Skip to content

[AI4DSOC] [Attack discovery] In AI4DSOC projects, don't prompt the user to update the kibana.alert.workflow_status of alerts #227326

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged

Conversation

andrew-goldstein
Copy link
Contributor

@andrew-goldstein andrew-goldstein commented Jul 9, 2025

[AI4DSOC] [Attack discovery] In AI4DSOC projects, don't prompt the user to update the kibana.alert.workflow_status of alerts

This PR updates Attack discovery for AI4DSOC projects, such that it does NOT prompt the user with a modal to optionally update the kibana.alert.workflow_status of alerts associated with Attack discoveries, as illustrated by the animated gif below:

ai_for_soc_take_action

Above: AI4DSOC: The modal is NOT displayed, and the associated alerts are NOT updated

The animated gif above illustrates that in AI4DSOC projects:

  • The modal prompting the user to update the kibana.alert.workflow_status of alerts is NOT displayed
  • Only the workflow status of the Attack discovery is updated

All other serverless projects

All other (non-AI4DSOC) serverless projects display the modal, and optionally update the workflow status of the alerts, as illustrated by the animated gif below:

serverless

Above: All other serverless projects: The modal is displayed, and the associated alerts are updated

The animated gif above illustrates that for all other serverless projects:

  • The modal prompting the user to update the kibana.alert.workflow_status of alerts is displayed
  • The workflow status of the Attack discovery is (optionally) updated

Elastic Cloud and self manged

Elastic Cloud and self manged deployments display the modal, and optionally update the workflow status of the alerts, as illustrated by the animated gif below:

self-managed

Above: Self managed: The modal is displayed, and the associated alerts are updated

The animated gif above illustrates that for Elastic cloud and self manged:

  • The modal prompting the user to update the kibana.alert.workflow_status of alerts is displayed
  • The workflow status of the Attack discovery is (optionally) updated

Feature flags

Enable the required and recommended assistantAttackDiscoverySchedulingEnabled features flag in config/kibana.dev.yml:

feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: true
  securitySolution.assistantAttackDiscoverySchedulingEnabled: true

AI4DSOC

  • To test with an AI4DSOC project, add the following setting to config/serverless.security.dev.yaml:
xpack.securitySolutionServerless.productTypes:
[
  { product_line: 'ai_soc', product_tier: 'search_ai_lake' },
]

Desk testing

  1. Navigate to Security > Attack discovery

  2. Click Generate to generate attack discoveries

  3. Click the Take action dropdown on an Attack discovery

  4. Click Mark as acknowledged

Expected result

The modal is displayed, and alerts are (optionally) updated for the deployment, for the deployment-type in the table below:

Deployment Modal displayed Alerts (optionally) updated
AI4DSOC
All other serverless projects
Elastic Cloud and self manged
  1. Select (at least) 2 discoveries via their checkboxes

  2. Click the Selected 2 Attack discoveries popover menu

  3. Click Mark as closed from the popover menu

Expected result

Once again, the modal is displayed, and alerts are (optionally) updated for the deployment, for the deployment-type in the table below:

Deployment Modal displayed Alerts (optionally) updated
AI4DSOC
All other serverless projects
Elastic Cloud and self manged

@andrew-goldstein andrew-goldstein self-assigned this Jul 9, 2025
@andrew-goldstein andrew-goldstein requested a review from a team as a code owner July 9, 2025 21:03
@andrew-goldstein andrew-goldstein added release_note:skip Skip the PR/issue when compiling release notes Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. Team:Security Generative AI Security Generative AI v9.1.0 v8.19.0 v9.2.0 labels Jul 9, 2025
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-solution (Team: SecuritySolution)

@andrew-goldstein andrew-goldstein force-pushed the disable_alerts_modal_ai4dsoc branch from b8765dd to 65f7165 Compare July 10, 2025 14:48
Copy link
Contributor

@stephmilovic stephmilovic left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM! Desk tested and all works as expected. Left one comment re: the check for aiForSoc. LGTM!

@stephmilovic stephmilovic added the backport:version Backport to applied version labels label Jul 11, 2025
…oes NOT prompt the user with a modal to [optionally update the kibana.alert.workflow_status of alerts associated with Attack discoveries](elastic#225029), as illustrated by the animated gif below:

![ai_for_soc_take_action](https://github.com/user-attachments/assets/1c58632f-f18d-4164-a31a-e8fbbd90bae2)

_Above: AI4DSOC: The modal is NOT displayed, and the associated alerts are NOT updated_

The animated gif above illustrates that in AI4DSOC projects:

- The modal prompting the user to update the `kibana.alert.workflow_status` of alerts is NOT displayed
- Only the workflow status of the Attack discovery is updated

All other (non-AI4DSOC) serverless projects display the modal, and optionally update the workflow status of the alerts, as illustrated by the animated gif below:

![serverless](https://github.com/user-attachments/assets/d3dc067f-3fc3-461c-a7b5-a0640f82cc68)

_Above: All other serverless projects: The modal is displayed, and the associated alerts are updated_

The animated gif above illustrates that for all other serverless projects:

- The modal prompting the user to update the `kibana.alert.workflow_status` of alerts is displayed
- The workflow status of the Attack discovery is (optionally) updated

Elastic Cloud and self manged deployments display the modal, and optionally update the workflow status of the alerts, as illustrated by the animated gif below:

![self-managed](https://github.com/user-attachments/assets/0aeb7d4e-81a7-44ca-bdb5-86573d8ad3c9)

_Above: Self managed: The modal is displayed, and the associated alerts are updated_

The animated gif above illustrates that for Elastic cloud and self manged:

- The modal prompting the user to update the `kibana.alert.workflow_status` of alerts is displayed
- The workflow status of the Attack discovery is (optionally) updated

Enable the required and recommended `assistantAttackDiscoverySchedulingEnabled` features flag in `config/kibana.dev.yml`:

```yaml
feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: true
  securitySolution.assistantAttackDiscoverySchedulingEnabled: true
```

- To test with an AI4DSOC project, add the following setting to `config/serverless.security.dev.yaml`:

```yaml
xpack.securitySolutionServerless.productTypes:
[
  { product_line: 'ai_soc', product_tier: 'search_ai_lake' },
]
```

1) Navigate to Security > Attack discovery

2) Click `Generate` to generate attack discoveries

3) Click the `Take action` dropdown on an Attack discovery

4) Click `Mark as acknowledged`

**Expected result**

The modal is displayed, and alerts are (optionally) updated for the deployment, for the deployment-type in the table below:

| Deployment                    | Modal displayed | Alerts (optionally) updated |
|-------------------------------|-----------------|-----------------------------|
| AI4DSOC                       | ❌               | ❌                           |
| All other serverless projects | ✅               | ✅                           |
| Elastic Cloud and self manged | ✅               | ✅                           |

5) Select (at least) 2 discoveries via their checkboxes

6) Click the `Selected 2 Attack discoveries` popover menu

7) Click `Mark as closed` from the popover menu

**Expected result**

Once again, the modal is displayed, and alerts are (optionally) updated for the deployment, for the deployment-type in the table below:

| Deployment                    | Modal displayed | Alerts (optionally) updated |
|-------------------------------|-----------------|-----------------------------|
| AI4DSOC                       | ❌               | ❌                           |
| All other serverless projects | ✅               | ✅                           |
| Elastic Cloud and self manged | ✅               | ✅                           |
@andrew-goldstein andrew-goldstein force-pushed the disable_alerts_modal_ai4dsoc branch from 65f7165 to e6df9cc Compare July 11, 2025 18:37
@elasticmachine
Copy link
Contributor

💚 Build Succeeded

Metrics [docs]

Async chunks

Total size of all lazy-loaded chunks that will be downloaded as the user navigates the app

id before after diff
securitySolution 9.8MB 9.8MB +100.0B

History

cc @andrew-goldstein

@andrew-goldstein andrew-goldstein merged commit a4aa6a0 into elastic:main Jul 11, 2025
12 checks passed
@andrew-goldstein andrew-goldstein deleted the disable_alerts_modal_ai4dsoc branch July 11, 2025 20:17
@kibanamachine
Copy link
Contributor

Starting backport for target branches: 8.19, 9.1

https://github.com/elastic/kibana/actions/runs/16228952304

kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Jul 11, 2025
…er to update the `kibana.alert.workflow_status` of alerts (elastic#227326)

## [AI4DSOC] [Attack discovery] In AI4DSOC projects, don't prompt the user to update the `kibana.alert.workflow_status` of alerts

This PR updates Attack discovery for AI4DSOC projects, such that it does NOT prompt the user with a modal to [optionally update the kibana.alert.workflow_status of alerts associated with Attack discoveries](elastic#225029), as illustrated by the animated gif below:

![ai_for_soc_take_action](https://github.com/user-attachments/assets/1c58632f-f18d-4164-a31a-e8fbbd90bae2)

_Above: AI4DSOC: The modal is NOT displayed, and the associated alerts are NOT updated_

The animated gif above illustrates that in AI4DSOC projects:

- The modal prompting the user to update the `kibana.alert.workflow_status` of alerts is NOT displayed
- Only the workflow status of the Attack discovery is updated

### All other serverless projects

All other (non-AI4DSOC) serverless projects display the modal, and optionally update the workflow status of the alerts, as illustrated by the animated gif below:

![serverless](https://github.com/user-attachments/assets/d3dc067f-3fc3-461c-a7b5-a0640f82cc68)

_Above: All other serverless projects: The modal is displayed, and the associated alerts are updated_

The animated gif above illustrates that for all other serverless projects:

- The modal prompting the user to update the `kibana.alert.workflow_status` of alerts is displayed
- The workflow status of the Attack discovery is (optionally) updated

### Elastic Cloud and self manged

Elastic Cloud and self manged deployments display the modal, and optionally update the workflow status of the alerts, as illustrated by the animated gif below:

![self-managed](https://github.com/user-attachments/assets/0aeb7d4e-81a7-44ca-bdb5-86573d8ad3c9)

_Above: Self managed: The modal is displayed, and the associated alerts are updated_

The animated gif above illustrates that for Elastic cloud and self manged:

- The modal prompting the user to update the `kibana.alert.workflow_status` of alerts is displayed
- The workflow status of the Attack discovery is (optionally) updated

### Feature flags

Enable the required and recommended `assistantAttackDiscoverySchedulingEnabled` features flag in `config/kibana.dev.yml`:

```yaml
feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: true
  securitySolution.assistantAttackDiscoverySchedulingEnabled: true
```

### AI4DSOC

- To test with an AI4DSOC project, add the following setting to `config/serverless.security.dev.yaml`:

```yaml
xpack.securitySolutionServerless.productTypes:
[
  { product_line: 'ai_soc', product_tier: 'search_ai_lake' },
]
```

### Desk testing

1) Navigate to Security > Attack discovery

2) Click `Generate` to generate attack discoveries

3) Click the `Take action` dropdown on an Attack discovery

4) Click `Mark as acknowledged`

**Expected result**

The modal is displayed, and alerts are (optionally) updated for the deployment, for the deployment-type in the table below:

| Deployment                    | Modal displayed | Alerts (optionally) updated |
|-------------------------------|-----------------|-----------------------------|
| AI4DSOC                       | ❌               | ❌                           |
| All other serverless projects | ✅               | ✅                           |
| Elastic Cloud and self manged | ✅               | ✅                           |

5) Select (at least) 2 discoveries via their checkboxes

6) Click the `Selected 2 Attack discoveries` popover menu

7) Click `Mark as closed` from the popover menu

**Expected result**

Once again, the modal is displayed, and alerts are (optionally) updated for the deployment, for the deployment-type in the table below:

| Deployment                    | Modal displayed | Alerts (optionally) updated |
|-------------------------------|-----------------|-----------------------------|
| AI4DSOC                       | ❌               | ❌                           |
| All other serverless projects | ✅               | ✅                           |
| Elastic Cloud and self manged | ✅               | ✅                           |

(cherry picked from commit a4aa6a0)
kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Jul 11, 2025
…er to update the `kibana.alert.workflow_status` of alerts (elastic#227326)

## [AI4DSOC] [Attack discovery] In AI4DSOC projects, don't prompt the user to update the `kibana.alert.workflow_status` of alerts

This PR updates Attack discovery for AI4DSOC projects, such that it does NOT prompt the user with a modal to [optionally update the kibana.alert.workflow_status of alerts associated with Attack discoveries](elastic#225029), as illustrated by the animated gif below:

![ai_for_soc_take_action](https://github.com/user-attachments/assets/1c58632f-f18d-4164-a31a-e8fbbd90bae2)

_Above: AI4DSOC: The modal is NOT displayed, and the associated alerts are NOT updated_

The animated gif above illustrates that in AI4DSOC projects:

- The modal prompting the user to update the `kibana.alert.workflow_status` of alerts is NOT displayed
- Only the workflow status of the Attack discovery is updated

### All other serverless projects

All other (non-AI4DSOC) serverless projects display the modal, and optionally update the workflow status of the alerts, as illustrated by the animated gif below:

![serverless](https://github.com/user-attachments/assets/d3dc067f-3fc3-461c-a7b5-a0640f82cc68)

_Above: All other serverless projects: The modal is displayed, and the associated alerts are updated_

The animated gif above illustrates that for all other serverless projects:

- The modal prompting the user to update the `kibana.alert.workflow_status` of alerts is displayed
- The workflow status of the Attack discovery is (optionally) updated

### Elastic Cloud and self manged

Elastic Cloud and self manged deployments display the modal, and optionally update the workflow status of the alerts, as illustrated by the animated gif below:

![self-managed](https://github.com/user-attachments/assets/0aeb7d4e-81a7-44ca-bdb5-86573d8ad3c9)

_Above: Self managed: The modal is displayed, and the associated alerts are updated_

The animated gif above illustrates that for Elastic cloud and self manged:

- The modal prompting the user to update the `kibana.alert.workflow_status` of alerts is displayed
- The workflow status of the Attack discovery is (optionally) updated

### Feature flags

Enable the required and recommended `assistantAttackDiscoverySchedulingEnabled` features flag in `config/kibana.dev.yml`:

```yaml
feature_flags.overrides:
  securitySolution.attackDiscoveryAlertsEnabled: true
  securitySolution.assistantAttackDiscoverySchedulingEnabled: true
```

### AI4DSOC

- To test with an AI4DSOC project, add the following setting to `config/serverless.security.dev.yaml`:

```yaml
xpack.securitySolutionServerless.productTypes:
[
  { product_line: 'ai_soc', product_tier: 'search_ai_lake' },
]
```

### Desk testing

1) Navigate to Security > Attack discovery

2) Click `Generate` to generate attack discoveries

3) Click the `Take action` dropdown on an Attack discovery

4) Click `Mark as acknowledged`

**Expected result**

The modal is displayed, and alerts are (optionally) updated for the deployment, for the deployment-type in the table below:

| Deployment                    | Modal displayed | Alerts (optionally) updated |
|-------------------------------|-----------------|-----------------------------|
| AI4DSOC                       | ❌               | ❌                           |
| All other serverless projects | ✅               | ✅                           |
| Elastic Cloud and self manged | ✅               | ✅                           |

5) Select (at least) 2 discoveries via their checkboxes

6) Click the `Selected 2 Attack discoveries` popover menu

7) Click `Mark as closed` from the popover menu

**Expected result**

Once again, the modal is displayed, and alerts are (optionally) updated for the deployment, for the deployment-type in the table below:

| Deployment                    | Modal displayed | Alerts (optionally) updated |
|-------------------------------|-----------------|-----------------------------|
| AI4DSOC                       | ❌               | ❌                           |
| All other serverless projects | ✅               | ✅                           |
| Elastic Cloud and self manged | ✅               | ✅                           |

(cherry picked from commit a4aa6a0)
@kibanamachine
Copy link
Contributor

💚 All backports created successfully

Status Branch Result
8.19
9.1

Note: Successful backport PRs will be merged automatically after passing CI.

Questions ?

Please refer to the Backport tool documentation

kibanamachine added a commit that referenced this pull request Jul 11, 2025
…the user to update the `kibana.alert.workflow_status` of alerts (#227326) (#227721)

# Backport

This will backport the following commits from `main` to `9.1`:
- [[AI4DSOC] [Attack discovery] In AI4DSOC projects, don't prompt the
user to update the `kibana.alert.workflow_status` of alerts
(#227326)](#227326)

<!--- Backport version: 9.6.6 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sorenlouv/backport)

<!--BACKPORT [{"author":{"name":"Andrew
Macri","email":"[email protected]"},"sourceCommit":{"committedDate":"2025-07-11T20:16:59Z","message":"[AI4DSOC]
[Attack discovery] In AI4DSOC projects, don't prompt the user to update
the `kibana.alert.workflow_status` of alerts (#227326)\n\n## [AI4DSOC]
[Attack discovery] In AI4DSOC projects, don't prompt the user to update
the `kibana.alert.workflow_status` of alerts\n\nThis PR updates Attack
discovery for AI4DSOC projects, such that it does NOT prompt the user
with a modal to [optionally update the kibana.alert.workflow_status of
alerts associated with Attack
discoveries](#225029), as
illustrated by the animated gif
below:\n\n![ai_for_soc_take_action](https://github.com/user-attachments/assets/1c58632f-f18d-4164-a31a-e8fbbd90bae2)\n\n_Above:
AI4DSOC: The modal is NOT displayed, and the associated alerts are NOT
updated_\n\nThe animated gif above illustrates that in AI4DSOC
projects:\n\n- The modal prompting the user to update the
`kibana.alert.workflow_status` of alerts is NOT displayed\n- Only the
workflow status of the Attack discovery is updated\n\n### All other
serverless projects\n\nAll other (non-AI4DSOC) serverless projects
display the modal, and optionally update the workflow status of the
alerts, as illustrated by the animated gif
below:\n\n![serverless](https://github.com/user-attachments/assets/d3dc067f-3fc3-461c-a7b5-a0640f82cc68)\n\n_Above:
All other serverless projects: The modal is displayed, and the
associated alerts are updated_\n\nThe animated gif above illustrates
that for all other serverless projects:\n\n- The modal prompting the
user to update the `kibana.alert.workflow_status` of alerts is
displayed\n- The workflow status of the Attack discovery is (optionally)
updated\n\n### Elastic Cloud and self manged\n\nElastic Cloud and self
manged deployments display the modal, and optionally update the workflow
status of the alerts, as illustrated by the animated gif
below:\n\n![self-managed](https://github.com/user-attachments/assets/0aeb7d4e-81a7-44ca-bdb5-86573d8ad3c9)\n\n_Above:
Self managed: The modal is displayed, and the associated alerts are
updated_\n\nThe animated gif above illustrates that for Elastic cloud
and self manged:\n\n- The modal prompting the user to update the
`kibana.alert.workflow_status` of alerts is displayed\n- The workflow
status of the Attack discovery is (optionally) updated\n\n### Feature
flags\n\nEnable the required and recommended
`assistantAttackDiscoverySchedulingEnabled` features flag in
`config/kibana.dev.yml`:\n\n```yaml\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: true\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
true\n```\n\n### AI4DSOC\n\n- To test with an AI4DSOC project, add the
following setting to
`config/serverless.security.dev.yaml`:\n\n```yaml\nxpack.securitySolutionServerless.productTypes:\n[\n
{ product_line: 'ai_soc', product_tier: 'search_ai_lake'
},\n]\n```\n\n### Desk testing\n\n1) Navigate to Security > Attack
discovery\n\n2) Click `Generate` to generate attack discoveries\n\n3)
Click the `Take action` dropdown on an Attack discovery\n\n4) Click
`Mark as acknowledged`\n\n**Expected result**\n\nThe modal is displayed,
and alerts are (optionally) updated for the deployment, for the
deployment-type in the table below:\n\n| Deployment | Modal displayed |
Alerts (optionally) updated
|\n|-------------------------------|-----------------|-----------------------------|\n|
AI4DSOC | ❌ | ❌ |\n| All other serverless projects | ✅ | ✅ |\n| Elastic
Cloud and self manged | ✅ | ✅ |\n\n5) Select (at least) 2 discoveries
via their checkboxes\n\n6) Click the `Selected 2 Attack discoveries`
popover menu\n\n7) Click `Mark as closed` from the popover
menu\n\n**Expected result**\n\nOnce again, the modal is displayed, and
alerts are (optionally) updated for the deployment, for the
deployment-type in the table below:\n\n| Deployment | Modal displayed |
Alerts (optionally) updated
|\n|-------------------------------|-----------------|-----------------------------|\n|
AI4DSOC | ❌ | ❌ |\n| All other serverless projects | ✅ | ✅ |\n| Elastic
Cloud and self manged | ✅ | ✅
|","sha":"a4aa6a04c3db7d793e334fd1b38273cfca141c09","branchLabelMapping":{"^v9.2.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","Team:
SecuritySolution","Team:Security Generative
AI","backport:version","v9.1.0","v8.19.0","v9.2.0"],"title":"[AI4DSOC]
[Attack discovery] In AI4DSOC projects, don't prompt the user to update
the `kibana.alert.workflow_status` of
alerts","number":227326,"url":"https://github.com/elastic/kibana/pull/227326","mergeCommit":{"message":"[AI4DSOC]
[Attack discovery] In AI4DSOC projects, don't prompt the user to update
the `kibana.alert.workflow_status` of alerts (#227326)\n\n## [AI4DSOC]
[Attack discovery] In AI4DSOC projects, don't prompt the user to update
the `kibana.alert.workflow_status` of alerts\n\nThis PR updates Attack
discovery for AI4DSOC projects, such that it does NOT prompt the user
with a modal to [optionally update the kibana.alert.workflow_status of
alerts associated with Attack
discoveries](#225029), as
illustrated by the animated gif
below:\n\n![ai_for_soc_take_action](https://github.com/user-attachments/assets/1c58632f-f18d-4164-a31a-e8fbbd90bae2)\n\n_Above:
AI4DSOC: The modal is NOT displayed, and the associated alerts are NOT
updated_\n\nThe animated gif above illustrates that in AI4DSOC
projects:\n\n- The modal prompting the user to update the
`kibana.alert.workflow_status` of alerts is NOT displayed\n- Only the
workflow status of the Attack discovery is updated\n\n### All other
serverless projects\n\nAll other (non-AI4DSOC) serverless projects
display the modal, and optionally update the workflow status of the
alerts, as illustrated by the animated gif
below:\n\n![serverless](https://github.com/user-attachments/assets/d3dc067f-3fc3-461c-a7b5-a0640f82cc68)\n\n_Above:
All other serverless projects: The modal is displayed, and the
associated alerts are updated_\n\nThe animated gif above illustrates
that for all other serverless projects:\n\n- The modal prompting the
user to update the `kibana.alert.workflow_status` of alerts is
displayed\n- The workflow status of the Attack discovery is (optionally)
updated\n\n### Elastic Cloud and self manged\n\nElastic Cloud and self
manged deployments display the modal, and optionally update the workflow
status of the alerts, as illustrated by the animated gif
below:\n\n![self-managed](https://github.com/user-attachments/assets/0aeb7d4e-81a7-44ca-bdb5-86573d8ad3c9)\n\n_Above:
Self managed: The modal is displayed, and the associated alerts are
updated_\n\nThe animated gif above illustrates that for Elastic cloud
and self manged:\n\n- The modal prompting the user to update the
`kibana.alert.workflow_status` of alerts is displayed\n- The workflow
status of the Attack discovery is (optionally) updated\n\n### Feature
flags\n\nEnable the required and recommended
`assistantAttackDiscoverySchedulingEnabled` features flag in
`config/kibana.dev.yml`:\n\n```yaml\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: true\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
true\n```\n\n### AI4DSOC\n\n- To test with an AI4DSOC project, add the
following setting to
`config/serverless.security.dev.yaml`:\n\n```yaml\nxpack.securitySolutionServerless.productTypes:\n[\n
{ product_line: 'ai_soc', product_tier: 'search_ai_lake'
},\n]\n```\n\n### Desk testing\n\n1) Navigate to Security > Attack
discovery\n\n2) Click `Generate` to generate attack discoveries\n\n3)
Click the `Take action` dropdown on an Attack discovery\n\n4) Click
`Mark as acknowledged`\n\n**Expected result**\n\nThe modal is displayed,
and alerts are (optionally) updated for the deployment, for the
deployment-type in the table below:\n\n| Deployment | Modal displayed |
Alerts (optionally) updated
|\n|-------------------------------|-----------------|-----------------------------|\n|
AI4DSOC | ❌ | ❌ |\n| All other serverless projects | ✅ | ✅ |\n| Elastic
Cloud and self manged | ✅ | ✅ |\n\n5) Select (at least) 2 discoveries
via their checkboxes\n\n6) Click the `Selected 2 Attack discoveries`
popover menu\n\n7) Click `Mark as closed` from the popover
menu\n\n**Expected result**\n\nOnce again, the modal is displayed, and
alerts are (optionally) updated for the deployment, for the
deployment-type in the table below:\n\n| Deployment | Modal displayed |
Alerts (optionally) updated
|\n|-------------------------------|-----------------|-----------------------------|\n|
AI4DSOC | ❌ | ❌ |\n| All other serverless projects | ✅ | ✅ |\n| Elastic
Cloud and self manged | ✅ | ✅
|","sha":"a4aa6a04c3db7d793e334fd1b38273cfca141c09"}},"sourceBranch":"main","suggestedTargetBranches":["9.1","8.19"],"targetPullRequestStates":[{"branch":"9.1","label":"v9.1.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"main","label":"v9.2.0","branchLabelMappingKey":"^v9.2.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/227326","number":227326,"mergeCommit":{"message":"[AI4DSOC]
[Attack discovery] In AI4DSOC projects, don't prompt the user to update
the `kibana.alert.workflow_status` of alerts (#227326)\n\n## [AI4DSOC]
[Attack discovery] In AI4DSOC projects, don't prompt the user to update
the `kibana.alert.workflow_status` of alerts\n\nThis PR updates Attack
discovery for AI4DSOC projects, such that it does NOT prompt the user
with a modal to [optionally update the kibana.alert.workflow_status of
alerts associated with Attack
discoveries](#225029), as
illustrated by the animated gif
below:\n\n![ai_for_soc_take_action](https://github.com/user-attachments/assets/1c58632f-f18d-4164-a31a-e8fbbd90bae2)\n\n_Above:
AI4DSOC: The modal is NOT displayed, and the associated alerts are NOT
updated_\n\nThe animated gif above illustrates that in AI4DSOC
projects:\n\n- The modal prompting the user to update the
`kibana.alert.workflow_status` of alerts is NOT displayed\n- Only the
workflow status of the Attack discovery is updated\n\n### All other
serverless projects\n\nAll other (non-AI4DSOC) serverless projects
display the modal, and optionally update the workflow status of the
alerts, as illustrated by the animated gif
below:\n\n![serverless](https://github.com/user-attachments/assets/d3dc067f-3fc3-461c-a7b5-a0640f82cc68)\n\n_Above:
All other serverless projects: The modal is displayed, and the
associated alerts are updated_\n\nThe animated gif above illustrates
that for all other serverless projects:\n\n- The modal prompting the
user to update the `kibana.alert.workflow_status` of alerts is
displayed\n- The workflow status of the Attack discovery is (optionally)
updated\n\n### Elastic Cloud and self manged\n\nElastic Cloud and self
manged deployments display the modal, and optionally update the workflow
status of the alerts, as illustrated by the animated gif
below:\n\n![self-managed](https://github.com/user-attachments/assets/0aeb7d4e-81a7-44ca-bdb5-86573d8ad3c9)\n\n_Above:
Self managed: The modal is displayed, and the associated alerts are
updated_\n\nThe animated gif above illustrates that for Elastic cloud
and self manged:\n\n- The modal prompting the user to update the
`kibana.alert.workflow_status` of alerts is displayed\n- The workflow
status of the Attack discovery is (optionally) updated\n\n### Feature
flags\n\nEnable the required and recommended
`assistantAttackDiscoverySchedulingEnabled` features flag in
`config/kibana.dev.yml`:\n\n```yaml\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: true\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
true\n```\n\n### AI4DSOC\n\n- To test with an AI4DSOC project, add the
following setting to
`config/serverless.security.dev.yaml`:\n\n```yaml\nxpack.securitySolutionServerless.productTypes:\n[\n
{ product_line: 'ai_soc', product_tier: 'search_ai_lake'
},\n]\n```\n\n### Desk testing\n\n1) Navigate to Security > Attack
discovery\n\n2) Click `Generate` to generate attack discoveries\n\n3)
Click the `Take action` dropdown on an Attack discovery\n\n4) Click
`Mark as acknowledged`\n\n**Expected result**\n\nThe modal is displayed,
and alerts are (optionally) updated for the deployment, for the
deployment-type in the table below:\n\n| Deployment | Modal displayed |
Alerts (optionally) updated
|\n|-------------------------------|-----------------|-----------------------------|\n|
AI4DSOC | ❌ | ❌ |\n| All other serverless projects | ✅ | ✅ |\n| Elastic
Cloud and self manged | ✅ | ✅ |\n\n5) Select (at least) 2 discoveries
via their checkboxes\n\n6) Click the `Selected 2 Attack discoveries`
popover menu\n\n7) Click `Mark as closed` from the popover
menu\n\n**Expected result**\n\nOnce again, the modal is displayed, and
alerts are (optionally) updated for the deployment, for the
deployment-type in the table below:\n\n| Deployment | Modal displayed |
Alerts (optionally) updated
|\n|-------------------------------|-----------------|-----------------------------|\n|
AI4DSOC | ❌ | ❌ |\n| All other serverless projects | ✅ | ✅ |\n| Elastic
Cloud and self manged | ✅ | ✅
|","sha":"a4aa6a04c3db7d793e334fd1b38273cfca141c09"}}]}] BACKPORT-->

Co-authored-by: Andrew Macri <[email protected]>
kibanamachine added a commit that referenced this pull request Jul 14, 2025
… the user to update the `kibana.alert.workflow_status` of alerts (#227326) (#227720)

# Backport

This will backport the following commits from `main` to `8.19`:
- [[AI4DSOC] [Attack discovery] In AI4DSOC projects, don't prompt the
user to update the `kibana.alert.workflow_status` of alerts
(#227326)](#227326)

<!--- Backport version: 9.6.6 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sorenlouv/backport)

<!--BACKPORT [{"author":{"name":"Andrew
Macri","email":"[email protected]"},"sourceCommit":{"committedDate":"2025-07-11T20:16:59Z","message":"[AI4DSOC]
[Attack discovery] In AI4DSOC projects, don't prompt the user to update
the `kibana.alert.workflow_status` of alerts (#227326)\n\n## [AI4DSOC]
[Attack discovery] In AI4DSOC projects, don't prompt the user to update
the `kibana.alert.workflow_status` of alerts\n\nThis PR updates Attack
discovery for AI4DSOC projects, such that it does NOT prompt the user
with a modal to [optionally update the kibana.alert.workflow_status of
alerts associated with Attack
discoveries](#225029), as
illustrated by the animated gif
below:\n\n![ai_for_soc_take_action](https://github.com/user-attachments/assets/1c58632f-f18d-4164-a31a-e8fbbd90bae2)\n\n_Above:
AI4DSOC: The modal is NOT displayed, and the associated alerts are NOT
updated_\n\nThe animated gif above illustrates that in AI4DSOC
projects:\n\n- The modal prompting the user to update the
`kibana.alert.workflow_status` of alerts is NOT displayed\n- Only the
workflow status of the Attack discovery is updated\n\n### All other
serverless projects\n\nAll other (non-AI4DSOC) serverless projects
display the modal, and optionally update the workflow status of the
alerts, as illustrated by the animated gif
below:\n\n![serverless](https://github.com/user-attachments/assets/d3dc067f-3fc3-461c-a7b5-a0640f82cc68)\n\n_Above:
All other serverless projects: The modal is displayed, and the
associated alerts are updated_\n\nThe animated gif above illustrates
that for all other serverless projects:\n\n- The modal prompting the
user to update the `kibana.alert.workflow_status` of alerts is
displayed\n- The workflow status of the Attack discovery is (optionally)
updated\n\n### Elastic Cloud and self manged\n\nElastic Cloud and self
manged deployments display the modal, and optionally update the workflow
status of the alerts, as illustrated by the animated gif
below:\n\n![self-managed](https://github.com/user-attachments/assets/0aeb7d4e-81a7-44ca-bdb5-86573d8ad3c9)\n\n_Above:
Self managed: The modal is displayed, and the associated alerts are
updated_\n\nThe animated gif above illustrates that for Elastic cloud
and self manged:\n\n- The modal prompting the user to update the
`kibana.alert.workflow_status` of alerts is displayed\n- The workflow
status of the Attack discovery is (optionally) updated\n\n### Feature
flags\n\nEnable the required and recommended
`assistantAttackDiscoverySchedulingEnabled` features flag in
`config/kibana.dev.yml`:\n\n```yaml\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: true\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
true\n```\n\n### AI4DSOC\n\n- To test with an AI4DSOC project, add the
following setting to
`config/serverless.security.dev.yaml`:\n\n```yaml\nxpack.securitySolutionServerless.productTypes:\n[\n
{ product_line: 'ai_soc', product_tier: 'search_ai_lake'
},\n]\n```\n\n### Desk testing\n\n1) Navigate to Security > Attack
discovery\n\n2) Click `Generate` to generate attack discoveries\n\n3)
Click the `Take action` dropdown on an Attack discovery\n\n4) Click
`Mark as acknowledged`\n\n**Expected result**\n\nThe modal is displayed,
and alerts are (optionally) updated for the deployment, for the
deployment-type in the table below:\n\n| Deployment | Modal displayed |
Alerts (optionally) updated
|\n|-------------------------------|-----------------|-----------------------------|\n|
AI4DSOC | ❌ | ❌ |\n| All other serverless projects | ✅ | ✅ |\n| Elastic
Cloud and self manged | ✅ | ✅ |\n\n5) Select (at least) 2 discoveries
via their checkboxes\n\n6) Click the `Selected 2 Attack discoveries`
popover menu\n\n7) Click `Mark as closed` from the popover
menu\n\n**Expected result**\n\nOnce again, the modal is displayed, and
alerts are (optionally) updated for the deployment, for the
deployment-type in the table below:\n\n| Deployment | Modal displayed |
Alerts (optionally) updated
|\n|-------------------------------|-----------------|-----------------------------|\n|
AI4DSOC | ❌ | ❌ |\n| All other serverless projects | ✅ | ✅ |\n| Elastic
Cloud and self manged | ✅ | ✅
|","sha":"a4aa6a04c3db7d793e334fd1b38273cfca141c09","branchLabelMapping":{"^v9.2.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","Team:
SecuritySolution","Team:Security Generative
AI","backport:version","v9.1.0","v8.19.0","v9.2.0"],"title":"[AI4DSOC]
[Attack discovery] In AI4DSOC projects, don't prompt the user to update
the `kibana.alert.workflow_status` of
alerts","number":227326,"url":"https://github.com/elastic/kibana/pull/227326","mergeCommit":{"message":"[AI4DSOC]
[Attack discovery] In AI4DSOC projects, don't prompt the user to update
the `kibana.alert.workflow_status` of alerts (#227326)\n\n## [AI4DSOC]
[Attack discovery] In AI4DSOC projects, don't prompt the user to update
the `kibana.alert.workflow_status` of alerts\n\nThis PR updates Attack
discovery for AI4DSOC projects, such that it does NOT prompt the user
with a modal to [optionally update the kibana.alert.workflow_status of
alerts associated with Attack
discoveries](#225029), as
illustrated by the animated gif
below:\n\n![ai_for_soc_take_action](https://github.com/user-attachments/assets/1c58632f-f18d-4164-a31a-e8fbbd90bae2)\n\n_Above:
AI4DSOC: The modal is NOT displayed, and the associated alerts are NOT
updated_\n\nThe animated gif above illustrates that in AI4DSOC
projects:\n\n- The modal prompting the user to update the
`kibana.alert.workflow_status` of alerts is NOT displayed\n- Only the
workflow status of the Attack discovery is updated\n\n### All other
serverless projects\n\nAll other (non-AI4DSOC) serverless projects
display the modal, and optionally update the workflow status of the
alerts, as illustrated by the animated gif
below:\n\n![serverless](https://github.com/user-attachments/assets/d3dc067f-3fc3-461c-a7b5-a0640f82cc68)\n\n_Above:
All other serverless projects: The modal is displayed, and the
associated alerts are updated_\n\nThe animated gif above illustrates
that for all other serverless projects:\n\n- The modal prompting the
user to update the `kibana.alert.workflow_status` of alerts is
displayed\n- The workflow status of the Attack discovery is (optionally)
updated\n\n### Elastic Cloud and self manged\n\nElastic Cloud and self
manged deployments display the modal, and optionally update the workflow
status of the alerts, as illustrated by the animated gif
below:\n\n![self-managed](https://github.com/user-attachments/assets/0aeb7d4e-81a7-44ca-bdb5-86573d8ad3c9)\n\n_Above:
Self managed: The modal is displayed, and the associated alerts are
updated_\n\nThe animated gif above illustrates that for Elastic cloud
and self manged:\n\n- The modal prompting the user to update the
`kibana.alert.workflow_status` of alerts is displayed\n- The workflow
status of the Attack discovery is (optionally) updated\n\n### Feature
flags\n\nEnable the required and recommended
`assistantAttackDiscoverySchedulingEnabled` features flag in
`config/kibana.dev.yml`:\n\n```yaml\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: true\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
true\n```\n\n### AI4DSOC\n\n- To test with an AI4DSOC project, add the
following setting to
`config/serverless.security.dev.yaml`:\n\n```yaml\nxpack.securitySolutionServerless.productTypes:\n[\n
{ product_line: 'ai_soc', product_tier: 'search_ai_lake'
},\n]\n```\n\n### Desk testing\n\n1) Navigate to Security > Attack
discovery\n\n2) Click `Generate` to generate attack discoveries\n\n3)
Click the `Take action` dropdown on an Attack discovery\n\n4) Click
`Mark as acknowledged`\n\n**Expected result**\n\nThe modal is displayed,
and alerts are (optionally) updated for the deployment, for the
deployment-type in the table below:\n\n| Deployment | Modal displayed |
Alerts (optionally) updated
|\n|-------------------------------|-----------------|-----------------------------|\n|
AI4DSOC | ❌ | ❌ |\n| All other serverless projects | ✅ | ✅ |\n| Elastic
Cloud and self manged | ✅ | ✅ |\n\n5) Select (at least) 2 discoveries
via their checkboxes\n\n6) Click the `Selected 2 Attack discoveries`
popover menu\n\n7) Click `Mark as closed` from the popover
menu\n\n**Expected result**\n\nOnce again, the modal is displayed, and
alerts are (optionally) updated for the deployment, for the
deployment-type in the table below:\n\n| Deployment | Modal displayed |
Alerts (optionally) updated
|\n|-------------------------------|-----------------|-----------------------------|\n|
AI4DSOC | ❌ | ❌ |\n| All other serverless projects | ✅ | ✅ |\n| Elastic
Cloud and self manged | ✅ | ✅
|","sha":"a4aa6a04c3db7d793e334fd1b38273cfca141c09"}},"sourceBranch":"main","suggestedTargetBranches":["9.1","8.19"],"targetPullRequestStates":[{"branch":"9.1","label":"v9.1.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"main","label":"v9.2.0","branchLabelMappingKey":"^v9.2.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/227326","number":227326,"mergeCommit":{"message":"[AI4DSOC]
[Attack discovery] In AI4DSOC projects, don't prompt the user to update
the `kibana.alert.workflow_status` of alerts (#227326)\n\n## [AI4DSOC]
[Attack discovery] In AI4DSOC projects, don't prompt the user to update
the `kibana.alert.workflow_status` of alerts\n\nThis PR updates Attack
discovery for AI4DSOC projects, such that it does NOT prompt the user
with a modal to [optionally update the kibana.alert.workflow_status of
alerts associated with Attack
discoveries](#225029), as
illustrated by the animated gif
below:\n\n![ai_for_soc_take_action](https://github.com/user-attachments/assets/1c58632f-f18d-4164-a31a-e8fbbd90bae2)\n\n_Above:
AI4DSOC: The modal is NOT displayed, and the associated alerts are NOT
updated_\n\nThe animated gif above illustrates that in AI4DSOC
projects:\n\n- The modal prompting the user to update the
`kibana.alert.workflow_status` of alerts is NOT displayed\n- Only the
workflow status of the Attack discovery is updated\n\n### All other
serverless projects\n\nAll other (non-AI4DSOC) serverless projects
display the modal, and optionally update the workflow status of the
alerts, as illustrated by the animated gif
below:\n\n![serverless](https://github.com/user-attachments/assets/d3dc067f-3fc3-461c-a7b5-a0640f82cc68)\n\n_Above:
All other serverless projects: The modal is displayed, and the
associated alerts are updated_\n\nThe animated gif above illustrates
that for all other serverless projects:\n\n- The modal prompting the
user to update the `kibana.alert.workflow_status` of alerts is
displayed\n- The workflow status of the Attack discovery is (optionally)
updated\n\n### Elastic Cloud and self manged\n\nElastic Cloud and self
manged deployments display the modal, and optionally update the workflow
status of the alerts, as illustrated by the animated gif
below:\n\n![self-managed](https://github.com/user-attachments/assets/0aeb7d4e-81a7-44ca-bdb5-86573d8ad3c9)\n\n_Above:
Self managed: The modal is displayed, and the associated alerts are
updated_\n\nThe animated gif above illustrates that for Elastic cloud
and self manged:\n\n- The modal prompting the user to update the
`kibana.alert.workflow_status` of alerts is displayed\n- The workflow
status of the Attack discovery is (optionally) updated\n\n### Feature
flags\n\nEnable the required and recommended
`assistantAttackDiscoverySchedulingEnabled` features flag in
`config/kibana.dev.yml`:\n\n```yaml\nfeature_flags.overrides:\n
securitySolution.attackDiscoveryAlertsEnabled: true\n
securitySolution.assistantAttackDiscoverySchedulingEnabled:
true\n```\n\n### AI4DSOC\n\n- To test with an AI4DSOC project, add the
following setting to
`config/serverless.security.dev.yaml`:\n\n```yaml\nxpack.securitySolutionServerless.productTypes:\n[\n
{ product_line: 'ai_soc', product_tier: 'search_ai_lake'
},\n]\n```\n\n### Desk testing\n\n1) Navigate to Security > Attack
discovery\n\n2) Click `Generate` to generate attack discoveries\n\n3)
Click the `Take action` dropdown on an Attack discovery\n\n4) Click
`Mark as acknowledged`\n\n**Expected result**\n\nThe modal is displayed,
and alerts are (optionally) updated for the deployment, for the
deployment-type in the table below:\n\n| Deployment | Modal displayed |
Alerts (optionally) updated
|\n|-------------------------------|-----------------|-----------------------------|\n|
AI4DSOC | ❌ | ❌ |\n| All other serverless projects | ✅ | ✅ |\n| Elastic
Cloud and self manged | ✅ | ✅ |\n\n5) Select (at least) 2 discoveries
via their checkboxes\n\n6) Click the `Selected 2 Attack discoveries`
popover menu\n\n7) Click `Mark as closed` from the popover
menu\n\n**Expected result**\n\nOnce again, the modal is displayed, and
alerts are (optionally) updated for the deployment, for the
deployment-type in the table below:\n\n| Deployment | Modal displayed |
Alerts (optionally) updated
|\n|-------------------------------|-----------------|-----------------------------|\n|
AI4DSOC | ❌ | ❌ |\n| All other serverless projects | ✅ | ✅ |\n| Elastic
Cloud and self manged | ✅ | ✅
|","sha":"a4aa6a04c3db7d793e334fd1b38273cfca141c09"}}]}] BACKPORT-->

Co-authored-by: Andrew Macri <[email protected]>
Co-authored-by: Elastic Machine <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport:version Backport to applied version labels release_note:skip Skip the PR/issue when compiling release notes Team:Security Generative AI Security Generative AI Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. v8.19.0 v9.1.0 v9.2.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants