Skip to content

Commit 79ab783

Browse files
Expands AI example workflows page (#1254)
9.0 component of #1178 Expands the AI workflows page. [Preview](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/1254/solutions/security/ai/use-cases) --------- Co-authored-by: Nastasha Solomon <[email protected]>
1 parent 21777be commit 79ab783

File tree

1 file changed

+7
-1
lines changed

1 file changed

+7
-1
lines changed

solutions/security/ai/use-cases.md

+7-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ applies_to:
88
security: all
99
---
1010

11-
# Example AI workflows
11+
# AI use cases
1212

1313
The guides in this section describe example workflows for AI Assistant and Attack discovery. Refer to them for examples of each tool’s individual capabilities and how they can work together.
1414

@@ -18,6 +18,12 @@ The guides in this section describe example workflows for AI Assistant and Attac
1818

1919
For general information, refer to [AI Assistant](/solutions/security/ai/ai-assistant.md) or [Attack discovery](/solutions/security/ai/attack-discovery.md).
2020

21+
## Other AI-powered tools
2122

23+
In addition to AI Assistant and Attack Discovery, {{elastic-sec}} provides several other AI-powered tools for specific use cases. These include:
24+
25+
* [Automatic Import](/solutions/security/get-started/automatic-import.md): Helps you quickly parse, ingest, and create [ECS mappings](https://www.elastic.co/elasticsearch/common-schema) for data from sources that don’t yet have prebuilt Elastic integrations. This can accelerate your migration to {{elastic-sec}}, and help you quickly add new data sources to an existing SIEM solution in {{elastic-sec}}.
26+
* [Automatic Migration](/solutions/security/get-started/automatic-migration.md): Helps you quickly convert SIEM rules from the Splunk Processing Language (SPL) to the Elasticsearch Query Language ({{esql}}). If comparable Elastic-authored rules exist, it simplifies onboarding by mapping your rules to them. Otherwise, it creates custom rules on the fly so you can verify and edit them instead of writing them from scratch.
27+
* [Automatic Troubleshooting](/solutions/security/manage-elastic-defend/identify-antivirus-software-on-hosts.md): Helps you quickly check whether your endpoints have third-party AV software installed by analyzing file event logs from your hosts to determine whether antivirus software is present. From there, you can address any incompatibilities to make sure your endpoints are protected.
2228

2329

0 commit comments

Comments
 (0)