Skip to content

Commit 0a1162c

Browse files
Applies deployment info
1 parent 8261d2f commit 0a1162c

File tree

4 files changed

+5
-182
lines changed

4 files changed

+5
-182
lines changed

raw-migrated-files/docs-content/serverless/security-advanced-settings.md

Lines changed: 0 additions & 175 deletions
This file was deleted.

raw-migrated-files/toc.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -338,7 +338,6 @@ toc:
338338
- file: docs-content/serverless/quickstart-monitor-hosts-with-otel.md
339339
- file: docs-content/serverless/security-about-rules.md
340340
- file: docs-content/serverless/security-add-manage-notes.md
341-
- file: docs-content/serverless/security-advanced-settings.md
342341
- file: docs-content/serverless/security-agent-tamper-protection.md
343342
- file: docs-content/serverless/security-ai-assistant-esql-queries.md
344343
- file: docs-content/serverless/security-ai-assistant.md

solutions/security/get-started/configure-advanced-settings.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,9 +46,10 @@ The advanced settings determine:
4646
* Whether related integrations are displayed on the Rules page tables
4747
* The options provided in the alert tag menu
4848

49-
% The required privs are different for Serverless docs. See line 16 in the raw migrated Serverless file for more info. Also remember to annotate the Serverless and ESS content appropriately.
50-
51-
To change these settings, you need `All` privileges for the **Advanced Settings** [{{kib}} feature](/deploy-manage/users-roles/cluster-or-deployment-auth/kibana-privileges.md).
49+
::::{important}
50+
- To change these settings in the {{stack}}, you need `All` privileges for the **Advanced Settings** [{{kib}} feature](/deploy-manage/users-roles/cluster-or-deployment-auth/kibana-privileges.md).
51+
- To change these settings in {{serverless-short}}, you need either the appropriate [predefined Security user role](../../../deploy-manage/users-roles/cloud-organization/user-roles.md#general-assign-user-roles) or a [custom role](../../../deploy-manage/users-roles/cloud-organization/user-roles.md) with `All` privileges for the **Advanced Settings** feature.
52+
::::
5253

5354
::::{warning}
5455
Modifying advanced settings can affect Kibana performance and cause problems that are difficult to diagnose. Setting a property value to a blank field reverts to the default behavior, which might not be compatible with other configuration settings. Deleting a custom setting removes it from Kibana permanently.

solutions/security/get-started/data-views-elastic-security.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -49,10 +49,8 @@ The default {{data-source}} is defined by the `securitySolution:defaultIndex` se
4949

5050
The first time a user visits {{elastic-sec}} within a given {{kib}} [space](/deploy-manage/manage-spaces.md), the default {{data-source}} generates in that space and becomes active.
5151

52-
% Needs annotation to show that it's only applicable to ESS
53-
5452
::::{note}
55-
Your {{kib}} space must have **Data View Management** [feature visibility](/deploy-manage/manage-spaces.md#spaces-control-feature-visibility) setting enabled for the default {{data-source}} to generate and become active in your space.
53+
In {{stack}} your {{kib}} space must have **Data View Management** [feature visibility](/deploy-manage/manage-spaces.md#spaces-control-feature-visibility) setting enabled for the default {{data-source}} to generate and become active in your space.
5654
::::
5755

5856

0 commit comments

Comments
 (0)