- Elastic Cloud Serverless
- Elasticsearch
- Elastic Observability
- Get started
- Observability overview
- Elastic Observability Serverless billing dimensions
- Create an Observability project
- Quickstart: Monitor hosts with Elastic Agent
- Quickstart: Monitor your Kubernetes cluster with Elastic Agent
- Quickstart: Monitor hosts with OpenTelemetry
- Quickstart: Unified Kubernetes Observability with Elastic Distributions of OpenTelemetry (EDOT)
- Quickstart: Collect data with AWS Firehose
- Get started with dashboards
- Applications and services
- Application performance monitoring (APM)
- Get started with traces and APM
- Learn about data types
- Collect application data
- View and analyze data
- Act on data
- Use APM securely
- Reduce storage
- Managed intake service event API
- Troubleshooting
- Synthetic monitoring
- Get started
- Scripting browser monitors
- Configure lightweight monitors
- Manage monitors
- Work with params and secrets
- Analyze monitor data
- Monitor resources on private networks
- Use the CLI
- Configure a Synthetics project
- Multifactor Authentication for browser monitors
- Configure Synthetics settings
- Grant users access to secured resources
- Manage data retention
- Scale and architect a deployment
- Synthetics Encryption and Security
- Troubleshooting
- Application performance monitoring (APM)
- Infrastructure and hosts
- Logs
- Inventory
- Incident management
- Data set quality
- Observability AI Assistant
- Machine learning
- Reference
- Get started
- Elastic Security
- Elastic Security overview
- Security billing dimensions
- Create a Security project
- Elastic Security requirements
- Elastic Security UI
- AI for Security
- Ingest data
- Configure endpoint protection with Elastic Defend
- Manage Elastic Defend
- Endpoints
- Policies
- Trusted applications
- Event filters
- Host isolation exceptions
- Blocklist
- Optimize Elastic Defend
- Event capture and Elastic Defend
- Endpoint protection rules
- Identify antivirus software on your hosts
- Allowlist Elastic Endpoint in third-party antivirus apps
- Elastic Endpoint self-protection features
- Elastic Endpoint command reference
- Endpoint response actions
- Cloud Security
- Explore your data
- Dashboards
- Detection engine overview
- Rules
- Alerts
- Advanced Entity Analytics
- Investigation tools
- Asset management
- Manage settings
- Troubleshooting
- Manage your project
- Changelog
Visualize detection alerts
editVisualize detection alerts
editVisualize and group detection alerts by specific parameters in the visualization section of the Alerts page.

Use the left buttons to select a view type (Summary, Trend, Counts, or Treemap), and use the right menus to select the ECS fields to use for grouping:
- Top alerts by or Group by: Primary field for grouping alerts.
- Group by top (if available): Secondary field for further subdividing grouped alerts.
For example, you can group first by rule name (Group by: kibana.alert.rule.name
), then by host name (Group by top: host.name
) to visualize which detection rules generated alerts, and which hosts triggered each of those rules. For groupings with a lot of unique values, the top 1,000 results are displayed.
Some view types don’t have the Group by top option. You can also leave Group by top blank to group by only the primary field in Group by.
To reset a view to default settings, hover over it and click the options menu () that appears, then select Reset group by fields.
The options menu also lets you inspect the visualization’s queries. For the trend and counts views, you can add the visualization to a new or existing case, or open it in Lens.
Click the collapse icon () to minimize the visualization section and display a summary of key information instead.

Summary
editOn the Alerts page, the summary visualization displays by default and shows how alerts are distributed across these indicators:
- Severity levels: How many alerts are in each severity level.
- Alerts by name: How many alerts each detection rule created.
-
Top alerts by: Percentage of alerts with a specified field value:
host.name
(default),user.name
,source.ip
, ordestination.ip
.
You can hover and click on elements within the summary — such as severity levels, rule names, and host names — to add filters with those values to the Alerts page.

Trend
editThe trend view shows the occurrence of alerts over time. By default, it groups alerts by detection rule name (kibana.alert.rule.name
).
The Group by top menu is unavailable for the trend view.

Counts
editThe counts view shows the count of alerts in each group. By default, it groups alerts first by detection rule name (kibana.alert.rule.name
), then by host name (host.name
).

Treemap
editThe treemap view shows the distribution of alerts as nested, proportionally-sized tiles. This view can help you quickly pinpoint the most prevalent and critical alerts.

Larger tiles represent more frequent alerts, and each tile’s color is based on the alerts' risk score:
-
Green: Low risk (
0
-46
) -
Yellow: Medium risk (
47
-72
) -
Orange: High risk (
73
-98
) -
Red: Critical risk (
99
-100
)
By default, the treemap groups alerts first by detection rule name (kibana.alert.rule.name
), then by host name (host.name
). This shows which rules generated the most alerts, and which hosts were responsible.
Depending on the amount of alerts, some tiles and text might be very small. Hover over the treemap to display information in a tooltip.
You can click on the treemap to narrow down the alerts displayed in both the treemap and the alerts table below. Click the label above a group to display the alerts in that group, or click an individual tile to display the alerts related to that tile. This adds filters under the KQL search bar, which you can edit or remove to further customize the view.
