Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
80 commits
Select commit Hold shift + click to select a range
e9f1f19
First draft
nastasha-solomon Feb 21, 2026
778ef00
Fix ref
nastasha-solomon Feb 21, 2026
80a2cd8
Merge branch 'main' into issue-797
nastasha-solomon Feb 23, 2026
6590972
Continued moving content around
nastasha-solomon Feb 23, 2026
0a854a0
Fix error
nastasha-solomon Feb 23, 2026
5b0ff43
Comment out craft sections
nastasha-solomon Feb 23, 2026
b55d975
req rewrite
nastasha-solomon Feb 23, 2026
315d39d
Remove extra page
nastasha-solomon Feb 23, 2026
715b4b1
Merge branch 'main' into issue-797
nastasha-solomon Feb 23, 2026
e3ff673
restructure and rename author rules
nastasha-solomon Feb 23, 2026
1d549b5
Merge branch 'issue-797' of https://github.com/elastic/docs-content i…
nastasha-solomon Feb 23, 2026
d639771
deleted old file
nastasha-solomon Feb 23, 2026
7d4fba1
endpoint refs
nastasha-solomon Feb 23, 2026
67d4b8d
updates tuning page
nastasha-solomon Feb 23, 2026
acc73dd
improvements to rules management and suppression
nastasha-solomon Feb 26, 2026
07d8c82
Fixed errors in docs build
nastasha-solomon Feb 26, 2026
f48730e
fixed more redirects
nastasha-solomon Feb 26, 2026
ae9b875
Merge branch 'main' into issue-797
nastasha-solomon Feb 26, 2026
52f82dc
minor changes
nastasha-solomon Feb 26, 2026
78f1865
Merge branch 'issue-797' of https://github.com/elastic/docs-content i…
nastasha-solomon Feb 26, 2026
e01e2dc
fixes 5923
nastasha-solomon Feb 26, 2026
eb79875
clean up refs
nastasha-solomon Feb 26, 2026
e0cf2f7
update starting list
nastasha-solomon Feb 26, 2026
a297c66
Snoozing, terminology, overview
nastasha-solomon Feb 27, 2026
b5bfc74
Merge branch 'main' into issue-797
nastasha-solomon Feb 27, 2026
1cd22ac
fixes 109016
nastasha-solomon Feb 28, 2026
4778ca5
Merge main into issue-797
nastasha-solomon Feb 28, 2026
f69f209
fix cases error
nastasha-solomon Feb 28, 2026
4ead7d7
more cross ref fixes
nastasha-solomon Feb 28, 2026
c4e766e
Merge branch 'main' into issue-797
nastasha-solomon Feb 28, 2026
1d189ac
fixes 3035
nastasha-solomon Feb 28, 2026
f25114d
Merge branch 'issue-797' of https://github.com/elastic/docs-content i…
nastasha-solomon Feb 28, 2026
35bab20
Improvements to exception docs
nastasha-solomon Feb 28, 2026
3f41331
Merge branch 'main' into issue-797
nastasha-solomon Mar 2, 2026
fcc8fca
Apply suggestion from @nastasha-solomon
nastasha-solomon Mar 2, 2026
598026f
Merge branch 'main' into issue-797
nastasha-solomon Mar 2, 2026
bedf305
Update solutions/security/detect-and-alert/common-rule-settings.md
nastasha-solomon Mar 2, 2026
d9fa625
Update solutions/security/detect-and-alert/custom-query.md
nastasha-solomon Mar 3, 2026
5769ecc
Update solutions/security/detect-and-alert/custom-query.md
nastasha-solomon Mar 3, 2026
8b63e6a
Update solutions/security/detect-and-alert/custom-query.md
nastasha-solomon Mar 3, 2026
a2ae128
Update solutions/security/detect-and-alert/new-terms.md
nastasha-solomon Mar 3, 2026
752acbe
[Security][Alerting]: Add docs for installing and updating prebuilt …
nastasha-solomon Mar 2, 2026
5e54b66
Update solutions/security/detect-and-alert/custom-query.md
nastasha-solomon Mar 3, 2026
7b5c6ed
Merge remote-tracking branch 'origin/main' into issue-797
nastasha-solomon Mar 3, 2026
7fa1942
remove anchor from ref
nastasha-solomon Mar 3, 2026
dc868dc
Update solutions/security/detect-and-alert/new-terms.md
nastasha-solomon Mar 3, 2026
4136054
Style cleanup
nastasha-solomon Mar 3, 2026
3d58a87
Merge branch 'issue-797' of https://github.com/elastic/docs-content i…
nastasha-solomon Mar 3, 2026
f33b96d
Add to prebuilt rules hub page
nastasha-solomon Mar 3, 2026
993fcec
removed floating text
nastasha-solomon Mar 3, 2026
71b04b2
Update solutions/security/detect-and-alert/fill-rule-gaps.md
nastasha-solomon Mar 3, 2026
1697364
Merge branch 'main' into issue-797
nastasha-solomon Mar 3, 2026
f4c4d69
Remove bold styling
nastasha-solomon Mar 3, 2026
5c0b633
Ryland's input
nastasha-solomon Mar 4, 2026
f25369d
remove period
nastasha-solomon Mar 4, 2026
c7980f8
shoop da woop
nastasha-solomon Mar 4, 2026
57b7eb3
Adds refs to esql docs
nastasha-solomon Mar 4, 2026
ced5bbb
Merge branch 'main' into issue-797
nastasha-solomon Mar 4, 2026
f7833b1
Merge branch 'main' into issue-797
nastasha-solomon Mar 4, 2026
829d283
Rewrites manage alerts section
nastasha-solomon Mar 4, 2026
ef4c90e
remove bold
nastasha-solomon Mar 4, 2026
f192a5a
cleanup
nastasha-solomon Mar 5, 2026
194845a
tune
nastasha-solomon Mar 5, 2026
c173e1d
Update solutions/security/detect-and-alert/detection-rule-concepts.md
nastasha-solomon Mar 5, 2026
7c992d3
Merge branch 'main' into issue-797
nastasha-solomon Mar 5, 2026
abd5257
Apply suggestion from @nastasha-solomon
nastasha-solomon Mar 5, 2026
f449a9b
fix applies to tag
nastasha-solomon Mar 5, 2026
5183a1d
toc updates
nastasha-solomon Mar 5, 2026
8d2b617
moved gaps under monitoring
nastasha-solomon Mar 5, 2026
f47b72e
Adds annotated examples
nastasha-solomon Mar 5, 2026
d23497b
Update solutions/security/detect-and-alert/detection-rule-concepts.md
nastasha-solomon Mar 5, 2026
0874b42
Update solutions/security/detect-and-alert.md
nastasha-solomon Mar 5, 2026
2d4148a
Merge branch 'main' into issue-797
nastasha-solomon Mar 5, 2026
afc9db2
update install manage ref
nastasha-solomon Mar 5, 2026
578081b
Update solutions/security/detect-and-alert/requirements-privileges.md
nastasha-solomon Mar 6, 2026
73524cd
Update solutions/security/detect-and-alert/requirements-privileges.md
nastasha-solomon Mar 6, 2026
47ae3ca
Removed start detecting threats section
nastasha-solomon Mar 6, 2026
fd6098d
Merge branch 'issue-797' of https://github.com/elastic/docs-content i…
nastasha-solomon Mar 6, 2026
a9b70e4
renamed file
nastasha-solomon Mar 6, 2026
cc36e5d
updated redirect for privs page
nastasha-solomon Mar 6, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Binary file added docs-builder-mac-arm64.zip
Binary file not shown.
4 changes: 2 additions & 2 deletions explore-analyze/alerting/alerts/alerting-setup.md
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,7 @@ The rule type also affects the privileges that are required to create and edit r
* For {{ml}} rules, you must have `all` privileges for the **Analytics > {{ml-app}}** feature.
* For {{stack-monitor-app}} rules, you must have the `monitoring_user` role.
* For most {{observability}} rules, you must have `all` privileges for the appropriate {{observability}} features. However, for a custom threshold rule, you only need the `stack alerts` privilege.
* For Security rules, refer to [](../../../solutions/security/detect-and-alert/detections-requirements.md).
* For Security rules, refer to [](../../../solutions/security/detect-and-alert/turn-on-detections.md).

::::

Expand All @@ -68,7 +68,7 @@ The rule type also affects the privileges that are required to create and edit r
* `Read` for the **Management > {{connectors-feature}}** feature.

::::{note}
The rule type also affects the privileges that are required. For example, to view {{ml}} rules, you must have `read` privileges for the **Analytics > {{ml-app}}** feature. For {{stack-monitor-app}} rules, you must have the `monitoring_user` role. For {{observability}} rules, you must have `read` privileges for the appropriate {{observability}} features. For Security rules, refer to [](../../../solutions/security/detect-and-alert/detections-requirements.md).
The rule type also affects the privileges that are required. For example, to view {{ml}} rules, you must have `read` privileges for the **Analytics > {{ml-app}}** feature. For {{stack-monitor-app}} rules, you must have the `monitoring_user` role. For {{observability}} rules, you must have `read` privileges for the appropriate {{observability}} features. For Security rules, refer to [](../../../solutions/security/detect-and-alert/turn-on-detections.md).

::::

Expand Down
2 changes: 1 addition & 1 deletion explore-analyze/alerting/alerts/rule-types.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ products:

# Rule types [rule-types]

A rule is a set of [conditions](../alerts.md#rules-conditions), [schedules](../alerts.md#rules-schedule), and [actions](../alerts.md#rules-actions ) that enable notifications. {{kib}} provides rules built into the {{stack}} and rules registered by one of the {{kib}} apps. You can create most rules types in [{{stack-manage-app}} > {{rules-ui}}](create-manage-rules.md). Security rules must be defined in the Security app. For more information, refer to the documentation about [creating a detection rule](../../../solutions/security/detect-and-alert/create-detection-rule.md).
A rule is a set of [conditions](../alerts.md#rules-conditions), [schedules](../alerts.md#rules-schedule), and [actions](../alerts.md#rules-actions ) that enable notifications. {{kib}} provides rules built into the {{stack}} and rules registered by one of the {{kib}} apps. You can create most rules types in [{{stack-manage-app}} > {{rules-ui}}](create-manage-rules.md). Security rules must be defined in the Security app. For more information, refer to the documentation about [creating a detection rule](../../../solutions/security/detect-and-alert/using-the-rule-builder.md).

::::{note}
Some rule types are subscription features, while others are free features. For a comparison of the Elastic subscription levels, see [the subscription page](https://www.elastic.co/subscriptions).
Expand Down
4 changes: 2 additions & 2 deletions get-started/_snippets/security-overview.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ Use {{elastic-sec}} to protect your systems from security threats.

* [**SIEM:**](https://www.elastic.co/security/siem): {{elastic-sec}}'s modern SIEM provides a centralized platform for ingesting, analyzing, and managing security data from various sources.
* [**Third-party integration support**](/solutions/security/get-started/ingest-data-to-elastic-security.md): Ingest data from a various tools and data sources so you can centralize your security data.
* [**Threat detection and analytics:**](/solutions/security/detect-and-alert.md): Identify threats by using [prebuilt rules](/solutions/security/detect-and-alert/install-manage-elastic-prebuilt-rules.md) with the ability to customize or create custom detection rules, automatically detect anomalous activity with built-in machine learning jobs, or proactively search for threats using our powerful [threat hunting and interactive visualization tools](/solutions/security/investigate.md).
* [**Threat detection and analytics:**](/solutions/security/detect-and-alert.md): Identify threats by using [prebuilt rules](/solutions/security/detect-and-alert/install-prebuilt-rules.md) with the ability to customize or create custom detection rules, automatically detect anomalous activity with built-in machine learning jobs, or proactively search for threats using our powerful [threat hunting and interactive visualization tools](/solutions/security/investigate.md).
* [**Automatic migration**](/solutions/security/get-started/automatic-migration.md): Migrate SIEM rules from other platforms to {{elastic-sec}}.
* [**Endpoint protection and threat prevention**](/solutions/security/configure-elastic-defend.md): Automatically stop cybersecurity attacks—such as malware and ransomware—before damage and loss can occur.
* [**AI-powered features**](/solutions/security/ai.md): Leverage generative AI to help enhance threat detection, assist with incident response, and improve day-to-day security operations.
Expand All @@ -37,7 +37,7 @@ Before diving into setup and configuration, familiarize yourself with the founda
* [**{{elastic-defend}}:**](/solutions/security/configure-elastic-defend/install-elastic-defend.md) {{elastic-sec}}'s Endpoint Detection and Response (EDR) tool that protects endpoints from malicious activity. {{elastic-defend}} uses a combination of techniques like machine learning, behavioral analysis, and prebuilt rules to detect, prevent, and respond to threats in real-time.
* [**{{elastic-endpoint}}:**](/solutions/security/manage-elastic-defend/elastic-endpoint-self-protection-features.md) The security component, enabled by {{agent}}, that performs {{elastic-defend}}'s threat monitoring and prevention capabilities.
* [**Detection engine:**](/solutions/security/detect-and-alert.md) The framework that detects threats by using rules to search for suspicious events in your data, and generates alerts when events meet a rule's criteria.
* [**Detection rules:**](/solutions/security/detect-and-alert/about-detection-rules.md) Sets of conditions that identify potential threats and malicious activities. Rules analyze various data sources, including logs and network traffic, to detect anomalies, suspicious behaviors, or known attack patterns. {{elastic-sec}} ships out-of-the-box prebuilt rules, and you can create your own custom rules.
* [**Detection rules:**](/solutions/security/detect-and-alert/choose-the-right-rule-type.md) Sets of conditions that identify potential threats and malicious activities. Rules analyze various data sources, including logs and network traffic, to detect anomalies, suspicious behaviors, or known attack patterns. {{elastic-sec}} ships out-of-the-box prebuilt rules, and you can create your own custom rules.
* [**Alerts:**](/solutions/security/detect-and-alert/manage-detection-alerts.md) Notifications that are generated when rule conditions are met. Alerts include a wide range of information about potential threats, including host, user, network, and other contextual data to assist your investigation.
* [**Machine learning and anomaly detection:**](/solutions/security/advanced-entity-analytics/anomaly-detection.md) Anomaly detection jobs identify anomalous events or patterns in your data. Use these with machine learning detection rules to generate alerts when behavior deviates from normal activity.
* [**Entity analytics:**](/solutions/security/advanced-entity-analytics/overview.md) A threat detection feature that combines the power of Elastic’s detection engine and machine learning capabilities to identify unusual behavior for hosts, users, and services.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -147,4 +147,4 @@ By default, logs data streams use the following settings:
- [](logs-data-stream-integrations.md)
- [](/manage-data/data-store/templates.md)
- [](/solutions/observability/logs/logs-index-template-defaults.md)
- [](/solutions/security/detect-and-alert/using-logsdb-index-mode-with-elastic-security.md)
- [Advanced data source configuration for {{elastic-sec}} rules](/solutions/security/detect-and-alert/advanced-data-source-configuration.md)
Original file line number Diff line number Diff line change
Expand Up @@ -173,4 +173,4 @@ If your cluster is already near capacity, stability issues can occur if you enab

- Review the documentation for [](logs-data-stream.md), [](/manage-data/data-store/templates.md), and the [](/solutions/observability/logs/logs-index-template-defaults.md)
- [](logs-data-stream-configure.md)
- [](/solutions/security/detect-and-alert/using-logsdb-index-mode-with-elastic-security.md)
- [Advanced data source configuration for {{elastic-sec}} rules](/solutions/security/detect-and-alert/advanced-data-source-configuration.md)
2 changes: 1 addition & 1 deletion manage-data/data-store/data-streams/logs-data-stream.md
Original file line number Diff line number Diff line change
Expand Up @@ -100,4 +100,4 @@ To enable logsdb mode for integration data streams, create or update a `@custom`
- [Review mappings and sorting](/manage-data/data-store/data-streams/logs-data-stream-configure.md#logsdb-host-name)
- [](/manage-data/data-store/data-streams/use-data-stream.md)
- [](/manage-data/data-store/data-streams/logs-data-stream-integrations.md)
- [](/solutions/security/detect-and-alert/using-logsdb-index-mode-with-elastic-security.md)
- [Advanced data source configuration for {{elastic-sec}} rules](/solutions/security/detect-and-alert/advanced-data-source-configuration.md)
43 changes: 43 additions & 0 deletions redirects.yml
Original file line number Diff line number Diff line change
Expand Up @@ -702,6 +702,46 @@ redirects:
'solutions/observability/observability-ai-assistant.md': 'solutions/observability/ai/observability-ai-assistant.md'
'solutions/observability/llm-performance-matrix.md': 'solutions/observability/ai/llm-performance-matrix.md'

# Related to Detect & Alert section restructure (issue #1210)
# Renamed files
'solutions/security/detect-and-alert/detections-requirements.md': 'solutions/security/detect-and-alert/detections-privileges.md'
'solutions/security/detect-and-alert/install-manage-elastic-prebuilt-rules.md': 'solutions/security/detect-and-alert/install-prebuilt-rules.md'
'solutions/security/detect-and-alert/prebuilt-rules-update-modified-unmodified.md': 'solutions/security/detect-and-alert/update-prebuilt-rules.md'
'solutions/security/detect-and-alert/mitre-attandckr-coverage.md': 'solutions/security/detect-and-alert/mitre-attack-coverage.md'
'solutions/security/detect-and-alert/about-detection-rules.md': 'solutions/security/detect-and-alert/choose-the-right-rule-type.md'
'solutions/security/detect-and-alert/create-detection-rule.md': 'solutions/security/detect-and-alert/using-the-rule-builder.md'
'solutions/security/detect-and-alert/launch-timeline-from-investigation-guides.md': 'solutions/security/detect-and-alert/write-investigation-guides.md'
'solutions/security/detect-and-alert/exclude-cold-frozen-data-from-individual-rules.md': 'solutions/security/detect-and-alert/set-rule-data-sources.md'
'solutions/security/detect-and-alert/suppress-detection-alerts.md': 'solutions/security/detect-and-alert/alert-suppression.md'
'solutions/security/detect-and-alert/reduce-notifications-alerts.md':
to: 'solutions/security/detect-and-alert/manage-detection-rules.md'
anchors:
'': 'snooze-rule-actions'
'solutions/security/detect-and-alert/snooze-rule-actions.md':
to: 'solutions/security/detect-and-alert/manage-detection-rules.md'
anchors:
'': 'snooze-rule-actions'
'solutions/security/detect-and-alert/reference.md': 'solutions/security/detect-and-alert/common-rule-settings.md'
'solutions/security/detect-and-alert/detections-reference.md': 'solutions/security/detect-and-alert/common-rule-settings.md'
'solutions/security/detect-and-alert/rule-settings-reference.md': 'solutions/security/detect-and-alert/common-rule-settings.md'
'solutions/security/detect-and-alert/custom-rules.md': 'solutions/security/detect-and-alert/author-rules.md'

# Prebuilt rules restructure
# Note: Cross-file anchor redirects are not supported. Old links to
# install-manage-prebuilt-rules.md#prebuilt-rule-tags, #rule-prerequisites,
# and #select-all-prebuilt-rules will land on install-prebuilt-rules.md.
# Internal links have been updated to point to the correct new locations.
'solutions/security/detect-and-alert/install-manage-prebuilt-rules.md':
to: 'solutions/security/detect-and-alert/install-prebuilt-rules.md'
anchors:
'load-prebuilt-rules': 'load-prebuilt-rules'

# Deleted — content consolidated into manage-detection-alerts and cases pages
'solutions/security/detect-and-alert/add-detection-alerts-to-cases.md':
to: 'solutions/security/detect-and-alert/manage-detection-alerts.md'
anchors:
'': 'alert-actions'

# Related to cases and alerting documentation restructuring
# Main pages
'explore-analyze/alerts-cases.md': 'explore-analyze/alerting.md'
Expand Down Expand Up @@ -794,3 +834,6 @@ redirects:

# Related to https://github.com/elastic/docs-content/pull/5222
'troubleshoot/deployments/cloud-enterprise/node-bootlooping.md': 'troubleshoot/monitoring/node-bootlooping.md'

# Renamed for SEO - URL now matches page title
'solutions/security/detect-and-alert/requirements-privileges.md': 'solutions/security/detect-and-alert/turn-on-detections.md'
4 changes: 2 additions & 2 deletions reference/glossary/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -259,7 +259,7 @@ $$$glossary-epr$$$ Elastic Package Registry (EPR)
: A service hosted by Elastic that stores Elastic package definitions in a central location. See the [EPR GitHub repository](https://github.com/elastic/package-registry).

$$$glossary-elastic-security-indices$$$ {{elastic-sec}} indices
: Indices containing host and network source events (such as `packetbeat-*`, `log-*`, and `winlogbeat-*`). When you [create a new rule in {{elastic-sec}}](/solutions/security/detect-and-alert/create-detection-rule.md), the default index pattern corresponds to the values defined in the `securitySolution:defaultIndex` advanced setting.
: Indices containing host and network source events (such as `packetbeat-*`, `log-*`, and `winlogbeat-*`). When you [create a new rule in {{elastic-sec}}](/solutions/security/detect-and-alert/using-the-rule-builder.md), the default index pattern corresponds to the values defined in the `securitySolution:defaultIndex` advanced setting.

$$$glossary-elastic-stack$$$ {{stack}}
: Also known as the *ELK Stack*, the {{stack}} is the combination of various Elastic products that integrate for a scalable and flexible way to manage your data.
Expand Down Expand Up @@ -425,7 +425,7 @@ $$$glossary-indexer$$$ indexer
: A {{ls}} instance that is tasked with interfacing with an {{es}} cluster in order to index [event](/reference/glossary/index.md#glossary-event) data.

$$$glossary-indicator-index$$$ indicator index
: Indices containing suspect field values in {{elastic-sec}}. [Indicator match rules](/solutions/security/detect-and-alert/create-detection-rule.md#create-indicator-rule) use these indices to compare their field values with source event values contained in [{{elastic-sec}} indices](/reference/glossary/index.md#glossary-elastic-security-indices).
: Indices containing suspect field values in {{elastic-sec}}. [Indicator match rules](/solutions/security/detect-and-alert/indicator-match.md) use these indices to compare their field values with source event values contained in [{{elastic-sec}} indices](/reference/glossary/index.md#glossary-elastic-security-indices).

$$$glossary-inference-aggregation$$$ inference aggregation
: A pipeline aggregation that references a [trained model](/reference/glossary/index.md#glossary-trained-model) in an aggregation to infer on the results field of the parent bucket aggregation. It enables you to use supervised {{ml}} at search time.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -80,8 +80,8 @@ The non-ECS fields listed below are beta and subject to change.
| `kibana.alert.original_event.*` | Event information copied from the original source event.<br>Type: object |
| `kibana.alert.original_time` | The value copied from the source event (`@timestamp`).<br>Type: date |
| `kibana.alert.reason` | Type: keyword |
| `kibana.alert.rule.author` | The value of the `author` who created the rule. Refer to [configure advanced rule settings](/solutions/security/detect-and-alert/create-detection-rule.md#rule-ui-advanced-params).<br>Type: keyword |
| `kibana.alert.building_block_type` | The value of `building_block_type` from the rule that generated this alert. Refer to [configure advanced rule settings](/solutions/security/detect-and-alert/create-detection-rule.md#rule-ui-advanced-params).<br>Type: keyword |
| `kibana.alert.rule.author` | The value of the `author` who created the rule. Refer to [configure advanced rule settings](/solutions/security/detect-and-alert/common-rule-settings.md#rule-ui-advanced-params).<br>Type: keyword |
| `kibana.alert.building_block_type` | The value of `building_block_type` from the rule that generated this alert. Refer to [configure advanced rule settings](/solutions/security/detect-and-alert/common-rule-settings.md#rule-ui-advanced-params).<br>Type: keyword |
| `kibana.alert.rule.created_at` | The value of `created.at` from the rule that generated this alert.<br>Type: date |
| `kibana.alert.rule.created_by` | Type: keyword |
| `kibana.alert.rule.description` | Type: keyword |
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ Anomaly detection jobs identify anomalous events or patterns in your data. In a


::::{tip}
Refer to [{{ml-cap}}: Anomaly detection](/explore-analyze/machine-learning/anomaly-detection.md) and [About detection rules](/solutions/security/detect-and-alert/about-detection-rules.md) for more background.
Refer to [{{ml-cap}}: Anomaly detection](/explore-analyze/machine-learning/anomaly-detection.md) for more background.
::::


Expand All @@ -41,7 +41,7 @@ If you have the appropriate role, you can use the **ML job settings** interface

You can also check the status of {{ml}} detection rules, and start or stop their associated {{ml}} jobs:

* On the **Rules** page, the **Last response** column displays the rule’s current [status](/solutions/security/detect-and-alert/manage-detection-rules.md#rule-status). An indicator icon (![Error icon from rules table](/solutions/images/security-rules-table-error-icon.png "title =20x20")) also appears if a required {{ml}} job isn’t running. Click the icon to list the affected jobs, then click **Visit rule details page to investigate** to open the rule’s details page.
* On the **Rules** page, the **Last response** column displays the rule’s current [status](/solutions/security/detect-and-alert/monitor-rule-executions.md#rule-status). An indicator icon (![Error icon from rules table](/solutions/images/security-rules-table-error-icon.png "title =20x20")) also appears if a required {{ml}} job isn’t running. Click the icon to list the affected jobs, then click **Visit rule details page to investigate** to open the rule’s details page.

:::{image} /solutions/images/security-rules-table-ml-job-error.png
:alt: Rules table {{ml}} job error
Expand All @@ -56,7 +56,7 @@ You can also check the status of {{ml}} detection rules, and start or stop their
:::

::::{tip}
* For instructions on creating {{ml}} rules, refer to [Create a machine learning rule](/solutions/security/detect-and-alert/create-detection-rule.md#create-ml-rule).
* For instructions on creating {{ml}} rules to detect anomalies, refer to [](/solutions/security/detect-and-alert/machine-learning.md).
* Alerts generated by {{ml}} rules are displayed on the **Alerts** page. For more information, refer to [Manage detection alerts](/solutions/security/detect-and-alert/manage-detection-alerts.md).
::::

Expand Down
Loading