Detections privileges
Learn about the access requirements for detection features, including:
- Privilege requirements: Cluster, index, and Kibana privileges that your role needs to enable detections, manage rules, view and edit alerts, and more
- Predefined Elastic Cloud Serverless roles: Serverless roles with detection privileges
- Authorization model: How rules inherit privileges from their last editor using API keys
For instructions on turning on the detections feature, refer to Turn on detections.
Rules run in the background using the privileges of the user who last edited them. Ensure that only users with the appropriate access edit them. Refer to Detection rule concepts > Rule authorization for more details.
When creating custom roles for detection features, you'll need to grant access to system indices that include your space ID (<space-id>). For example, the default space uses .alerts-security.alerts-default. Refer to the following details to understand which system indices your role might require access to.
Starting in Elastic Stack 9.4, new custom roles require explicit Rules and Exceptions and Alerts privileges. Earlier releases sometimes granted alert-related access indirectly through broader Security privileges or the Rules, Alerts, and Exceptions feature. Review custom roles after an upgrade to confirm each role still has the intended access to alerts.
Only uses the .alerts-security.alerts-<space-id> index.
Uses the .alerts-security.alerts-<space-id> index. If you upgraded from version 8.0 or earlier, you might also need privileges on the legacy .siem-signals-<space-id> index.
Required to initialize the detection engine in a Kibana space.
- Cluster privileges
manage- Index privileges
-
manage,write,read,view_index_metadataon:.alerts-security.alerts-<space-id>.siem-signals-<space-id>(only if you upgraded from version 8.0 or earlier).lists-<space-id>.items-<space-id>
- Kibana privileges
-
-
Allfor theRules and Exceptionsfeature andAllfor theAlertsfeature -
Allfor theRules, Alerts, and Exceptionsfeature -
Allfor theSecurityfeature
-
- Cluster privileges
- None
- Index privileges
-
readon:.preview.alerts-security.alerts-<space-id>.internal.preview.alerts-security.alerts-<space-id>-*
- Kibana privileges
-
-
Allfor theRules and Exceptionsfeature andAllfor theAlertsfeature -
Allfor theRules, Alerts, and Exceptionsfeature -
Allfor theSecurityfeature
-
- Cluster privileges
- None
- Index privileges
-
manage,write,read,view_index_metadataon:.alerts-security.alerts-<space-id>.siem-signals-<space-id>(only if you upgraded from version 8.0 or earlier).lists-<space-id>.items-<space-id>
- Kibana privileges
-
-
Allfor theRules and Exceptionsfeature andAllfor theAlertsfeature -
Allfor theRules, Alerts, and Exceptionsfeature -
Allfor theSecurityfeature
-
To manage rules with actions and connectors, you need additional privileges for the Actions and Connectors feature (Management > Actions and Connectors):
All: Provides full access to rule actions and connectors.Read: Allows you to edit rule actions and use existing connectors, but you cannot create new connectors.
To import rules with actions, you need at least Read privileges. To overwrite or add new connectors during import, you need All privileges.
Assigning All on Rules grants the full set of rule actions by default (create, edit, delete, enable, disable, and the rest). Customize sub-feature privileges lets you turn off specific actions for a role. For example, you can remove one capability for the role (such as enabling or disabling rules) while still granting the role access to other actions that All provides.
The following table illustrates this by compareing the default setup with a customized role.
| Situation | What you can do |
|---|---|
All for Rules, and every rule sub-feature is still enabled (the out-of-the-box setup) |
You can do everything described for All on Rules in View and manage rules and exceptions separately, including enabling and disabling rules. |
All for Rules, but the role was customized and some sub-features were turned off |
You can only do what remains allowed. For example, you might still create or edit rules while Enable and disable rules (or another sub-feature) is turned off for your role. |
Allows you to manage alerts.
- Cluster privileges
- None
- Index privileges
-
maintenance,write,read,view_index_metadataon:.alerts-security.alerts-<space-id>.internal.alerts-security.alerts-<space-id>-*.siem-signals-<space-id>(only if you upgraded from version 8.0 or earlier).lists-<space-id>.items-<space-id>
- Kibana privileges
-
-
ReadforAlerts: View alerts, open alert flyouts, and view alert tables on pages and dashboards with alert-related flows. -
AllforAlerts: Everything thatReadprovides, plus changing alert status, setting assignees, setting tags, and bulk actions on alerts. -
Allfor theRules, Alerts, and Exceptionsfeature to view alert management flows -
Allfor theSecurityfeature
-
- Cluster privileges
- None
- Index privileges
- None
- Kibana privileges
-
-
At least Readfor theRules and Exceptionsfeature and Manage Exceptions selected for theExceptionssub-feature. Refer to View and manage rules and exceptions separately for valid combinations of Rules and Exceptions access. -
Allfor theRules, Alerts, and Exceptionsfeature -
Allfor theSecurityfeature
-
After setting Read or All on Rules and Exceptions, you can toggle Customize sub-feature privileges to set independent access to rules and exceptions. To learn about sub-feature privileges, refer to Kibana privileges > Sub-feature privileges.
- Cluster privileges
- None
- Index privileges
- None
- Kibana privileges
-
ReadforRules: View detection rules (including the Rules table, rule details, and rule monitoring).AllforRules: Create, edit, duplicate, delete, enable, and disable detection rules. Optional rule sub-features can narrow this access. Refer to to Detections privileges > Optional sub-features privileges for managing rules to learn more.ReadforExceptions(deselect Manage Exceptions): View exception lists and exception items.AllforExceptions(Manage Exceptions selected): Create and manage exceptions for rules and shared exception lists.
Read on Rules and All on Exceptions lets you manage rule exceptions and shared exception lists without permission to create or change rules.
- Cluster privileges
manage- Index privileges
-
manage,write,read,view_index_metadataon:.lists-<space-id>.items-<space-id>
- Kibana privileges
-
-
Allfor theRules and Exceptionsfeature andAllfor theAlertsfeature -
Allfor theRules, Alerts, and Exceptionsfeature -
Allfor theSecurityfeature
-
To create the .lists and .items data streams in your space, visit the Rules page for each appropriate space.
Elastic Cloud Serverless includes predefined roles with detection privileges:
| Action | Roles with access |
|---|---|
| Manage rules | Threat Intelligence Analyst, Tier 3 Analyst, Detections Eng, SOC Manager, Endpoint Policy Manager, Platform Engineer, Editor |
| View rules (read only) | Tier 1 Analyst, Tier 2 Analyst, Viewer, Endpoint Operations Analyst |
| View alerts and entity risk scoring (read only) | Viewer, Editor, Tier 1 Analyst, Tier 2 Analyst, Tier 3 Analyst, Threat Intelligence Analyst, Rule author, SOC Manager, Detections Eng, Platform Engineer, Endpoint Operations Analyst, Endpoint Policy Manager |
| Manage alerts | All roles except Viewer |
| Manage exceptions and value lists | Threat Intelligence Analyst, Tier 3 Analyst, Detections Eng, SOC Manager, Endpoint Policy Manager, Platform Engineer, Editor |
| View exceptions and value lists (read only) | Tier 1 Analyst, Tier 2 Analyst, Viewer, Endpoint Operations Analyst |