diff --git a/solutions/images/security-alert-suppression-close-alert-example.png b/solutions/images/security-alert-suppression-close-alert-example.png new file mode 100644 index 0000000000..8c55df1ba3 Binary files /dev/null and b/solutions/images/security-alert-suppression-close-alert-example.png differ diff --git a/solutions/images/security-alert-suppression-options.png b/solutions/images/security-alert-suppression-options.png index 61678b5e04..f666a75bb7 100644 Binary files a/solutions/images/security-alert-suppression-options.png and b/solutions/images/security-alert-suppression-options.png differ diff --git a/solutions/images/security-suppressed-alerts-details.png b/solutions/images/security-suppressed-alerts-details.png index e13ccf34c3..837322b5ac 100644 Binary files a/solutions/images/security-suppressed-alerts-details.png and b/solutions/images/security-suppressed-alerts-details.png differ diff --git a/solutions/security/detect-and-alert/suppress-detection-alerts.md b/solutions/security/detect-and-alert/suppress-detection-alerts.md index 45e5fd7985..c8e7cc21e0 100644 --- a/solutions/security/detect-and-alert/suppress-detection-alerts.md +++ b/solutions/security/detect-and-alert/suppress-detection-alerts.md @@ -13,70 +13,56 @@ products: # Suppress detection alerts [security-alert-suppression] +Alert suppression allows you to reduce the number of repeated or duplicate detection alerts created by [detection rules](/solutions/security/detect-and-alert/about-detection-rules.md). Normally, when a rule meets its criteria repeatedly, it creates multiple alerts, one for each time the rule’s criteria are met. When alert suppression is configured, alerts for duplicate events are not created. Instead, the qualifying events are grouped, and only one alert is created for each group. -::::{admonition} Requirements and notices -* In {{stack}} alert suppression requires a [Platinum or higher subscription](https://www.elastic.co/pricing) or the appropriate [{{serverless-short}} project feature tier](../../../deploy-manage/deploy/elastic-cloud/project-settings.md). -* {{ml-cap}} rules have [additional requirements](/solutions/security/advanced-entity-analytics/machine-learning-job-rule-requirements.md) for alert suppression. -* This functionality is in technical preview for event correlation rules only and may be changed or removed in a future release. Elastic will work to fix any issues, but features in technical preview are not subject to the support SLA of official GA features. - -:::: - -Alert suppression allows you to reduce the number of repeated or duplicate detection alerts created by these detection rule types: - -* [Custom query](/solutions/security/detect-and-alert/create-detection-rule.md#create-custom-rule) -* [Threshold](/solutions/security/detect-and-alert/create-detection-rule.md#create-threshold-rule) -* [Indicator match](/solutions/security/detect-and-alert/create-detection-rule.md#create-indicator-rule) -* [Event correlation](/solutions/security/detect-and-alert/create-detection-rule.md#create-eql-rule) -* [New terms](/solutions/security/detect-and-alert/create-detection-rule.md#create-new-terms-rule) -* [{{esql}}](/solutions/security/detect-and-alert/create-detection-rule.md#create-esql-rule) -* [{{ml-cap}}](/solutions/security/detect-and-alert/create-detection-rule.md#create-ml-rule) - -Normally, when a rule meets its criteria repeatedly, it creates multiple alerts, one for each time the rule’s criteria are met. When alert suppression is configured, duplicate qualifying events are grouped, and only one alert is created for each group. Depending on the rule type, you can configure alert suppression to create alerts each time the rule runs, or once within a specified time window. You can also specify multiple fields to group events by unique combinations of values. +Depending on the rule type, you can configure alert suppression to create alerts each time the rule runs, or once within a specified time window. You can also specify multiple fields to group events by unique combinations of values. The {{security-app}} displays several indicators in the Alerts table and the alert details flyout when a detection alert is created with alert suppression enabled. You can view the original events associated with suppressed alerts by investigating the alert in Timeline. - ## Configure alert suppression [security-alert-suppression-configure-alert-suppression] -You can configure alert suppression when you create or edit a supported rule type. Refer to documentation for creating [custom query](/solutions/security/detect-and-alert/create-detection-rule.md#create-custom-rule), [threshold](/solutions/security/detect-and-alert/create-detection-rule.md#create-threshold-rule), [event correlation](/solutions/security/detect-and-alert/create-detection-rule.md#create-eql-rule), [new terms](/solutions/security/detect-and-alert/create-detection-rule.md#create-new-terms-rule), [{{esql}}](/solutions/security/detect-and-alert/create-detection-rule.md#create-esql-rule), or [{{ml}}](/solutions/security/detect-and-alert/create-detection-rule.md#create-ml-rule) rules for detailed instructions. +::::{admonition} Requirements and notices +* To use alert suppression in {{stack}} and {{serverless-short}}, you must have the appropriate [subscription](https://www.elastic.co/pricing). +* {{ml-cap}} rules have [additional requirements](/solutions/security/advanced-entity-analytics/machine-learning-job-rule-requirements.md) for alert suppression. -1. When configuring the rule type (the **Define rule** step for a new rule, or the **Definition** tab for an existing rule), specify how you want to group events for alert suppression: +:::: - * **Custom query, indicator match, threshold, event correlation, new terms, {{ml}}, and {{esql}} rules:** In **Suppress alerts by**, enter 1-3 field names to group events by the fields' values. - * **Threshold rule:** In **Group by**, enter up to 3 field names to group events by the fields' values, or leave the setting empty to group all qualifying events together. +You can configure alert suppression when [creating](/solutions/security/detect-and-alert/create-detection-rule.md) or editing a rule. - ::::{note} - If you specify a field with multiple values, alerts with that field are handled as follows: +1. When configuring the rule (the **Define rule** step for a new rule, or the **Definition** tab for an existing rule), specify how you want to group alerts for alert suppression: - * **Custom query or threshold rules:** Alerts are grouped by each unique value. For example, if you suppress alerts by `destination.ip` of `[127.0.0.1, 127.0.0.2, 127.0.0.3]`, alerts will be suppressed separately for each value of `127.0.0.1`, `127.0.0.2`, and `127.0.0.3`. - * **Indicator match, event correlation (non-sequence queries only), new terms, {{esql}}, or {{ml}} rules:** Alerts with the specified field name and identical array values are grouped together. For example, if you suppress alerts by `destination.ip` of `[127.0.0.1, 127.0.0.2, 127.0.0.3]`, alerts with the entire array are grouped and only one alert is created for the group. - * **Event correlation (sequence queries only) rules:** If the specified field contains an array of values, suppression only happens if the field’s values are an exact match and in the same order. For example, if you specify the field `myips` and one sequence alert has [1.1.1.1, 0.0.0.0] and another sequence alert has [1.1.1.1, 192.168.0.1], neither of those alerts will be suppressed, despite sharing an array element. + * **All rule types except the threshold rule:** In **Suppress alerts by**, enter 1 or more field names to group alerts by the fields' values. The maximum limit of fields that you can enter is as follows: + * {applies_to}`stack: ga 9.0.0, ga 9.1.0` Enter up to 3 fields. + * {applies_to}`stack: ga 9.2.0`: Enter up to 5 fields. - :::: + * **Threshold rule only:** In **Group by**, enter up to 3 field names to group events by the fields' values, or leave the setting empty to group all qualifying events together. -2. If available, select how often to create alerts for duplicate events: - ::::{note} - Both options are available for custom query, indicator match, event correlation, new terms, {{esql}}, and {{ml}} rules. Threshold rules only have the **Per time period** option. + ::::{tip} + + Refer to [Suppression for fields with an array of values](/solutions/security/detect-and-alert/suppress-detection-alerts.md#security-alert-suppression-fields-with-multiple-values) to learn how fields with multiple values are handled. + :::: +2. Choose how often to create alerts for qualifying events: + * **Per rule execution**: Create an alert each time the rule runs and an event meets its criteria. - * **Per time period**: Create one alert for all qualifying events that occur within a specified time window, beginning from when an event first meets the rule criteria and creates the alert. + * **Per time period**: Create one alert for all qualifying events that occur within a specified time window, beginning from when an event first meets the rule criteria and creates the alert. This is the only option available when configuring alert suppression for threshold rules. For example, if a rule runs every 5 minutes but you don’t need alerts that frequently, you can set the suppression time period to a longer time, such as 1 hour. If the rule meets its criteria, it creates an alert at that time, and for the next hour, it’ll suppress any subsequent qualifying events. :::{image} /solutions/images/security-alert-suppression-options.png :alt: Alert suppression options + :width: 450px ::: 3. Under **If a suppression field is missing**, choose how to handle events with missing suppression fields (events in which one or more of the **Suppress alerts by** fields don’t exist): ::::{note} - These options are not available for threshold rules. + These options are available for all rule types except threshold rules. :::: - * **Suppress and group alerts for events with missing fields**: Create one alert for each group of events with missing fields. Missing fields get a `null` value, which is used to group and suppress alerts. * **Do not suppress alerts for events with missing fields**: Create a separate alert for each matching event. This basically falls back to normal alert creation for events with missing suppression fields. @@ -89,13 +75,22 @@ You can configure alert suppression when you create or edit a supported rule typ :::: +### Suppression for fields with an array of values [security-alert-suppression-fields-with-multiple-values] + +When specifying fields to suppress alerts by, you can select fields that have multiple values. When alerts for those fields are generated, they're handled as follows: + +* **Custom query or threshold rules:** Alerts are grouped by each unique value and an alert is created for each group. For example, if you suppress alerts by `destination.ip` of `[127.0.0.1, 127.0.0.2, 127.0.0.3]`, alerts are grouped separately for each value of `127.0.0.1`, `127.0.0.2`, and `127.0.0.3` and an alert is created for each group. + +* **Indicator match, event correlation (non-sequence queries only), new terms, {{esql}}, or {{ml}} rules:** Alerts with identical array values are grouped together. For example, if you suppress alerts by `destination.ip` of `[127.0.0.1, 127.0.0.2, 127.0.0.3]`, alerts with the entire array are grouped and only one alert is created for the group. + +* **Event correlation (sequence queries only) rules:** Alerts that are an exact match are grouped. To be an exact match, array values must be identical and in the same order. For example, if you specify the field `myips` and one sequence alert has `[1.1.1.1, 0.0.0.0]` and another sequence alert has `[1.1.1.1, 192.168.0.1]`, neither of those alerts is suppressed, despite sharing an array element. ## Confirm suppressed alerts [security-alert-suppression-confirm-suppressed-alerts] -The {{security-app}} displays several indicators of whether a detection alert was created with alert suppression enabled, and how many duplicate alerts were suppressed. +The {{security-app}} displays several indicators of whether a detection alert was created with alert suppression enabled, and how many qualifying alerts were suppressed. ::::{important} -After an alert is moved to the `Closed` status, it will no longer suppress new alerts. To prevent interruptions or unexpected changes in suppression, avoid closing alerts before the suppression interval ends. +Changing an alert's status to `Closed` can affect suppression. Refer to [Impact of closing suppressed alerts](/solutions/security/detect-and-alert/suppress-detection-alerts.md#security-alert-suppression-impact-close-alerts) to learn more. :::: @@ -104,6 +99,7 @@ After an alert is moved to the `Closed` status, it will no longer suppress new a :::{image} /solutions/images/security-suppressed-alerts-table.png :alt: Suppressed alerts icon and tooltip in Alerts table :screenshot: + :width: 650px ::: * **Alerts** table — Column for suppressed alerts count. Select **Fields** to open the fields browser, then add `kibana.alert.suppression.docs_count` to the table. @@ -111,6 +107,7 @@ After an alert is moved to the `Closed` status, it will no longer suppress new a :::{image} /solutions/images/security-suppressed-alerts-table-column.png :alt: Suppressed alerts count field column in Alerts table :screenshot: + :width: 750px ::: * Alert details flyout — **Insights** → **Correlations** section: @@ -118,10 +115,10 @@ After an alert is moved to the `Closed` status, it will no longer suppress new a :::{image} /solutions/images/security-suppressed-alerts-details.png :alt: Suppressed alerts in the Correlations section within the alert details flyout :screenshot: + :width: 450px ::: - ## Investigate events for suppressed alerts [security-alert-suppression-investigate-events-for-suppressed-alerts] With alert suppression, detection alerts aren’t created for the grouped source events, but you can still retrieve the events for further analysis or investigation. Do one of the following to open Timeline with the original events associated with both the created alert and the suppressed alerts: @@ -130,13 +127,28 @@ With alert suppression, detection alerts aren’t created for the grouped source :::{image} /solutions/images/security-timeline-button.png :alt: Investigate in timeline button - :width: 350px + :width: 250px :screenshot: ::: * Alert details flyout — Select **Take action** → **Investigate in timeline**. +## Impact of closing suppressed alerts [security-alert-suppression-impact-close-alerts] + +By default, if you close a suppressed alert while a suppression window is still active, suppression resets. Subsequently, any new qualifying alerts are suppressed and added to a new alert for suppression. + +For example, say you set the suppression time period to 5 minutes and specify to group alerts by the `host.name` field. The first time an event meets the rule's criteria, an alert is created. Over the next 5 minutes, any subsequent qualifying alerts are suppressed and grouped by unique `host.name` value. If you close that first alert before the active suppression window ends (the 5 minute suppression time period), alert suppression stops and restarts when the next qualifying alert meets the suppression criteria. + + +:::{image} /solutions/images/security-alert-suppression-close-alert-example.png +:alt: Example of suppression configuration for a rule +:screenshot: +:width: 450px +::: + +{applies_to}`stack: ga 9.2` You can change the default behavior and continue suppressing alerts until the end of suppression window after you close an investigated alert. To do this, change the `securitySolution:suppressionBehaviorOnAlertClosure` [advanced setting](/solutions/security/get-started/configure-advanced-settings.md#suppression-window-behavior) to **Continue until suppression window ends**. + ## Alert suppression limit by rule type [security-alert-suppression-alert-suppression-limit-by-rule-type] Some rule types have a maximum number of alerts that can be suppressed (custom query rules don’t have a suppression limit): diff --git a/solutions/security/get-started/configure-advanced-settings.md b/solutions/security/get-started/configure-advanced-settings.md index 21051ccadd..19c0c7a36a 100644 --- a/solutions/security/get-started/configure-advanced-settings.md +++ b/solutions/security/get-started/configure-advanced-settings.md @@ -204,6 +204,13 @@ Each time a detection rule runs using a remote cross-cluster search (CCS) index If you’ve ensured that your detection rules have the required privileges across your remote indices, you can use the `securitySolution:enableCcsWarning` setting to disable this warning and reduce noise. +## Configure alert suppression window behavior [suppression-window-behavior] + +```yaml {applies_to} +stack: ga 9.2 +``` + +To control whether alert suppression continues after you close a supressed alert during an [active suppression window](/solutions/security/detect-and-alert/suppress-detection-alerts.md#security-alert-suppression-impact-close-alerts), configure the `securitySolution:suppressionBehaviorOnAlertClosure` advanced setting. This setting lets you choose whether suppression continues or restarts when the next qualifying alert meets the suppression criteria. The default selection is **Restart suppression**. ## Show/hide related integrations in Rules page tables [show-related-integrations]