You are viewing docs on Elastic's new documentation system, currently in technical preview. For all other Elastic docs, visit elastic.co/guide.

Elastic Security UI

The Elastic Security app is a highly interactive workspace designed for security analysts that provides a clear overview of events and alerts from your environment. You can use the interactive UI to drill down into areas of interest.

Filter for alerts, events, processes, and other important security data by entering Kibana Query Language (KQL) queries in the search bar, which appears at the top of each page throughout the app. A date/time filter set to Today is enabled by default, but can be changed to any time range.

  • To refine your search results, select Add Filter (), then enter the field, operator (such as is not or is between), and value for your filter.

  • To save the current KQL query and any applied filters, select Saved query menu (), enter a name for the saved query, and select Save saved query.

The navigation menu contains direct links and expandable groups, identified by the group icon ().

  • Click a top-level link to go directly to its landing page, which contains links and information for related pages.

  • Click a group's icon () to open its flyout menu, which displays links to related pages within that group. Click a link in the flyout to navigate to its landing page.

  • Click the Collapse side navigation icon () to collapse and expand the main navigation menu.

Visualization actions

Many Elastic Security histograms, graphs, and tables display an Inspect button () when you hover over them. Click to examine the Elasticsearch queries used to retrieve data throughout the app.

Other visualizations display an options menu (), which allows you to inspect the visualization's queries, add it to a new or existing case, or open it in Lens for customization.

Inline actions for fields and values

Throughout the Elastic Security app, you can hover over many data fields and values to display inline actions, which allow you to customize your view or investigate further based on that field or value.

In some visualizations, these actions are available in the legend by clicking a value's options icon ().

Inline actions include the following (some actions are unavailable in some contexts):

  • Filter In: Add a filter that includes the selected value.
  • Filter Out: Add a filter that excludes the selected value.
  • Add to timeline: Add a filter to Timeline for the selected value.
  • Toggle column in table: Add or remove the selected field as a column in the alerts or events table. (This action is only available on an alert's or event's details flyout.)
  • Show top x: Display a pop-up window that shows the selected field's top events or detection alerts.
  • Copy to Clipboard: Copy the selected field-value pair to paste elsewhere.

Elastic Security app pages

The Elastic Security app contains the following pages that enable analysts to view, analyze, and manage security data.

Dashboards

Expand this section to access the Overview, Detection & Response, Kubernetes, Cloud Security Posture, Cloud Native Vulnerability Management, and Entity Analytics dashboards, which provide interactive visualizations that summarize your data. You can also create and view custom dashboards. Refer to Dashboards for more information.

Rules

Expand this section to access the following pages:

  • Rules: Create and manage rules to monitor suspicious events.

  • Benchmark Rules: View, enable, or disable benchmark rules.

  • Shared Exception Lists: View and manage rule exceptions and shared exception lists.

  • MITRE ATT&CK® coverage: Review your coverage of MITRE ATT&CK® tactics and techniques, based on installed rules.

Alerts

View and manage alerts to monitor activity within your network. Refer to Manage detection alerts for more information.

Findings

Identify misconfigurations and vulnerabilities in your cloud infrastructure. For setup instructions, refer to Cloud security posture management, Kubernetes security posture management, or Cloud native vulnerability management.

Cases

Open and track security issues. Refer to Cases to learn more.

Investigations

Expand this section to access the following pages:

  • Timelines: Investigate alerts and complex threats — such as lateral movement — in your network. Timelines are interactive and allow you to share your findings with other team members.

    Tip

    Click the Timeline button at the bottom of the Elastic Security app to start an investigation.

  • Osquery: Deploy Osquery with Elastic Agent, then run and schedule queries.

Intelligence

The Intelligence section contains the Indicators page, which collects data from enabled threat intelligence feeds and provides a centralized view of indicators of compromise (IoCs). Refer to Indicators of compromise to learn more.

Explore

Expand this section to access the following pages:

  • Hosts: Examine key metrics for host-related security events using graphs, charts, and interactive data tables.

  • Network: Explore the interactive map to discover key network activity metrics and investigate network events further in Timeline.

  • Users: Access a comprehensive overview of user data to help you understand authentication and user behavior within your environment.

Assets

The Assets section allows you to manage the following features:

  • Fleet
  • Integrations
  • Endpoint protection
    • Endpoints: View and manage hosts running Elastic Defend.
    • Policies: View and manage Elastic Defend integration policies.
    • Trusted applications: View and manage trusted Windows, macOS, and Linux applications.
    • Event filters: View and manage event filters, which allow you to filter endpoint events you don't need to want stored in Elasticsearch.
    • Host isolation exceptions: View and manage host isolation exceptions, which specify IP addresses that can communicate with your hosts even when those hosts are blocked from your network.
    • Blocklist: View and manage the blocklist, which allows you to prevent specified applications from running on hosts, extending the list of processes that Elastic Defend considers malicious.
    • Response actions history: Find the history of response actions performed on hosts.
  • Cloud security

Machine learning

Manage machine learning jobs and settings. Refer to Machine learning docs for more information.

Get started

Quickly add security integrations that can ingest data and monitor your hosts.

Project settings

Configure project-wide settings related to users, billing, data management, and more.

Dev tools

Use additional API and analysis tools to interact with your data.

Accessibility features

Accessibility features, such as keyboard focus and screen reader support, are built into the Elastic Security UI. These features offer additional ways to navigate the UI and interact with the application.

Interact with draggable elements

Use your keyboard to interact with draggable elements in the Elastic Security UI:

  • Press the Tab key to apply keyboard focus to an element within a table. Or, use your mouse to click on an element and apply keyboard focus to it.
  • Press Enter on an element with keyboard focus to display its menu and press Tab to apply focus sequentially to menu options. The f, o, a, t, c hotkeys are automatically enabled during this process and offer an alternative way to interact with menu options.
  • Press the spacebar once to begin dragging an element to a different location and press it a second time to drop it. Use the directional arrows to move the element around the UI.
  • If an event has an event renderer, press the Shift key and the down directional arrow to apply keyboard focus to the event renderer and Tab or Shift + Tab to navigate between fields. To return to the cells in the current row, press the up directional arrow. To move to the next row, press the down directional arrow.

Use your keyboard to navigate through rows, columns, and menu options in the Elastic Security UI:

  • Use the directional arrows to move keyboard focus right, left, up, and down in a table.
  • Press the Tab key to navigate through a table cell with multiple elements, such as buttons, field names, and menus. Pressing the Tab key will sequentially apply keyboard focus to each element in the table cell.
  • Use CTRL + Home to shift keyboard focus to the first cell in a row. Likewise, use CTRL + End to move keyboard focus to the last cell in the row.
  • Use the Page Up and Page Down keys to scroll through the page.

On this page