Skip to content

Commit

Permalink
[8.11]Findings page EUI updates (#4084) (#4176)
Browse files Browse the repository at this point in the history
* Updates the documentation and screenshots for the Findings page

New images and text for EUI update

* fixes broken IDs

* adds missing image border

* Minor updates

* Update docs/cloud-native-security/cspm-findings.asciidoc

* Update docs/cloud-native-security/kspm-findings.asciidoc

* Update docs/cloud-native-security/vuln-management-findings.asciidoc

(cherry picked from commit 03cbc61)

Co-authored-by: Benjamin Ironside Goldstein <[email protected]>
  • Loading branch information
mergify[bot] and benironside authored Nov 2, 2023
1 parent 06116ee commit 7f74415
Show file tree
Hide file tree
Showing 8 changed files with 29 additions and 3 deletions.
9 changes: 9 additions & 0 deletions docs/cloud-native-security/cspm-findings.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,15 @@ You can filter findings data in two ways:
* *The KQL search bar*: For example, search for `result.evaluation : failed` to view all failed findings.
* *In-table value filters*: Hover over a finding to display available inline actions. Use the Filter In (plus) and Filter Out (minus) buttons.

[discrete]
[[cspm-customize-the-findings-table]]
=== Customize the Findings table
Use the toolbar buttons in the upper-left of the Findings table to customize the columns you want displayed:

* **Columns**: Select which columns to display.
* **_x_ fields sorted**: Sort the table by one or more columns.


[discrete]
[[cspm-findings-page-remediate-findings]]
== Remediate failed findings
Expand Down
4 changes: 2 additions & 2 deletions docs/cloud-native-security/cspm-get-started-gcp.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
[[cspm-overview-gcp]]
== Overview

This page explains how to get started monitoring the security posture of your cloud assets using the Cloud Security Posture Management (CSPM) feature.
This page explains how to get started monitoring the security posture of your GCP cloud assets using the Cloud Security Posture Management (CSPM) feature.

.Requirements
[sidebar]
Expand Down Expand Up @@ -36,7 +36,7 @@ To set up CSPM for GCP, first add the CSPM integration, then enable cloud accoun
[discrete]
[[cspm-set-up-cloud-access-section-gcp]]
=== Set up cloud account access
To setup CSPM for a GCP project, you will need to have admin privileges for the project.
To setup CSPM for a GCP project, you will need admin privileges for the project.

For most users, the simplest option is to use a Google Cloud Shell script to automatically provision the necessary resources and permissions in your GCP account. This method, as well as two manual options, are described below.

Expand Down
Binary file modified docs/cloud-native-security/images/cnvm-findings-grouped.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified docs/cloud-native-security/images/cnvm-findings-page.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified docs/cloud-native-security/images/findings-page.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
9 changes: 9 additions & 0 deletions docs/cloud-native-security/kspm-findings.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,15 @@ You can filter findings data in two ways:
* *The KQL search bar*: For example, search for `result.evaluation : failed` to view all failed findings.
* *In-table value filters*: Hover over a finding to display available inline actions. Use the Filter In (plus) and Filter Out (minus) buttons.

[discrete]
[[kspm-customize-the-findings-table]]
=== Customize the Findings table
Use the toolbar buttons in the upper-left of the Findings table to customize the columns you want displayed:

* **Columns**: Select which columns to display.
* **_x_ fields sorted**: Sort the table by one or more columns.


[discrete]
[[findings-page-remediate-findings]]
== Remediate failed findings
Expand Down
8 changes: 8 additions & 0 deletions docs/cloud-native-security/vuln-management-findings.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -36,6 +36,14 @@ Click a vulnerability to open the vulnerability details flyout. This flyout incl

When you open the vulnerability details flyout, it defaults to the *Overview* tab, which highlights key information. To view every field present in the vulnerability document, select the *Table* or *JSON* tabs.

[discrete]
[[cnvm-customize-the-findings-table]]
=== Customize the Findings table
Use the toolbar buttons in the upper-left of the Findings table to customize the columns you want displayed:

* **Columns**: Select which columns to display.
* **_x_ fields sorted**: Sort the table by one or more columns.

[discrete]
[[vuln-findings-remediate]]
== Remediate vulnerabilities
Expand Down
2 changes: 1 addition & 1 deletion docs/getting-started/security-ui.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -118,7 +118,7 @@ image::detections/images/alert-page.png[]
[float]
=== Findings

Compare your Kubernetes infrastructure against a variety of security benchmarks. Refer to the <<findings-page>> to find out how to set this up.
Identify misconfigurations and vulnerabilities in your cloud infrastructure. For setup instructions, refer to <<cspm,Cloud Security Posture Management>>, <<kspm,Kubernetes Security Posture Management>>, or <<vuln-management-overview,Cloud Native Vulnerability Management>>.

[role="screenshot"]
image::cloud-native-security/images/findings-page.png[Findings page]
Expand Down

0 comments on commit 7f74415

Please sign in to comment.