Skip to content
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
122 commits
Select commit Hold shift + click to select a range
958deed
Introduces Rules feature and subsequent app changes
rylnd Oct 17, 2025
4e60d94
style: revert linting changes to large yaml/JSON files
rylnd Oct 17, 2025
02765d8
update the siem migrations required permissions
denar50 Oct 21, 2025
b35f598
update attack discovery required permissions
denar50 Oct 21, 2025
686745e
update timeline required permissions
denar50 Oct 21, 2025
2f7cff4
fix onboarding sections
denar50 Oct 24, 2025
4cb8ba0
[CI] Auto-commit changed files from 'node scripts/eslint_all_files --…
kibanamachine Oct 24, 2025
65d000a
allow alert management operations for roles with read only access
denar50 Oct 24, 2025
d70db6e
fix create shared exception list endpoint
denar50 Oct 24, 2025
3cc5064
fix unit test
denar50 Oct 29, 2025
4738084
fixes bulk_action route to allow export on rules-read
dplumlee Oct 29, 2025
191d62c
Changes from node scripts/eslint_all_files --no-cache --fix
kibanamachine Oct 30, 2025
5ed674e
fix cypress test: endpoint_role_rbac_with_space_awareness.cy.ts
denar50 Oct 30, 2025
0ceb610
Merge branch 'main' into rules-rbac-new
denar50 Oct 30, 2025
f2b15ee
Changes from node scripts/eslint_all_files --no-cache --fix
kibanamachine Oct 30, 2025
f47b16e
fix manage value lists button disabled for rules-all
denar50 Oct 30, 2025
51c9819
fix showing rule update callouts when users don't have rules-all
dplumlee Oct 30, 2025
603be1f
fix authorization tests
denar50 Oct 31, 2025
9089355
Merge branch 'main' into rules-rbac-new
denar50 Oct 31, 2025
33896fa
Merge branch 'main' into rules-rbac-new
rylnd Oct 31, 2025
319a17b
Merge remote-tracking branch 'upstream/main' into rules-rbac-1
denar50 Nov 3, 2025
80ce6a5
add missing socManagement sub feature config to siemV4 and siemV5
denar50 Nov 3, 2025
17018e6
fix ai4soc cypress test
denar50 Nov 3, 2025
11b9349
add missing siemV5 case to trusted devices rbac cypress test
denar50 Nov 3, 2025
63635af
fix authorization tests after new ai4soc changes
denar50 Nov 3, 2025
daa8579
fix api privileges tests after ai4soc changes
denar50 Nov 3, 2025
dd43f8b
fixes respectLicenseLevel test that broke merging upstream
dplumlee Nov 3, 2025
fc6baad
Merge branch 'main' into rules-rbac-new
denar50 Nov 4, 2025
5b544bc
add cypress tests for the rules management page
denar50 Nov 4, 2025
698722a
removes unused code and resolves PR TODOs
dplumlee Nov 5, 2025
185fd6a
update SECURITY_FEATURE_ID constant to siemV5
denar50 Nov 5, 2025
1fa6867
Merge branch 'main' into rules-rbac-new
denar50 Nov 5, 2025
b6b35b7
fix rules management page privileges cypress test failure
denar50 Nov 5, 2025
150472a
removes remaining TODOs and unskips tests
dplumlee Nov 6, 2025
29f215a
add cypress tests for the alerts page
denar50 Nov 6, 2025
7d9fa58
Merge branch 'main' into rules-rbac-new
denar50 Nov 7, 2025
632bbc0
add cypress tests for the rule details page
denar50 Nov 7, 2025
519aa8e
Merge branch 'main' into rules-rbac-new
dplumlee Nov 12, 2025
ebd653e
switches detection engine health setup endpiont to have initalize-sec…
dplumlee Nov 12, 2025
6d2528f
Merge remote-tracking branch 'upstream/main' into rules-rbac-new
dplumlee Nov 14, 2025
0500901
removes commented out code
dplumlee Nov 14, 2025
052687f
adds deprecation / migration from rulev1 to rulev2 and init exception…
dhurley14 Nov 14, 2025
63b85e4
fixes attack page merge conflicts
dplumlee Nov 14, 2025
dbdbdbd
Merge remote-tracking branch 'rylnd/rules-rbac-new' into rules-except…
dhurley14 Nov 17, 2025
f0a7ff1
typo lead to bug in UI where buttons were disabled
dhurley14 Nov 17, 2025
03aff7e
Merge branch 'main' into rules-rbac-new
rylnd Nov 17, 2025
5e99b8b
continue registering rules v1 alongside rules v2, use alerting rules …
dhurley14 Nov 18, 2025
855dee4
Allow users with Dashboard privileges to view the Automatic Migration…
rylnd Nov 18, 2025
633e28e
Changes from node scripts/eslint_all_files --no-cache --fix
kibanamachine Nov 18, 2025
9a07fa9
Update new Attacks links from upstream to use new Rules privileges
rylnd Nov 18, 2025
7ec5373
Merge branch 'main' into rules-rbac-new
rylnd Nov 18, 2025
2ee9e93
Merge branch 'main' into rules-rbac-new
rylnd Nov 18, 2025
d60191b
Merge remote-tracking branch 'rylnd/rules-rbac-new' into rules-except…
dhurley14 Nov 19, 2025
4000d0d
adds exceptions permissions to user privileges hook
dplumlee Nov 19, 2025
55f5afb
assign exception so management to subfeature
dhurley14 Nov 19, 2025
8ff1c86
Merge remote-tracking branch 'origin/rules-exceptions-subfeatures' in…
dhurley14 Nov 19, 2025
a56fd56
Merge branch 'main' into rules-rbac-new
rylnd Nov 20, 2025
60852d9
update the siem migrations required permissions
denar50 Oct 21, 2025
1068cbe
fix: siem migration privs
logeekal Oct 23, 2025
895dc01
fix: tests
logeekal Oct 23, 2025
017d270
Merge branch 'main' into rules-rbac-new
rylnd Nov 20, 2025
3bf8701
fix: privilege requirements for Migrations components
rylnd Nov 20, 2025
6e7591f
Fix types in test class implementation
rylnd Nov 20, 2025
670bd62
Merge branch 'rules-rbac-new' into fix/automatic_migrations_rules_rbac
logeekal Nov 21, 2025
c566b70
fix: dashboard and rules privs
logeekal Nov 21, 2025
89f39fc
revert unncessary change
logeekal Nov 21, 2025
b26ecf1
lets shared exception list page be viewed with no rules/endpoint exce…
dplumlee Nov 21, 2025
ad95fa9
Merge remote-tracking branch 'rylnd/rules-rbac-new' into rules-except…
dplumlee Nov 21, 2025
f4f01a3
updates routes with exception subfeature authz strings
dhurley14 Nov 21, 2025
947c162
Merge remote-tracking branch 'origin/rules-exceptions-subfeatures' in…
dhurley14 Nov 21, 2025
e70ac86
remove exceptions api authz strings from rules v2 feature, should onl…
dhurley14 Nov 21, 2025
933274d
Merge branch 'main' into rules-rbac-new
rylnd Nov 21, 2025
0dc0d80
linking rules should use the edit + read rules authz function
dhurley14 Nov 24, 2025
84062f2
updates shared list UI page to handle RBAC edge cases
dplumlee Nov 24, 2025
57567db
Merge branch 'main' into rules-rbac-new
rylnd Nov 25, 2025
06aff3b
Changes from node scripts/regenerate_moon_projects.js --update
kibanamachine Nov 25, 2025
b1fc5f3
fix: tests + types
logeekal Nov 25, 2025
a1b8de0
refactors feature config code to match other features
dplumlee Nov 25, 2025
513e974
Merge remote-tracking branch 'rylnd/rules-rbac-new' into rules-except…
dplumlee Nov 25, 2025
ee43150
fix types
dplumlee Nov 25, 2025
6579559
updates server features mock
dplumlee Nov 25, 2025
419d986
Merge pull request #13 from logeekal/fix/automatic_migrations_rules_rbac
rylnd Nov 25, 2025
b522107
Simplify permissions for migration dashboard link
rylnd Nov 25, 2025
635e195
update product features service mock
dplumlee Nov 26, 2025
04d17cb
Merge remote-tracking branch 'rylnd/rules-rbac-new' into rules-except…
dplumlee Nov 26, 2025
12c7781
fix exception list jest tests
dplumlee Nov 26, 2025
e77cd1c
fixes take action dropdown jest tests
dplumlee Nov 27, 2025
b0bf2c0
Merge branch 'main' into rules-rbac-new
denar50 Nov 27, 2025
7fc5507
applies patch rules using new alerting bulk edit rules function if al…
dhurley14 Dec 1, 2025
3418e51
Merge remote-tracking branch 'origin/rules-exceptions-subfeatures' in…
dhurley14 Dec 1, 2025
e27b573
fix: privs
logeekal Dec 1, 2025
0efc494
remove unnecessary file
logeekal Dec 1, 2025
b345350
Merge branch 'main' into rules-rbac-new
rylnd Dec 1, 2025
3ac5a56
Merge pull request #15 from logeekal/fix/automatic_migration_rbac_fix…
rylnd Dec 1, 2025
49b139c
Grant 'alerting.alert.all' privileges to rules:read users
rylnd Dec 1, 2025
110938b
Add missing Defend privileges to siemV5
rylnd Dec 1, 2025
8bcc70d
hides exceptions tab in rule details based on permissions
dplumlee Dec 1, 2025
83e004a
handle siem version dynamically in artifact details tab cypress test
gergoabraham Dec 2, 2025
ac0a95e
fixes search bar jest tests
dplumlee Dec 2, 2025
0ffcabd
Merge pull request #16 from gergoabraham/fix-artifact-details-cypress…
rylnd Dec 2, 2025
6649a32
updates api integration configs
dplumlee Dec 2, 2025
8759e3a
updates serverless test authorization snapshot
dplumlee Dec 2, 2025
3798511
Merge remote-tracking branch 'rylnd/rules-rbac-new' into rules-except…
dplumlee Dec 2, 2025
f8615ae
Merge branch 'main' into rules-rbac-new
dplumlee Dec 2, 2025
d5bcf47
Merge remote-tracking branch 'rylnd/rules-rbac-new' into rules-except…
dplumlee Dec 2, 2025
2849d90
fix types
dplumlee Dec 2, 2025
dcc9d74
Merge remote-tracking branch 'rylnd/rules-rbac-new' into rules-except…
dplumlee Dec 2, 2025
bf24ee0
fix security role object types
dplumlee Dec 2, 2025
7a74953
REMOVES exceptions serverless security_roles for now
dplumlee Dec 2, 2025
915fa66
reverts security roles changes
dplumlee Dec 3, 2025
a304a99
fix types
dplumlee Dec 3, 2025
dd16915
update deprecated feature ID FTR tests
dplumlee Dec 3, 2025
33f8eae
updates roles for rule cypress tests
dplumlee Dec 3, 2025
339b8ee
Merge branch 'main' into rules-rbac-new
rylnd Dec 3, 2025
d04dd7f
allows users with read privileges to view uninstalled prebuilt rules …
dplumlee Dec 3, 2025
b66434e
adds mocks to rule upgrade tests
dplumlee Dec 3, 2025
56d7cae
updates rule upgrade cypress tests
dplumlee Dec 3, 2025
c22fa97
Merge remote-tracking branch 'rylnd/rules-rbac-new' into rules-except…
dplumlee Dec 3, 2025
5f6fbd5
Add SIEM V4 user to AI4DSOC capabilities tests
rylnd Dec 3, 2025
d86686c
fix rules management cypress tests
dplumlee Dec 4, 2025
9c2a813
Merge remote-tracking branch 'rylnd/rules-rbac-new' into rules-except…
dplumlee Dec 4, 2025
2f1bc77
fix types
dplumlee Dec 4, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
15 changes: 15 additions & 0 deletions config/serverless.security.search_ai_lake.yml
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,21 @@ xpack.features.overrides:
securitySolutionSiemMigrations.hidden: true

## Fine-tune the security solution essentials feature privileges. These feature privilege overrides are set individually for each project type. Also, refer to `serverless.yml` for the project-agnostic overrides.
siemV5:
privileges:
all.composedOf:
## Limited values so the fields from serverless.yml or serverless.security.yml are overwritten
## We do not need to compose 4 from maps and visualizations because these functionalities are disabled in this tier
- feature: 'discover_v2'
privileges: ['all']
## We need limited access to fleet (v1) in order to use integrations
- feature: 'fleet'
privileges: ['all']
read.composedOf:
- feature: 'discover_v2'
privileges: ['read']
- feature: 'fleet'
privileges: ['read']
siemV4:
privileges:
all.composedOf:
Expand Down
25 changes: 25 additions & 0 deletions config/serverless.security.yml
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,31 @@ xpack.features.overrides:
category: "security"
order: 1103
### Security's feature privileges are fine-tuned to grant access to Discover, Dashboard, Maps, and Visualize apps.
siemV5:
privileges:
### Security's `All` feature privilege should implicitly grant `All` access to Discover, Dashboard, Maps, and
### Visualize features.
all.composedOf:
- feature: 'discover_v2'
privileges: ['all']
- feature: 'dashboard_v2'
privileges: ['all']
- feature: 'visualize_v2'
privileges: ['all']
- feature: 'maps_v2'
privileges: ['all']
# Security's `Read` feature privilege should implicitly grant `Read` access to Discover, Dashboard, Maps, and
# Visualize features. Additionally, it should implicitly grant privilege to create short URLs in Discover,
### Dashboard, and Visualize apps.
read.composedOf:
- feature: 'discover_v2'
privileges: ['read']
- feature: 'dashboard_v2'
privileges: ['read']
- feature: 'visualize_v2'
privileges: ['read']
- feature: 'maps_v2'
privileges: ['read']
siemV4:
privileges:
### Security's `All` feature privilege should implicitly grant `All` access to Discover, Dashboard, Maps, and
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -938,6 +938,137 @@ endpoint_policy_manager:
- feature_savedQueryManagement.all
resources: '*'

# siemv4 roles to test new rules and exceptions subfeature
readrules:
cluster: []
indices:
- names:
- '.alerts-security*'
- '.siem-signals-*'
privileges:
- read
- write
- maintenance
- names:
- .lists*
- .items*
- apm-*-transaction*
- traces-apm*
- auditbeat-*
- endgame-*
- filebeat-*
- logs-*
- packetbeat-*
- winlogbeat-*
- logstash-*
- metrics-endpoint.metadata_current_*
- '.fleet-agents*'
- '.fleet-actions*'
- risk-score.risk-score-*
- .asset-criticality.asset-criticality-*
- .entities.v1.latest.security_*
- .entities.v1.history.*.security_*
- .entities.v1.updates.security_*
- '.ml-anomalies-*'
- security_solution-*.misconfiguration_latest*
- .entity_analytics.monitoring*
privileges:
- read
applications:
- application: 'kibana-.kibana'
privileges:
- feature_ml.read
- feature_siemV4.read
- feature_siemV4.read_alerts
- feature_siemV4.endpoint_list_read
- feature_securitySolutionCasesV2.read
- feature_securitySolutionTimeline.read
- feature_securitySolutionNotes.read
- feature_actions.read
- feature_builtInAlerts.read
- feature_osquery.read
- feature_osquery.run_saved_queries
- feature_discover_v2.all
- feature_dashboard_v2.all
- feature_maps_v2.all
- feature_visualize_v2.all
- feature_savedQueryManagement.all
resources: '*'

editrules:
cluster: ['manage_index_templates', 'manage_transform']
indices:
- names:
- apm-*-transaction*
- traces-apm*
- auditbeat-*
- endgame-*
- filebeat-*
- logs-*
- packetbeat-*
- winlogbeat-*
- logstash-*
- .lists*
- .items*
- .alerts-security*
- .siem-signals-*
- .preview.alerts-security*
- .internal.preview.alerts-security*
- .adhoc.alerts-security*
- .internal.adhoc.alerts-security*
- security_solution-*.misconfiguration_latest*
privileges:
- read
- write
- manage
- names:
- metrics-endpoint.metadata_current_*
- .fleet-agents*
- .fleet-actions*
- '.ml-anomalies-*'
- .entity_analytics.monitoring*
privileges:
- read
- names:
- risk-score.risk-score-*
privileges:
- all
- names:
- .asset-criticality.asset-criticality-*
- .entities.v1.latest.security_*
- .entities.v1.history.*.security_*
- .entities.v1.updates.security_*
privileges:
- read
- write
- names:
- .entities.v1.latest.security_*
privileges:
- delete
applications:
- application: 'kibana-.kibana'
privileges:
- feature_ml.all
- feature_siemV4.all
- feature_siemV4.read_alerts
- feature_siemV4.crud_alerts
- feature_siemV4.global_artifact_management_all
- feature_siemV4.endpoint_exceptions_all
- feature_securitySolutionCasesV2.all
- feature_securitySolutionAssistant.all
- feature_securitySolutionAttackDiscovery.all
- feature_securitySolutionTimeline.all
- feature_securitySolutionNotes.all
- feature_actions.all
- feature_builtInAlerts.all
- feature_dev_tools.all
- feature_discover_v2.all
- feature_dashboard_v2.all
- feature_maps_v2.all
- feature_visualize_v2.all
- feature_savedQueryManagement.all
resources: '*'

# admin role defined in elasticsearch controller
admin:
cluster: ['all']
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,4 +11,5 @@ detections_admin:$2a$10$nN6sRtQl2KX9Gn8kV/.NpOLSk6Jwn8TehEDnZ7aaAgzyl/dy5PYzW
platform_engineer:$2a$10$nN6sRtQl2KX9Gn8kV/.NpOLSk6Jwn8TehEDnZ7aaAgzyl/dy5PYzW
endpoint_operations_analyst:$2a$10$nN6sRtQl2KX9Gn8kV/.NpOLSk6Jwn8TehEDnZ7aaAgzyl/dy5PYzW
endpoint_policy_manager:$2a$10$nN6sRtQl2KX9Gn8kV/.NpOLSk6Jwn8TehEDnZ7aaAgzyl/dy5PYzW

norules:$2a$10$nN6sRtQl2KX9Gn8kV/.NpOLSk6Jwn8TehEDnZ7aaAgzyl/dy5PYzW
editrules:$2a$10$nN6sRtQl2KX9Gn8kV/.NpOLSk6Jwn8TehEDnZ7aaAgzyl/dy5PYzW
Original file line number Diff line number Diff line change
Expand Up @@ -10,3 +10,5 @@ detections_admin:detections_admin
platform_engineer:platform_engineer
endpoint_operations_analyst:endpoint_operations_analyst
endpoint_policy_manager:endpoint_policy_manager
norules:norules
editrules:editrules
Original file line number Diff line number Diff line change
Expand Up @@ -7131,49 +7131,35 @@
"securitySolutionPackages.features.featureRegistry.subFeatures.assistant.description": "Ändern Sie die Standard-Felder, die vom KI-Assistenten und der Angriffserkennung verwendet werden dürfen. Anonymisieren Sie jeglichen Inhalt für die ausgewählten Felder.",
"securitySolutionPackages.features.featureRegistry.subFeatures.blockList": "Blockliste",
"securitySolutionPackages.features.featureRegistry.subFeatures.blockList.description": "Erweitern Sie den Schutz von Elastic Defend gegen bösartige Prozesse und schützen Sie vor potenziell schädlichen Anwendungen.",
"securitySolutionPackages.features.featureRegistry.subFeatures.blockList.privilegesTooltip": "Für den Zugriff auf die Blocklist ist 'Alle Spaces' erforderlich.",
"securitySolutionPackages.features.featureRegistry.subFeatures.endpointExceptions": "Endpoint-Ausnahmen",
"securitySolutionPackages.features.featureRegistry.subFeatures.endpointExceptions.description": "Verwenden Sie Endpoint-Ausnahmen (dies ist eine Test-Unterfunktion).",
"securitySolutionPackages.features.featureRegistry.subFeatures.endpointExceptions.privilegesTooltip": "Für den Zugriff auf Endpoint-Ausnahmen ist „Alle Bereiche“ erforderlich.A",
"securitySolutionPackages.features.featureRegistry.subFeatures.endpointList": "Endpoint-Liste",
"securitySolutionPackages.features.featureRegistry.subFeatures.endpointList.description": "Zeigt alle Hosts an, auf denen Elastic Defend läuft, sowie deren relevante Integrationsdetails.",
"securitySolutionPackages.features.featureRegistry.subFeatures.endpointList.privilegesTooltip": "Für den Zugriff auf die Endpoint-Liste ist „Alle Bereiche“ erforderlich.",
"securitySolutionPackages.features.featureRegistry.subFeatures.eventFilters": "Ereignisfilter",
"securitySolutionPackages.features.featureRegistry.subFeatures.eventFilters.description": "Filtern Sie Endpoint-Ereignisse heraus, die Sie nicht in Elasticsearch speichern müssen oder möchten.",
"securitySolutionPackages.features.featureRegistry.subFeatures.eventFilters.privilegesTooltip": "Für den Zugriff auf Ereignisfilter ist „Alle Bereiche“ erforderlich.",
"securitySolutionPackages.features.featureRegistry.subFeatures.executeOperations": "Operationen ausführen",
"securitySolutionPackages.features.featureRegistry.subFeatures.executeOperations.description": "Führen Sie Reaktionsmaßnahmen auf Skriptausführungen in der Antwortkonsole aus.",
"securitySolutionPackages.features.featureRegistry.subFeatures.executeOperations.privilegesTooltip": "Für den Zugriff auf „Operationen ausführen“ ist „Alle Bereiche“ erforderlich.",
"securitySolutionPackages.features.featureRegistry.subFeatures.fileOperations": "Dateioperationen",
"securitySolutionPackages.features.featureRegistry.subFeatures.fileOperations.description": "Führen Sie dateibezogene Reaktionsmaßnahmen in der Antwortkonsole aus.",
"securitySolutionPackages.features.featureRegistry.subFeatures.fileOperations.privilegesTooltip": "Für den Zugriff auf Dateivorgänge sind alle Spaces erforderlich.",
"securitySolutionPackages.features.featureRegistry.subFeatures.globalArtifactManagement": "Globale Artefaktverwaltung",
"securitySolutionPackages.features.featureRegistry.subFeatures.globalArtifactManagement.description": "Verwalten Sie die globale Zuweisung von Endpoint-Artefakten (z. B. Trusted Applications, Ereignisfilter) über alle Richtlinien hinweg. Diese Berechtigung steuert nur die globalen Zuweisungsrechte; für die vollständige Verwaltung der Artefakte sind Berechtigungen für jeden Artefakttyp erforderlich.",
"securitySolutionPackages.features.featureRegistry.subFeatures.hostIsolation": "Host-Isolierung",
"securitySolutionPackages.features.featureRegistry.subFeatures.hostIsolation.description": "Führen Sie die Reaktionsmaßnahmen „Isolieren“ und „Freigeben“ durch.",
"securitySolutionPackages.features.featureRegistry.subFeatures.hostIsolation.privilegesTooltip": "Für den Zugriff auf die Host-Isolierung sind alle Spaces erforderlich.",
"securitySolutionPackages.features.featureRegistry.subFeatures.hostIsolationExceptions": "Ausnahmen für die Host-Isolation",
"securitySolutionPackages.features.featureRegistry.subFeatures.hostIsolationExceptions.description": "Fügen Sie spezifische IP-Adressen hinzu, mit denen isolierte Hosts weiterhin kommunizieren dürfen, selbst wenn sie vom Rest des Netzwerks isoliert sind.",
"securitySolutionPackages.features.featureRegistry.subFeatures.hostIsolationExceptions.privilegesTooltip": "Für den Zugriff auf Ausnahmen für die Host-Isolation ist „Alle Bereiche“ erforderlich.",
"securitySolutionPackages.features.featureRegistry.subFeatures.policyManagement": "Elastic Defend-Richtlinienverwaltung",
"securitySolutionPackages.features.featureRegistry.subFeatures.policyManagement.description": "Greifen Sie auf die Elastic Defend-Integrationsrichtlinie zu, um Schutzmaßnahmen, Ereigniserfassung und erweiterte Elastic Features zu konfigurieren.",
"securitySolutionPackages.features.featureRegistry.subFeatures.policyManagement.privilegesTooltip": "Für den Zugriff auf die Richtlinienverwaltung ist „Alle Bereiche“ erforderlich.",
"securitySolutionPackages.features.featureRegistry.subFeatures.processOperations": "Prozessabläufe",
"securitySolutionPackages.features.featureRegistry.subFeatures.processOperations.description": "Führen Sie prozessbezogene Reaktionsmaßnahmen in der Reaktionkonsole durch.",
"securitySolutionPackages.features.featureRegistry.subFeatures.processOperations.privilegesTooltip": "Für den Zugriff auf Prozessvorgänge sind alle Bereiche erforderlich.",
"securitySolutionPackages.features.featureRegistry.subFeatures.readPrivilegeName": "Lesen",
"securitySolutionPackages.features.featureRegistry.subFeatures.responseActionsHistory": "Verlauf der Reaktionsmaßnahmen",
"securitySolutionPackages.features.featureRegistry.subFeatures.responseActionsHistory.description": "Greifen Sie auf den Verlauf der Reaktionsmaßnahmen zu, die auf Endpoints durchgeführt wurden.",
"securitySolutionPackages.features.featureRegistry.subFeatures.responseActionsHistory.privilegesTooltip": "Alle Spaces sind für den Zugriff auf den Verlauf der Reaktionsaktionen erforderlich.",
"securitySolutionPackages.features.featureRegistry.subFeatures.scanOperations": "Scanvorgänge",
"securitySolutionPackages.features.featureRegistry.subFeatures.scanOperations.description": "Führen Sie Bekämpfungsmaßnahmen für Ordnerscans in der Antwortkonsole aus.",
"securitySolutionPackages.features.featureRegistry.subFeatures.scanOperations.privilegesTooltip": "Für den Zugriff auf Scan-Vorgänge ist „Alle Spaces“ erforderlich.",
"securitySolutionPackages.features.featureRegistry.subFeatures.trustedApplications": "Vertrauenswürdige Anwendungen",
"securitySolutionPackages.features.featureRegistry.subFeatures.trustedApplications.description": "Hilft, Konflikte mit anderer Software zu mildern, normalerweise mit anderen Antiviren- oder Endpoint-Sicherheitsanwendungen.",
"securitySolutionPackages.features.featureRegistry.subFeatures.trustedApplications.privilegesTooltip": "Für den Zugriff auf vertrauenswürdige Anwendungen ist „Alle Bereiche“ erforderlich.",
"securitySolutionPackages.features.featureRegistry.subFeatures.workflowInsights": "Automatische Problembehebung",
"securitySolutionPackages.features.featureRegistry.subFeatures.workflowInsights.description": "Zugriff auf die automatische Problembehebung.",
"securitySolutionPackages.features.featureRegistry.subFeatures.workflowInsights.privilegesTooltip": "Für den Zugriff auf die automatische Fehlerbehebung ist „Alle Bereiche“ erforderlich.",
"securitySolutionPackages.markdown.insight.upsell": "Führen Sie ein Upgrade auf {requiredLicense} durch, um Einblicke in Untersuchungsleitfäden zu erhalten",
"securitySolutionPackages.markdown.investigationGuideInteractions.upsell": "Aktualisieren Sie auf {requiredLicense}, um die Interaktionen des Untersuchungsleitfadens nutzen zu können.",
"securitySolutionPackages.navigation.landingLinks": "Security-Ansichten",
Expand Down Expand Up @@ -35107,7 +35093,6 @@
"xpack.securitySolution.detectionEngine.rules.allRules.actions.editRuleSettingsDescription": "Regel-Einstellungen bearbeiten",
"xpack.securitySolution.detectionEngine.rules.allRules.actions.exportRuleDescription": "Regel exportieren",
"xpack.securitySolution.detectionEngine.rules.allRules.actions.lackOfKibanaActionsFeaturePrivileges": "Sie verfügen nicht über Kibana Actions-Berechtigungen",
"xpack.securitySolution.detectionEngine.rules.allRules.actions.lackOfKibanaSecurityPrivileges": "Sie haben keine Berechtigungen für Kibana Security",
"xpack.securitySolution.detectionEngine.rules.allRules.actions.manualRuleRunDescription": "Manuelle Ausführung",
"xpack.securitySolution.detectionEngine.rules.allRules.actions.manualRuleRunTooltip": "Manuelles Ausführen nur für aktivierte Regeln verfügbar",
"xpack.securitySolution.detectionEngine.rules.allRules.batchActionsTitle": "Massenaktionen",
Expand Down Expand Up @@ -38524,7 +38509,6 @@
"xpack.securitySolution.siemMigrations.rulesService.polling.successLinkText": "Zu den übersetzten Regeln",
"xpack.securitySolution.siemMigrations.rulesService.polling.successTitle": "Regelübersetzung abgeschlossen.",
"xpack.securitySolution.siemMigrations.service.capabilities.connectorsRead": "Management > Aktionen und Konnektoren: Lesen",
"xpack.securitySolution.siemMigrations.service.capabilities.securityAll": "Security > Security: Alle",
"xpack.securitySolution.siemMigrations.service.capabilities.siemMigrationsAll": "Security > SIEM-Migrationen: Alle",
"xpack.securitySolution.socTrends.properties.lockDatePickerDescription": "Globale Datumsauswahl bei der SOC Trends-Datumsauswahl sperren",
"xpack.securitySolution.socTrends.properties.lockDatePickerTooltip": "Synchronisierung des Datums-/Zeitbereichs zwischen der aktuell angezeigten Seite und SOC-Trends deaktivieren",
Expand Down
Loading