingEnabled: false
```

2) Start a local development instance of Kibana

3) Navigate to Security > Attack discovery

**Expected result**

- The call to action buttons at the top of the page include the `Run` and `Schedule` buttons, as illustrated by the following animated gif:

![03_cta_tooltips](https://github.com/user-attachments/assets/f43b39dc-a184-43db-a812-16e97798186f)

- The layout of page is similar to the following screenshot:

![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)

4) Disable the feature flags by adding the following entries to `config/kibana.dev.yml`:

```yaml
feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: false
  securitySolution.assistantAttackDiscoverySchedulingEnabled: false
```

5) Once again, navigate to Security > Attack discovery

**Expected results**

- The call to action button at the top of the page is `Generate`
- The `Schedule` call to action button does NOT appear
- The layout of the page is similar to the following screenshot:

![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)
kertal pushed a commit to kertal/kibana that referenced this pull request Jul 25, 2025
…ttack discovery scheduling feature flags by default (elastic#228327)

## [AI4DSOC] [Attack discovery] Enable the _Attack discovery alerts_ and _Attack discovery scheduling_ feature flags by default

This PR programmatically enables (by default) the [Attack discovery alerts](elastic#218906) and [Attack discovery scheduling](elastic#217917) feature flags.

Together, these features enable:

- Persistence of Attack discoveries as alerts
- Scheduling Attack discoveries, with support for actions, and cases integration
- Open | Acknowledged | Closed workflow statuses for Attack discoveries
- A new UI for searching and sharing previously created Attack discoveries

This PR enables the feature flags by default, as illustrated by the following screenshot:

![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)

_Above: Attack discovery alerts and scheduling are enabled by default_

When the feature flags are manually _disabled_, the Attack discovery page looks like the following screenshot:

![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)

_Above: The feature flags are manually disabled in the screenshot above_

### Desk testing

1) **Remove** any old feature flag entries that may be present in `config/kibana.dev.yml`, like the following example:

```yaml
feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: false
  securitySolution.assistantAttackDiscoverySchedulingEnabled: false
```

2) Start a local development instance of Kibana

3) Navigate to Security > Attack discovery

**Expected result**

- The call to action buttons at the top of the page include the `Run` and `Schedule` buttons, as illustrated by the following animated gif:

![03_cta_tooltips](https://github.com/user-attachments/assets/f43b39dc-a184-43db-a812-16e97798186f)

- The layout of page is similar to the following screenshot:

![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)

4) Disable the feature flags by adding the following entries to `config/kibana.dev.yml`:

```yaml
feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: false
  securitySolution.assistantAttackDiscoverySchedulingEnabled: false
```

5) Once again, navigate to Security > Attack discovery

**Expected results**

- The call to action button at the top of the page is `Generate`
- The `Schedule` call to action button does NOT appear
- The layout of the page is similar to the following screenshot:

![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)
crespocarlos pushed a commit to crespocarlos/kibana that referenced this pull request Jul 25, 2025
…ttack discovery scheduling feature flags by default (elastic#228327)

## [AI4DSOC] [Attack discovery] Enable the _Attack discovery alerts_ and _Attack discovery scheduling_ feature flags by default

This PR programmatically enables (by default) the [Attack discovery alerts](elastic#218906) and [Attack discovery scheduling](elastic#217917) feature flags.

Together, these features enable:

- Persistence of Attack discoveries as alerts
- Scheduling Attack discoveries, with support for actions, and cases integration
- Open | Acknowledged | Closed workflow statuses for Attack discoveries
- A new UI for searching and sharing previously created Attack discoveries

This PR enables the feature flags by default, as illustrated by the following screenshot:

![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)

_Above: Attack discovery alerts and scheduling are enabled by default_

When the feature flags are manually _disabled_, the Attack discovery page looks like the following screenshot:

![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)

_Above: The feature flags are manually disabled in the screenshot above_

### Desk testing

1) **Remove** any old feature flag entries that may be present in `config/kibana.dev.yml`, like the following example:

```yaml
feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: false
  securitySolution.assistantAttackDiscoverySchedulingEnabled: false
```

2) Start a local development instance of Kibana

3) Navigate to Security > Attack discovery

**Expected result**

- The call to action buttons at the top of the page include the `Run` and `Schedule` buttons, as illustrated by the following animated gif:

![03_cta_tooltips](https://github.com/user-attachments/assets/f43b39dc-a184-43db-a812-16e97798186f)

- The layout of page is similar to the following screenshot:

![attack_discovery_after](https://github.com/user-attachments/assets/b3ace302-d641-4fde-9848-a00603d7c46c)

4) Disable the feature flags by adding the following entries to `config/kibana.dev.yml`:

```yaml
feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: false
  securitySolution.assistantAttackDiscoverySchedulingEnabled: false
```

5) Once again, navigate to Security > Attack discovery

**Expected results**

- The call to action button at the top of the page is `Generate`
- The `Schedule` call to action button does NOT appear
- The layout of the page is similar to the following screenshot:

![feature_flag_off](https://github.com/user-attachments/assets/bdc9e4c1-26be-4b01-83d0-2f0cef59c863)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

backport:version Backport to applied version labels release_note:skip Skip the PR/issue when compiling release notes Team:Security Generative AI Security Generative AI Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. v8.19.0 v9.1.0 v9.2.0

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants