Link Search Menu Expand Document Documentation Menu

You're viewing version 2.8 of the OpenSearch documentation. This version is no longer maintained. For the latest version, see the current documentation. For information about OpenSearch version maintenance, see Release Schedule and Maintenance Policy.

Setting up Security Analytics

Before Security Analytics can begin generating findings and sending alerts, administrators must create detectors and make log data available to the system. Once detectors are able to generate findings, you can fine-tune your alerts to focus on specific areas of interest. The following steps outline the basic workflow for setting up components in Security Analytics.

  1. Create security detectors and alerts, and ingest log data. See Creating detectors for details.
  2. Inspect findings generated from detector output and create any additional alerts.
  3. If desired, create custom rules by duplicating and then modifying pre-packaged rules. See Customizing rules for details.
  1. To get started, select the top menu on the Dashboards home page and then select Security Analytics. The Overview page for Security Analytics is displayed.
  2. From the options on the left side of the page, select Detectors to begin creating a detector.

Navigating to create a detector page

350 characters left

Have a question? .

Want to contribute? or .