Loading

Turn on detections

Before you can create rules, manage alerts, or use other detection capabilities, you need to enable the Detections feature. This page walks you through the required setup for your deployment type and shows you how to turn on detections.

The detections feature is turned on by default in Serverless projects. Your access level depends on your assigned role.

Access level Roles
Full access (manage rules, alerts, exceptions) Editor, SOC Manager, Detections Eng, Tier 3 Analyst, Platform Engineer
Read-only (only view rules and alerts) Viewer, Tier 1 Analyst, Tier 2 Analyst

Refer to Predefined roles for a list of predefined roles with detection privileges.

The detection engine initializes automatically when a user with sufficient privileges visits the Rules page. To open the page, find Detection rules (SIEM) in the navigation menu or by using the global search field.

No additional configuration is required.

Complete these steps to turn on the detections feature in your space.

  1. Enable HTTPS

    Configure HTTPS for communication between Elasticsearch and Kibana.

  2. Configure Kibana

    In your kibana.yml file, add an encryption key with at least 32 alphanumeric characters:

    xpack.encryptedSavedObjects.encryptionKey: 'fhjskloppd678ehkdfdlliverpoolfcr'
    		
    Important

    After changing the encryption key and restarting Kibana, you must restart all detection rules.

  3. Configure Elasticsearch

    In your elasticsearch.yml file:

    1. Set xpack.security.enabled to true. Refer to General security settings for more information.

    2. Ensure search.allow_expensive_queries is true (the default). If it's set to false, remove that setting.

  4. Enable detections

    1. Go to the Rules page. Find Detection rules (SIEM) in the navigation menu or by using the global search field.
    2. The detection engine initializes when a user with sufficient privileges visits the page.
    Note

    To enable detections in multiple spaces, visit the Rules page in each space.

With detections enabled, you're ready to create rules and start responding to threats. Do the following:

Tip

For a complete walkthrough, check out Quickstart: Detect and respond to threats with SIEM.