Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[8.11]Findings page EUI updates #4084

Merged
merged 10 commits into from
Nov 2, 2023
9 changes: 9 additions & 0 deletions docs/cloud-native-security/cspm-findings.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,15 @@ You can filter findings data in two ways:
* *The KQL search bar*: For example, search for `result.evaluation : failed` to view all failed findings.
* *In-table value filters*: Hover over a finding to display available inline actions. Use the Filter In (plus) and Filter Out (minus) buttons.

[discrete]
[[cspm-customize-the-findings-table]]
=== Customize the Findings table
Use the toolbar buttons in the upper-left of the Findings table to customize the columns you want displayed:

* **Columns**: Select which columns to display.
* **_x_ fields sorted**: Sort the table by one or more columns.


[discrete]
[[cspm-findings-page-remediate-findings]]
== Remediate failed findings
Expand Down
4 changes: 2 additions & 2 deletions docs/cloud-native-security/cspm-get-started-gcp.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
[[cspm-overview-gcp]]
== Overview

This page explains how to get started monitoring the security posture of your cloud assets using the Cloud Security Posture Management (CSPM) feature.
This page explains how to get started monitoring the security posture of your GCP cloud assets using the Cloud Security Posture Management (CSPM) feature.

.Requirements
[sidebar]
Expand Down Expand Up @@ -36,7 +36,7 @@ To set up CSPM for GCP, first add the CSPM integration, then enable cloud accoun
[discrete]
[[cspm-set-up-cloud-access-section-gcp]]
=== Set up cloud account access
To setup CSPM for a GCP project, you will need to have admin privileges for the project.
To setup CSPM for a GCP project, you will need admin privileges for the project.

For most users, the simplest option is to use a Google Cloud Shell script to automatically provision the necessary resources and permissions in your GCP account. This method, as well as two manual options, are described below.

Expand Down
Binary file modified docs/cloud-native-security/images/cnvm-findings-grouped.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified docs/cloud-native-security/images/cnvm-findings-page.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified docs/cloud-native-security/images/findings-page.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
9 changes: 9 additions & 0 deletions docs/cloud-native-security/kspm-findings.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,15 @@ You can filter findings data in two ways:
* *The KQL search bar*: For example, search for `result.evaluation : failed` to view all failed findings.
* *In-table value filters*: Hover over a finding to display available inline actions. Use the Filter In (plus) and Filter Out (minus) buttons.

[discrete]
[[kspm-customize-the-findings-table]]
=== Customize the Findings table
Use the toolbar buttons in the upper-left of the Findings table to customize the columns you want displayed:

* **Columns**: Select which columns to display.
* **_x_ fields sorted**: Sort the table by one or more columns.


[discrete]
[[findings-page-remediate-findings]]
== Remediate failed findings
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -36,6 +36,14 @@ Click a vulnerability to open the vulnerability details flyout. This flyout incl

When you open the vulnerability details flyout, it defaults to the *Overview* tab, which highlights key information. To view every field present in the vulnerability document, select the *Table* or *JSON* tabs.

[discrete]
[[cnvm-customize-the-findings-table]]
=== Customize the Findings table
Use the toolbar buttons in the upper-left of the Findings table to customize the columns you want displayed:

* **Columns**: Select which columns to display.
* **_x_ fields sorted**: Sort the table by one or more columns.

[discrete]
[[vuln-findings-remediate]]
== Remediate vulnerabilities
Expand Down
2 changes: 1 addition & 1 deletion docs/getting-started/security-ui.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -118,7 +118,7 @@ image::detections/images/alert-page.png[]
[float]
=== Findings

Compare your Kubernetes infrastructure against a variety of security benchmarks. Refer to the <<findings-page>> to find out how to set this up.
Identify misconfigurations and vulnerabilities in your cloud infrastructure. For setup instructions, refer to <<cspm,Cloud Security Posture Management>>, <<kspm,Kubernetes Security Posture Management>>, or <<vuln-management-overview,Cloud Native Vulnerability Management>>.

[role="screenshot"]
image::cloud-native-security/images/findings-page.png[Findings page]
Expand Down