Skip to content

Commit 28a50d7

Browse files
Gen AI updates (#930)
Multiple fixes related to the AI for Security docs. Refer to the preview links below. Fixes the following issues: - #363 #534 — adds info about how to use the new filter settings to select which alerts get analyzed by Attack Discovery and about how to get Attack Discovery to analyze non-ECS fields ([preview](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/930/solutions/security/ai/attack-discovery)) - #366 and elastic/security-docs#6473 — adds info about the new citation feature and the ability to cite product docs ([preview](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/930/solutions/security/ai/ai-assistant)) - #619 — updates the Connect to Bedrock guide ([preview](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/930/solutions/security/ai/connect-to-amazon-bedrock)) - #278 — Updates the Connect to an LLM landing page to provide information about EIS ([preview](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/930/solutions/security/ai/set-up-connectors-for-large-language-models-llm)) - Updates the Attack Discovery / AI Assistant use-case guide to emphasize the importance of using filters to target Attack Discovery at relevant alerts. ([preview](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/930/solutions/security/ai/identify-investigate-document-threats#use-case-incident-reporting-use-attack-discovery-to-identify-threats)) --------- Co-authored-by: natasha-moore-elastic <[email protected]>
1 parent 5878a49 commit 28a50d7

8 files changed

+80
-39
lines changed
Loading
215 KB
Loading

solutions/security/ai/ai-assistant.md

Lines changed: 19 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ applies_to:
1010

1111
# AI Assistant
1212

13-
The Elastic AI Assistant utilizes generative AI to bolster your cybersecurity operations team. It allows users to interact with {{elastic-sec}} for tasks such as alert investigation, incident response, and query generation or conversion using natural language and much more.
13+
The Elastic AI Assistant utilizes generative AI to bolster your cybersecurity operations team. It allows users to interact with {{elastic-sec}} for tasks such as alert investigation, incident response, and query generation or conversation using natural language and much more.
1414

1515
:::{image} /solutions/images/security-assistant-basic-view.png
1616
:alt: Image of AI Assistant chat window
@@ -75,7 +75,7 @@ You can also chat with AI Assistant from several particular pages in {{elastic-s
7575
* [Data Quality dashboard](/solutions/security/dashboards/data-quality-dashboard.md): Select the **Incompatible fields** tab, then click **Chat**. (This is only available for fields marked red, indicating they’re incompatible).
7676

7777
::::{note}
78-
Each user’s chat history (up to the 99 most recent conversations) and custom Quick Prompts are automatically saved, so you can leave {{elastic-sec}} and return to a conversation later. Chat history appears to the left of the AI Assistant chat window, and on the **Conversations** tab of the **AI Assistant settings** menu. To access the settings menu, use the global search field to search for "AI Assistant for Security".
78+
Each user’s chat history (up to the 99 most recent conversations) and custom Quick Prompts are automatically saved, so you can leave {{elastic-sec}} and return to a conversation later. Chat history appears to the left of the AI Assistant chat window, and on the **Conversations** tab of the **AI Assistant settings** menu. To access the settings menu, use the global search field to search for "AI Assistant for Security" or open the menu in the upper-right of the AI Assistant chat window.
7979
::::
8080

8181

@@ -87,16 +87,16 @@ Use these features to adjust and act on your conversations with AI Assistant:
8787
* (Optional) Select a *System Prompt* at the beginning of a conversation by using the **Select Prompt** menu. System Prompts provide context to the model, informing its response. To create a System Prompt, open the System Prompts dropdown menu and click **+ Add new System Prompt…​**.
8888
* (Optional) Select a *Quick Prompt* at the bottom of the chat window to get help writing a prompt for a specific purpose, such as summarizing an alert or converting a query from a legacy SIEM to {{elastic-sec}}.
8989

90-
:::{image} /solutions/images/security-quick-prompts.png
91-
:alt: Quick Prompts highlighted below a conversation
92-
:screenshot:
93-
:::
90+
:::{image} ../../images/security-quick-prompts.png
91+
:alt: Quick Prompts highlighted below a conversation
92+
:screenshot:
93+
:::
9494

9595
* System Prompts and Quick Prompts can also be configured from the corresponding tabs on the **Security AI settings** page.
9696

97-
:::{image} /solutions/images/security-assistant-settings-system-prompts.png
98-
:alt: The Security AI settings menu's System Prompts tab
99-
:::
97+
:::{image} ../../images/security-assistant-settings-system-prompts.png
98+
:alt: The Security AI settings menu's System Prompts tab
99+
:::
100100

101101
* Quick Prompt availability varies based on context—for example, the **Alert summarization** Quick Prompt appears when you open AI Assistant while viewing an alert. To customize existing Quick Prompts and create new ones, click **Add Quick Prompt**.
102102
* In an active conversation, you can use the inline actions that appear on messages to incorporate AI Assistant’s responses into your workflows:
@@ -117,7 +117,16 @@ AI Assistant can remember particular information you tell it to remember. For ex
117117

118118
## Configure AI Assistant [configure-ai-assistant]
119119

120-
The **Security AI settings** page allows you to configure AI Assistant. To access it, use the global search field to search for "AI Assistant for Security".
120+
To adjust AI Assistant's settings from the chat window, click the **More** (three dots) button in the upper-right.
121+
122+
::::{image} ../../../images/security-attack-discovery-more-popover.png
123+
:alt: AI Assistant's more options popover
124+
:screenshot:
125+
::::
126+
127+
The first three options (**AI Assistant settings**, **Knowledge Base**, and **Anonymization**) open the corresponding tabs of the **Security AI settings** page. The **Chat options** affect display-only user settings: whether to show or hide anonymized values, and whether to include citations. When citations are enabled, AI Assistant will refer you to information sources including data you've shared with it, information you've added to the knowledge base, and content from Elastic's Security Labs and product documentation.
128+
129+
The **Security AI settings** page provides a range of configuration options for AI Assistant. To access it directly, use the global search field to search for "AI Assistant for Security".
121130

122131
It has the following tabs:
123132

solutions/security/ai/attack-discovery.md

Lines changed: 24 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -31,13 +31,34 @@ This page describes:
3131

3232
## Role-based access control (RBAC) for Attack Discovery [attack-discovery-rbac]
3333

34-
The `Attack Discovery: All` privilege allows you to use Attack Discovery.
34+
You need the `Attack Discovery: All` privilege to use Attack Discovery.
3535

3636
![attack-discovery-rbac](/solutions/images/security-attck-disc-rbac.png)
3737

38+
## Set up Attack Discovery
39+
40+
By default, Attack Discovery analyzes up to 100 alerts from the last 24 hours, but you can customize how many and which alerts it analyzes using the settings menu. To open it, click the gear icon next to the **Generate** button.
41+
42+
::::{image} ../../../images/security-attack-discovery-settings.png
43+
:alt: Attack Discovery's settings menu
44+
:width: 500px
45+
::::
46+
47+
You can select which alerts Attack Discovery will process by filtering based on a KQL query, the time and date selector, and the **Number of alerts** slider. Note that sending more alerts than your chosen LLM can handle may result in an error. Under **Alert summary** you can view a summary of the selected alerts grouped by various fields, and under **Alerts preview** you can see more details about the selected alerts.
48+
49+
:::{admonition} How to add non-ECS fields to Attack Discovery
50+
Attack Discovery is designed for use with alerts based on data that complies with ECS, and by default only analyses ECS-compliant fields. However, you can enable Attack Discovery to review additional fields by following these steps:
51+
52+
1. Select an alert with some of the non-ECS fields you want to analyze, and go to its details flyout. From here, use the **Chat** button to open AI Assistant.
53+
2. At the bottom of the chat window, the alert's information appears. Click **Edit** to open the anonymization window to this alert's fields.
54+
3. Search for and select the non-ECS fields you want Attack Discovery to analyze. Set them to **Allowed**.
55+
56+
The selected fields can now be analyzed the next time you run Attack Discovery.
57+
:::
58+
3859
## Generate discoveries [attack-discovery-generate-discoveries]
3960

40-
When you access Attack Discovery for the first time, you’ll need to select an LLM connector before you can analyze alerts. Attack Discovery uses the same LLM connectors as [AI Assistant](/solutions/security/ai/ai-assistant.md). To get started:
61+
You’ll need to select an LLM connector before you can analyze alerts. Attack Discovery uses the same LLM connectors as [AI Assistant](/solutions/security/ai/ai-assistant.md). To get started:
4162

4263
1. Click the **Attack Discovery** page from {{elastic-sec}}'s navigation menu.
4364
2. Select an existing connector from the dropdown menu, or add a new one.
@@ -54,26 +75,13 @@ When you access Attack Discovery for the first time, you’ll need to select an
5475

5576
3. Once you’ve selected a connector, click **Generate** to start the analysis.
5677

57-
It may take from a few seconds up to several minutes to generate discoveries, depending on the number of alerts and the model you selected.
58-
59-
::::{important}
60-
By default, Attack Discovery analyzes up to 100 alerts within this timeframe, but you can expand this up to 500 by clicking the settings icon (![Settings icon](/solutions/images/security-icon-settings.png "title =20x20")) next to the model selection menu and adjusting the **Alerts** slider. Note that sending more alerts than your chosen LLM can handle may result in an error.
61-
::::
62-
63-
64-
:::{image} /solutions/images/security-attck-disc-alerts-number-menu.png
65-
:alt: Attack Discovery's settings menu
66-
:width: 600px
67-
:::
78+
It may take from a few seconds up to several minutes to generate discoveries, depending on the number of alerts and the model you selected. Once the analysis is complete, any threats it identifies will appear as discoveries. Click each one’s title to expand or collapse it. Click **Generate** at any time to start the Attack Discovery process again with the selected alerts.
6879

6980
::::{important}
7081
Attack Discovery uses the same data anonymization settings as [Elastic AI Assistant](/solutions/security/ai/ai-assistant.md). To configure which alert fields are sent to the LLM and which of those fields are obfuscated, use the Elastic AI Assistant settings. Consider the privacy policies of third-party LLMs before sending them sensitive data.
7182
::::
7283

7384

74-
Once the analysis is complete, any threats it identifies will appear as discoveries. Click each one’s title to expand or collapse it. Click **Generate** at any time to start the Attack Discovery process again with the most current alerts.
75-
76-
7785
## What information does each discovery include? [attack-discovery-what-info]
7886

7987
Each discovery includes the following information describing the potential threat, generated by the connected LLM:

solutions/security/ai/connect-to-amazon-bedrock.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ applies_to:
1313
This page provides step-by-step instructions for setting up an Amazon Bedrock connector for the first time. This connector type enables you to leverage large language models (LLMs) within {{kib}}. You’ll first need to configure AWS, then configure the connector in {{kib}}.
1414

1515
::::{note}
16-
Only Amazon Bedrocks `Anthropic` models are supported: `Claude` and `Claude instant`.
16+
All models in Amazon Bedrock's `Claude` model group are supported.
1717
::::
1818

1919

@@ -99,7 +99,7 @@ Make sure the supported Amazon Bedrock LLMs are enabled:
9999
1. Search the AWS console for Amazon Bedrock.
100100
2. From the Amazon Bedrock page, click **Get started**.
101101
3. Select **Model access** from the left navigation menu, then click **Manage model access**.
102-
4. Check the boxes for **Claude** and/or **Claude Instant**, depending which model or models you plan to use.
102+
4. Check the box for the model or models you plan to use.
103103
5. Click **Save changes**.
104104

105105
The following video demonstrates these steps (click to watch).
@@ -115,11 +115,13 @@ Finally, configure the connector in {{kib}}:
115115
2. Find the **Connectors** page in the navigation menu or use the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md). Then click **Create Connector**, and select **Amazon Bedrock**.
116116
3. Name your connector.
117117
4. (Optional) Configure the Amazon Bedrock connector to use a different AWS region where Anthropic models are supported by editing the **URL** field, for example by changing `us-east-1` to `eu-central-1`.
118-
5. (Optional) Add one of the following strings if you want to use a model other than the default:
118+
5. (Optional) Add one of the following strings if you want to use a model other than the default. Note that these URLs should have a prefix of `us.` or `eu.`, depending on your region, for example `us.anthropic.claude-3-5-sonnet-20240620-v1:0` or `eu.anthropic.claude-3-5-sonnet-20240620-v1:0`.
119119

120-
* For Haiku: `anthropic.claude-3-haiku-20240307-v1:0`
121-
* For Sonnet: `anthropic.claude-3-sonnet-20240229-v1:0`
122-
* For Opus: `anthropic.claude-3-opus-20240229-v1:0`
120+
* Sonnet 3.5: `us.anthropic.claude-3-5-sonnet-20240620-v1:0` or `eu.anthropic.claude-3-5-sonnet-20240620-v1:0`
121+
* Sonnet 3.5 v2: `us.anthropic.claude-3-5-sonnet-20241022-v2:0` or `eu.anthropic.claude-3-5-sonnet-20241022-v2:0`
122+
* Sonnet 3.7: `us.anthropic.claude-3-7-sonnet-20250219-v1:0` or `eu.anthropic.claude-3-7-sonnet-20250219-v1:0`
123+
* Haiku 3.5: `us.anthropic.claude-3-5-haiku-20241022-v1:0` or `eu.anthropic.claude-3-5-haiku-20241022-v1:0`
124+
* Opus: `us.anthropic.claude-3-opus-20240229-v1:0` or `eu.anthropic.claude-3-opus-20240229-v1:0`
123125

124126
6. Enter the **Access Key** and **Secret** that you generated earlier, then click **Save**.
125127

solutions/security/ai/identify-investigate-document-threats.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,12 @@ In this guide, you’ll learn how to:
2222

2323
## Use Attack discovery to identify threats [use-case-incident-reporting-use-attack-discovery-to-identify-threats]
2424

25-
Attack discovery can detect a wide range of threats by finding relationships among alerts that may indicate a coordinated attack. This enables you to comprehend how threats move through and affect your systems. Attack discovery generates a detailed summary of each potential threat, which can serve as the basis for further analysis. Learn how to [get started with Attack discovery](/solutions/security/ai/attack-discovery.md).
25+
Attack discovery can detect a wide range of threats by finding relationships among alerts that may indicate a coordinated attack. This enables you to comprehend how threats move through and affect your systems. Attack discovery generates a detailed summary of each potential threat and can highlight avenues for further investigation. Learn how to [get started with Attack discovery](/solutions/security/ai/attack-discovery.md).
26+
27+
:::{important}
28+
To ensure that Attack Discovery analyzes related alerts together (and can therefore identify their connections), pay attention to the [alert filtering](/solutions/security/ai/attack-discovery.md) settings. This allows you to target Attack Discovery at specific groups of alerts, such as those related to a particular host, user, date and time, incident, or customer.
29+
30+
:::
2631

2732
:::{image} /solutions/images/security-attck-disc-11-alerts-disc.png
2833
:alt: An Attack discovery card showing an attack with 11 related alerts

solutions/security/ai/set-up-connectors-for-large-language-models-llm.md

Lines changed: 21 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,17 +8,34 @@ applies_to:
88
security: all
99
---
1010

11-
# Set up connectors for large language models (LLM)
11+
# Enable large language model (LLM) access
1212

13-
This section contains instructions for setting up connectors for LLMs so you can use [Elastic AI Assistant](/solutions/security/ai/ai-assistant.md) and [Attack discovery](/solutions/security/ai/attack-discovery.md).
13+
{{elastic-sec}} uses large language models (LLMs) for some of its advanced analytics features. To enable these features, you can connect to Elastic LLM, a third-party LLM provider, or a custom local LLM.
1414

15-
Setup guides are available for the following LLM providers:
15+
:::{important}
16+
Different LLMs have varying performance when used to power different features and use-cases. For more information about how various models perform on different tasks in {{elastic-sec}}, refer to the [Large language model performance matrix](/solutions/security/ai/large-language-model-performance-matrix.md).
17+
:::
18+
19+
20+
## Connect to Elastic LLM
21+
22+
Elastic LLM is enabled by default for any user with the necessary Elastic license or subscription. To use it:
23+
24+
1. Navigate to a feature that uses an LLM, such as AI Assistant.
25+
2. Use the model selection menu to select the Elastic LLM*.
26+
27+
## Connect to a third-party LLM
28+
29+
Follow these guides to connect to one or more third-party LLM providers:
1630

1731
* [Azure OpenAI](/solutions/security/ai/connect-to-azure-openai.md)
1832
* [Amazon Bedrock](/solutions/security/ai/connect-to-amazon-bedrock.md)
1933
* [OpenAI](/solutions/security/ai/connect-to-openai.md)
2034
* [Google Vertex](/solutions/security/ai/connect-to-google-vertex.md)
21-
* [LM Studio (custom local LLM)](/solutions/security/ai/connect-to-own-local-llm.md)
35+
36+
## Connect to a custom local LLM
37+
38+
You can [connect to LM Studio](/solutions/security/ai/connect-to-own-local-llm.md) to use a custom LLM deployed and managed by you.
2239

2340

2441

solutions/security/ai/use-cases.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@ applies_to:
88
security: all
99
---
1010

11-
# Use cases
11+
# Example AI workflows
1212

13-
The guides in this section describe use cases for AI Assistant and Attack discovery. Refer to them for examples of each tool’s individual capabilities and of what they can do together.
13+
The guides in this section describe example workflows for AI Assistant and Attack discovery. Refer to them for examples of each tool’s individual capabilities and how they can work together.
1414

1515
* [Triage alerts](/solutions/security/ai/triage-alerts.md)
1616
* [Identify, investigate, and document threats](/solutions/security/ai/identify-investigate-document-threats.md)

0 commit comments

Comments
 (0)