Loading

Detections and alerts

Elastic Security's detection engine evaluates your data against detection rules and generates alerts when rule criteria are met. Rules can correlate events across all connected data sources to surface threats that no single data stream would reveal on its own. Elastic Security provides several rule types, from field-value matches to event correlation, machine learning anomaly detection, and more.

Your goal Start here
Set up detection for the first time Requirements and privilegesInstall prebuilt rules
Take over an existing deployment MITRE ATT&CK coverageMonitor rule executions
Build coverage for a specific threat Choose the right rule typeRule builder
Reduce noise from existing rules Tune detection rulesExceptions, Suppression, or Snooze

The following stages represent the suggested path to a functioning detection program. Most deployments move through these stages roughly in order, though the boundaries are not strict: tuning and noise reduction are ongoing rather than a final stage.

  1. Confirm requirements. Verify infrastructure, privileges, and data availability.
  2. Assess coverage gaps. Use MITRE ATT&CK coverage to identify priority areas.
  3. Enable prebuilt rules. Activate Elastic's maintained rule library for priority tactics.
  4. Build custom rules. Fill remaining gaps with rules tailored to your environment.
  5. Validate before enabling. Test rule logic against historical data before going live.
  6. Monitor rule health. Confirm rules are executing correctly and generating alerts.
  7. Reduce noise. Tune, add exceptions, suppress, or snooze as needed.

A minimal viable detection program (prebuilt rules enabled for your highest-priority tactics, running correctly, with noise managed to an actionable level) is a meaningful outcome at any stage of this workflow. You do not need to complete every stage before your detection program delivers value.