You are viewing docs on Elastic's new documentation system, currently in technical preview. For all other Elastic docs, visit elastic.co/guide.

Manage detection alerts

Filter alerts, view trends, and start investigating and analyzing detections on the Alerts page.

The Alerts page displays all detection alerts.

View and filter detection alerts

The Alerts page offers various ways for you to organize and triage detection alerts as you investigate suspicious events. You can:

  • View an alert's details. Click the View details button from the Alerts table to open the alert details flyout. Learn more at View detection alert details.

  • View the rule that created an alert. Click a name in the Rule column to open the rule's details page.

  • View the details of the host and user associated with the alert. In the Alerts table, click a host name to open the host details flyout, or a user name to open the user details flyout.

  • Filter for a specific rule in the KQL bar (for example, kibana.alert.rule.name :"SSH (Secure Shell) from the Internet"). KQL autocomplete is available for .alerts-security.alerts-* indices.

  • Use the date and time filter to define a specific time range. By default, this filter is set to search the last 24 hours.

  • Use the drop-down filter controls to filter alerts by up to four fields. By default, you can filter alerts by Status, Severity, User, and Host, and you can edit the controls to use other fields.

  • Visualize and group alerts by specific fields in the visualization section. Use the buttons on the left to select a view type (Summary, Trend, Counts, or Treemap), and use the menus on the right to select the ECS fields used for grouping alerts. Refer to Visualize detection alerts for more on each view type.

  • Hover over a value to display available inline actions, such as Filter In, Filter Out, and Add to timeline. Click the expand icon for more options, including Show top x and Copy to Clipboard. The available options vary based on the type of data.

  • Filter alert results to include building block alerts or to only show alerts from indicator match rules by selecting the Additional filters drop-down. By default, building block alerts are excluded from the Overview and Alerts pages. You can choose to include building block alerts on the Alerts page, which expands the number of alerts.

    Note

    When updating alert results to include building block alerts, the Security app searches the .alerts-security.alerts-<Kibana space> index for the kibana.alert.building_block_type field. When looking for alerts created from indicator match rules, the app searches the same index for kibana.alert.rule.type:'threat_match'.

  • View detection alerts generated by a specific rule. Go to RulesDetection rules (SIEM), then select a rule name in the table. The rule details page displays a comprehensive view of the rule's settings, and the Alerts table under the Trend histogram displays the alerts associated with the rule, including alerts from any previous or deleted revision of that rule.

Edit drop-down filter controls

By default, the drop-down controls on the Alerts page filter alerts by Status, Severity, User, and Host. You can edit them to filter by different fields, as well as remove, add, and reorder them if you prefer a different order.

Note

  • You can have a maximum of four controls on the Alerts page.
  • You can't remove the Status control.
  • If you make any changes to the controls, you must save the pending changes for them to persist.
  • Saved changes are stored in your browser's local storage, not your user profile. If you clear your browser's storage or log into your user profile from a different browser, you will lose your customizations.
  1. Click the three-dot icon next to the controls (), then select Edit Controls.

  2. Do any of the following:

    • To reorder controls, click and drag a control by its handle ().

    • To remove a control, hover over it and select Remove control ().

    • To edit a control, hover over it and select Edit control ().

    • To add a new control, click Add Controls (). If you already have four controls, you must first remove one to make room for the new one.

  3. If you're editing or adding a control, do the following in the configuration flyout that opens:

    1. In the Field list, select the field for the filter. The Control type is automatically applied to the field you selected.

    2. Enter a Label to identify the control.

    3. Click Save and close.

  4. Click Save pending changes ().

Group alerts

You can group alerts by rule name, user name, host name, source IP address, or any other field. Select Group alerts by, then select an option or Custom field to specify a different field.

Select up to three fields for grouping alerts. The groups will nest in the order you selected them, and the nesting order is displayed above the table next to Group alerts by.

Each group displays information such as the alerts' severity and how many users, hosts, and alerts are in the group. The information displayed varies depending on the selected fields.

To interact with grouped alerts:

  • Select the Take actions menu to perform a bulk action on all alerts in a group, such as changing their status.

  • Click a group's name or the expand icon () to display alerts within that group. You can filter and customize this view like any other alerts table.

Customize the Alerts table

Use the toolbar buttons in the upper-left of the Alerts table to customize the columns you want displayed:

  • Columns: Reorder the columns.
  • x fields sorted: Sort the table by one or more columns.
  • Fields: Select the fields to display in the table. You can also add runtime fields to detection alerts and display them in the Alerts table.

Click the Full screen button in the upper-right to view the table in full-screen mode.

Use the view options drop-down in the upper-right of the Alerts table to control how alerts are displayed:

  • Grid view: Displays alerts in a traditional table view with columns for each field
  • Event rendered view: Display alerts in a descriptive event flow that includes relevant details and context about the event.

Tip

When using grid view, you can view alert-rendered reason statements and event renderings for specific alerts by clicking the expand icon in the Reason column. Some events do not have event renderings.

Take actions on an alert

From the Alerts table or the alert details flyout, you can:

Change an alert's status

You can set an alert's status to indicate whether it needs to be investigated (Open), is under active investigation (Acknowledged), or has been resolved (Closed). By default, the Alerts page displays open alerts. To filter alerts that are Acknowledged or Closed, use the Status drop-down filter at the top of the Alerts page.

To change an alert's status, do one of the following:

  • In the Alerts table, click More actions (...) in the alert's row, then select a status.

  • In the Alerts table, select the alerts you want to change, click Selected x alerts at the upper-left above the table, and then select a status.

  • To bulk-change the status of grouped alerts, select the Take actions menu for the group, then select a status.

  • In an alert's details flyout, click Take action and select a status.

Apply and filter alert tags

Use alert tags to organize related alerts into categories that you can filter and group. For example, use the False Positive alert tag to label a group of alerts as false positives. Then, search for them by entering the kibana.alert.workflow_tags : "False Positive" query into the KQL bar. Alternatively, use the Alert table's drop-down filters to filter for tagged alerts.

Note

You can manage alert tag options by updating the securitySolution:alertTags advanced setting. Refer to Manage alert tag options for more information.

Tip

To display alert tags in the Alerts table, click Fields and add the kibana.alert.workflow_tags field.

To apply or remove alert tags on individual alerts, do one of the following:

  • In the Alerts table, click More actions (...) in an alert's row, then click Apply alert tags. Select or unselect tags, then click Apply tags.
  • In an alert’s details flyout, click Take action → Apply alert tags. Select or unselect tags, then click Apply tags.

To apply or remove alert tags on multiple alerts, select the alerts you want to change, then click Selected x alerts at the upper-left above the table. Click Apply alert tags, select or unselect tags, then click Apply tags.

Assign users to alerts

Assign users to alerts that you want them to investigate, and manage alert assignees throughout an alert's lifecycle.

Requirements

All Security roles, except for the Viewer role, can assign and unassign users to alerts.

Important

Users are not notified when they've been assigned to, or unassigned from, alerts.

ActionInstructions
Assign users to an alert

Choose one of the following:

  • Alerts table - Click More actions (...) in an alert's row, then click Assign alert. Select users, then click Apply.

  • Alert details flyout - Click Take action → Assign alert. Alternatively, click the Assign alert icon () at the top of the alert details flyout, select users, then click Apply.

Unassign all users from an alert

Choose one of the following:

  • Alerts table - Click More actions (...) in an alert's row, then click Unassign alert.
  • Alert details flyout - Click Take action → Unassign alert.
Assign users to multiple alerts

From the Alerts table, select the alerts you want to change. Click Selected x alerts at the upper-left above the table, then click Assign alert. Select users, then click Apply.

Note

Users assigned to some of the selected alerts will be displayed as unassigned in the selection list. Selecting said users will assign them to all alerts they haven't been assigned to yet.

Unassign users from multiple alerts

From the Alerts table, select the alerts you want to change and click Selected x alerts at the upper-left above the table. Click Unassign alert to remove users from the alert.

Show users that have been assigned to alerts by adding the Assignees column to the Alerts table (Fieldskibana.alert.workflow_assignee_ids). Up to four assigned users can appear in the Assignees column. If an alert is assigned to five or more users, a number appears instead.

Assigned users are automatically displayed in the alert details flyout. Up to two assigned users can be shown in the flyout. If an alert is assigned to three or more users, a numbered badge displays instead.

Filter assigned alerts

Click the Assignees filter above the Alerts table, then select the users you want to filter by.

Add a rule exception from an alert

You can add exceptions to the rule that generated an alert directly from the Alerts table. Exceptions prevent a rule from generating alerts even when its criteria are met.

To add an exception, click the More actions menu (...) in the Alerts table, then select Add exception. Alternatively, select Take actionAdd rule exception in the alert details flyout.

For information about exceptions and how to use them, refer to Add and manage exceptions.

View alerts in Timeline

  • To view a single alert in Timeline, click the Investigate in timeline button in the Alerts table. Alternatively, select Take actionInvestigate in timeline in the alert details flyout.

  • To view multiple alerts in Timeline (up to 2,000), select the checkboxes next to the alerts, then click Selected x alertsInvestigate in timeline.

Tip

When you send an alert generated by a threshold rule to Timeline, all matching events are listed in the Timeline, even ones that did not reach the threshold value. For example, if you have an alert generated by a threshold rule that detects 10 failed login attempts, when you send that alert to Timeline, all failed login attempts detected by the rule are listed.

Suppose the rule that generated the alert uses a Timeline template. In this case, when you investigate the alert in Timeline, the dropzone query values defined in the template are replaced with their corresponding alert values.

Example

This Timeline template uses the host.name: "{host.name}" dropzone filter in the rule. When alerts generated by the rule are investigated in Timeline, the {host.name} value is replaced with the alert's host.name value. If the alerts's host.name value is Windows-ArsenalFC, the Timeline dropzone query is host.name: "Windows-ArsenalFC".

Note

Refer to Investigate events in Timeline for information on creating Timelines and Timeline templates. For information on how to add Timeline templates to rules, refer to Create a detection rule.

On this page