AI use cases
Elastic Stack Serverless Security
The guides in this section describe example workflows for AI Assistant and Attack discovery. Refer to them for examples of each tool’s individual capabilities and how they can work together.
- Triage alerts
- Identify, investigate, and document threats
- Generate, customize, and learn about ES|QL queries
For general information, refer to AI Assistant or Attack discovery.
In addition to AI Assistant and Attack Discovery, Elastic Security provides several other AI-powered tools for specific use cases. These include:
- Automatic Import: Helps you quickly parse, ingest, and create ECS mappings for data from sources that don’t yet have prebuilt Elastic integrations. This can accelerate your migration to Elastic Security, and help you quickly add new data sources to an existing SIEM solution in Elastic Security.
- Automatic Migration: Helps you quickly convert SIEM rules from the Splunk Processing Language (SPL) to the Elasticsearch Query Language (ES|QL). If comparable Elastic-authored rules exist, it simplifies onboarding by mapping your rules to them. Otherwise, it creates custom rules on the fly so you can verify and edit them instead of writing them from scratch.
- Automatic Troubleshooting: Helps you quickly check whether your endpoints have third-party AV software installed by analyzing file event logs from your hosts to determine whether antivirus software is present. From there, you can address any incompatibilities to make sure your endpoints are protected.