Manage detection alertsedit

The Alerts page displays all detection alerts. From the Alerts page, you can filter alerts, view alerting trends, change the status of alerts, add alerts to cases, and start investigating and analyzing alerts.

Alerts page overview

View and filter detection alertsedit

The Alerts page offers various ways for you to organize and triage detection alerts as you investigate suspicious events. You can:

  • View an alert’s details. Click the View details button from the Alerts table to open the alert details flyout. Learn more at View detection alert details.

    View details button
  • View the rule that created an alert. Click a name in the Rule column to open the rule’s details page.
  • Filter for a specific rule in the KQL bar (for example, :"SSH (Secure Shell) from the Internet"). KQL autocomplete is available for .alerts-security.alerts-* indices.
  • Use the date and time filter to define a specific time range. By default, this filter is set to search the last 24 hours.
  • Use the drop-down filter controls to filter alerts by up to four fields. By default, you can filter alerts by Status, Severity, User, and Host, and you can edit the controls to use other fields.
  • Visualize and group alerts by specific fields in the visualization section. Use the buttons on the left to select a view type (Summary, Trend, Counts, or Treemap), and use the menus on the right to select the ECS fields used for grouping alerts. Refer to Visualize detection alerts for more on each view type.
  • Hover over a value to display available inline actions, such as Filter In, Filter Out, and Add to timeline. Click the expand icon for more options, including Show top x and Copy to Clipboard. The available options vary based on the type of data.

    Inline additional actions menu
  • Filter alert results to include building block alerts or to only show alerts from indicator match rules by selecting the Additional filters drop-down. By default, building block alerts are excluded from the Overview and Alerts pages. You can choose to include building block alerts on the Alerts page, which expands the number of alerts.

    When updating alert results to include building block alerts, the Security app searches the .alerts-security.alerts-<Kibana space> index for the kibana.alert.building_block_type field. When looking for alerts created from indicator match rules, the app searches the same index for kibana.alert.rule.type:'threat_match'.

    Alerts table with Additional filters menu highlighted
  • View detection alerts generated by a specific rule. Go to ManageRules, then select a rule name in the table. The rule details page displays a comprehensive view of the rule’s settings, and the Alerts table under the Trend histogram displays the alerts associated with the rule, including alerts from any previous or deleted revision of that rule.

Edit drop-down filter controlsedit

By default, the drop-down controls on the Alerts page filter alerts by Status, Severity, User, and Host. You can edit them to filter by different fields, as well as remove, add, and reorder them if you prefer a different order.

Alerts page with drop-down controls highlighted
  • You can have a maximum of four controls on the Alerts page.
  • You can’t remove the Status control.
  • If you make any changes to the controls, you must save the pending changes for them to persist.
  1. Click the three-dot icon next to the controls (Three-dot icon), then select Edit Controls.
  2. Do any of the following:

    • To reorder controls, click and drag a control by its handle (Control handle).
    • To remove a control, hover over it and select Remove control (Red X icon).
    • To edit a control, hover over it and select Edit control (Edit icon).
    • To add a new control, click Add Controls (Add icon). If you already have four controls, you must first remove one to make room for the new one.
  3. If you’re editing or adding a control, do the following in the configuration flyout that opens:

    1. In the Field list, select the field for the filter. The Control type is automatically applied to the field you selected.
    2. Enter a Label to identify the control.
    3. Click Save and close.
  4. Click Save pending changes (Save icon).

Group alertsedit

You can group alerts by rule name, user name, host name, source IP address, or any other field. Select Group alerts by, then select an option or Custom field to specify a different field.

Select up to three fields for grouping alerts. The groups will nest in the order you selected them, and the nesting order is displayed above the table next to Group alerts by.

Alerts table with Group alerts by drop-down

Each group displays information such as the alerts' severity and how many users, hosts, and alerts are in the group. The information displayed varies depending on the selected fields.

To interact with grouped alerts:

  • Select the Take actions menu to perform a bulk action on all alerts in a group, such as changing their status.
  • Click a group’s name or the expand icon (Grouped alerts expand icon) to display alerts within that group. You can filter and customize this view like any other alerts table.

    Expanded alert group with alerts table

Customize the Alerts tableedit

Use the toolbar buttons in the upper-left of the Alerts table to customize the columns you want displayed:

  • Columns: Reorder the columns.
  • x fields sorted: Sort the table by one or more columns.
  • Fields: Select the fields to display in the table. You can also add runtime fields to detection alerts and display them in the Alerts table.

Click the Full screen button in the upper-right to view the table in full-screen mode.

Alerts table with toolbar buttons highlighted

Use the view options drop-down in the upper-right of the Alerts table to control how alerts are displayed:

  • Grid view: Displays alerts in a traditional table view with columns for each field
  • Event rendered view: Display alerts in a descriptive event flow that includes relevant details and context about the event.
Alerts table with the Event rendered view enabled

When using grid view, you can view alert-rendered reason statements and event renderings for specific alerts by clicking the expand icon in the Reason column. Some events do not have event renderings.

Take actions on an alertedit

From the Alerts table or the alert details flyout, you can:

Change an alert’s statusedit

You can set an alert’s status to indicate whether it needs to be investigated (Open), is under active investigation (Acknowledged), or has been resolved (Closed). By default, the Alerts page displays open alerts. To filter alerts that are Acknowledged or Closed, use the Status drop-down filter at the top of the Alerts page.

To change an alert’s status, do one of the following:

  • In the Alerts table, click More actions (…​) in the alert’s row, then select a status.
  • In the Alerts table, select the alerts you want to change, click Selected x alerts at the upper-left above the table, and then select a status.

    Bulk action menu with multiple alerts selected
  • [beta] This functionality is in beta and is subject to change. The design and code is less mature than official GA features and is being provided as-is with no warranties. Beta features are not subject to the support SLA of official GA features. To bulk-change the status of grouped alerts, select the Take actions menu for the group, then select a status.
  • In an alert’s details flyout, click Take action and select a status.

Add a rule exception from an alertedit

You can add exceptions to the rule that generated an alert directly from the Alerts table. Exceptions prevent a rule from generating alerts even when its criteria are met.

To add an exception, click the More actions menu (…​) in the Alerts table, then select Add exception. Alternatively, select Take actionAdd rule exception in the alert details flyout.

For information about exceptions and how to use them, refer to Add and manage exceptions.

View alerts in Timelineedit

  • To view a single alert in Timeline, click the Investigate in timeline button in the Alerts table. Alternatively, select Take actionInvestigate in timeline in the alert details flyout.

    Investigate in timeline button
  • To view multiple alerts in Timeline (up to 2,000), select the checkboxes next to the alerts, then click Selected x alertsInvestigate in timeline.

    Bulk add alerts to timeline button

When you send an alert generated by a threshold rule to Timeline, all matching events are listed in the Timeline, even ones that did not reach the threshold value. For example, if you have an alert generated by a threshold rule that detects 10 failed login attempts, when you send that alert to Timeline, all failed login attempts detected by the rule are listed.

Suppose the rule that generated the alert uses a Timeline template. In this case, when you investigate the alert in Timeline, the dropzone query values defined in the template are replaced with their corresponding alert values.


This Timeline template uses the "{}" dropzone filter in the rule. When alerts generated by the rule are investigated in Timeline, the {} value is replaced with the alert’s value. If the alerts’s value is Windows-ArsenalFC, the Timeline dropzone query is "Windows-ArsenalFC".

Refer to Investigate events in Timeline for information on creating Timelines and Timeline templates. For information on how to add Timeline templates to rules, refer to Create a detection rule.