Skip to content

Commit 11156d7

Browse files
Merge branch 'main' into clean-detections-and-alert-page
2 parents 9075db1 + 195a112 commit 11156d7

File tree

5 files changed

+15
-44
lines changed

5 files changed

+15
-44
lines changed
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Refer to [{{stack}} third-party dependencies](https://artifacts.elastic.co/reports/dependencies/dependencies-current.html) for the complete list of dependencies.

deploy-manage/deploy/self-managed/install-kibana.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,4 +52,9 @@ Running different patch version releases of {{kib}} and {{es}} (e.g. {{kib}} 9.0
5252
## Installation order
5353

5454
:::{include} /deploy-manage/deploy/_snippets/installation-order.md
55-
:::
55+
:::
56+
57+
## Third-party dependencies
58+
59+
:::{include} /deploy-manage/deploy/self-managed/_snippets/third-party-dependencies.md
60+
:::

deploy-manage/deploy/self-managed/installing-elasticsearch.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,4 +104,5 @@ Don’t use third-party Java agents that attach to the JVM. These agents can red
104104

105105
## Third-party dependencies [dependencies-versions]
106106

107-
See [Elastic Stack third-party dependencies](https://artifacts.elastic.co/reports/dependencies/dependencies-current.html) for the complete list of dependencies for {{es}}.
107+
:::{include} /deploy-manage/deploy/self-managed/_snippets/third-party-dependencies.md
108+
:::

reference/ingestion-tools/fleet/upgrade-elastic-agent.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -226,13 +226,13 @@ For installation steps refer to [Install {{fleet}}-managed {{agent}}s](/referenc
226226
1. Download the {{agent}} Debian install package for the release that you want to upgrade to:
227227

228228
```bash
229-
curl -L -O https://artifacts.elastic.co/downloads/beats/elastic-agent/elastic-agent-9.0.0-beta1-amd64.deb
229+
curl -L -O https://artifacts.elastic.co/downloads/beats/elastic-agent/elastic-agent-{{stack-version}}-amd64.deb
230230
```
231231

232232
2. Upgrade {{agent}} to the target release:
233233

234234
```bash
235-
sudo dpkg -i elastic-agent-9.0.0-beta1-amd64.deb
235+
sudo dpkg -i elastic-agent-{{stack-version}}-amd64.deb
236236
```
237237

238238
3. Confirm in {{fleet}} that the agent has been upgraded to the target version. Note that the **Upgrade agent** option in the **Actions** menu next to the agent will be disabled since [fleet]-managed upgrades are not supported for this package type.
@@ -243,13 +243,13 @@ For installation steps refer to [Install {{fleet}}-managed {{agent}}s](/referenc
243243
1. Download the {{agent}} RPM install package for the release that you want to upgrade to:
244244

245245
```bash
246-
curl -L -O https://artifacts.elastic.co/downloads/beats/elastic-agent/elastic-agent-9.0.0-beta1-x86_64.rpm
246+
curl -L -O https://artifacts.elastic.co/downloads/beats/elastic-agent/elastic-agent-{{stack-version}}-x86_64.rpm
247247
```
248248

249249
2. Upgrade {{agent}} to the target release:
250250

251251
```bash
252-
sudo rpm -U elastic-agent-9.0.0-beta1-x86_64.rpm
252+
sudo rpm -U elastic-agent-{{stack-version}}-x86_64.rpm
253253
```
254254

255-
3. Confirm in {{fleet}} that the agent has been upgraded to the target version. Note that the **Upgrade agent** option in the **Actions** menu next to the agent will be disabled since [fleet]-managed upgrades are not supported for this package type.
255+
3. Confirm in {{fleet}} that the agent has been upgraded to the target version. Note that the **Upgrade agent** option in the **Actions** menu next to the agent will be disabled since {{fleet}}-managed upgrades are not supported for this package type.

solutions/security/detect-and-alert.md

Lines changed: 1 addition & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -76,43 +76,7 @@ In addition, the following support restrictions are in place:
7676

7777
[Detections requirements](/solutions/security/detect-and-alert/detections-requirements.md) provides detailed information on all the permissions required to initiate and use the Detections feature.
7878

79-
80-
## Malware prevention [malware-prevention]
81-
82-
Malware, short for malicious software, is any software program designed to damage or execute unauthorized actions on a computer system. Examples of malware include viruses, worms, Trojan horses, adware, scareware, and spyware. Some malware, such as viruses, can severely damage a computer’s hard drive by deleting files or directory information. Other malware, such as spyware, can obtain user data without their knowledge.
83-
84-
Malware may be stealthy and appear as legitimate executable code, scripts, active content, and other software. It is also often embedded in non-malicious files, non-suspicious websites, and standard programs — sometimes making the root source difficult to identify. If infected and not resolved promptly, malware can cause irreparable damage to a computer network.
85-
86-
For information on how to enable malware protection on your host, see [Malware Protection](/solutions/security/configure-elastic-defend/configure-an-integration-policy-for-elastic-defend.md#malware-protection).
87-
88-
89-
### Machine learning model [machine-learning-model]
90-
91-
To determine if a file is malicious or benign, a machine learning model looks for static attributes of files (without executing the file) that include file structure, layout, and content. This includes information such as file header data, imports, exports, section names, and file size. These attributes are extracted from millions of benign and malicious file samples, which then are passed to a machine-learning algorithm that distinguishes a benign file from a malicious one. The machine learning model is updated as new data is procured and analyzed.
92-
93-
94-
### Threshold [_threshold]
95-
96-
A malware threshold determines the action the agent should take if malware is detected. The Elastic Agent uses a recommended threshold level that generates a balanced number of alerts with a low probability of undetected malware. This threshold also minimizes the number of false positive alerts.
97-
98-
99-
## Ransomware prevention [ransomware-prevention]
100-
101-
Ransomware is computer malware that installs discreetly on a user’s computer and encrypts data until a specified amount of money (ransom) is paid. Ransomware is usually similar to other malware in its delivery and execution, infecting systems through spear-phishing or drive-by downloads. If not resolved immediately, ransomware can cause irreparable damage to an entire computer network.
102-
103-
Behavioral ransomware prevention on the Elastic Endpoint detects and stops ransomware attacks on Windows systems by analyzing data from low-level system processes, and is effective across an array of widespread ransomware families — including those targeting the system’s master boot record.
104-
105-
For information on how to enable ransomware protection on your host, see [Ransomware protection](/solutions/security/configure-elastic-defend/configure-an-integration-policy-for-elastic-defend.md#ransomware-protection).
106-
107-
% Check on this note
108-
109-
::::{note}
110-
Ransomware prevention is a paid feature and is enabled by default if you have a [Platinum or Enterprise license](https://www.elastic.co/pricing).
111-
::::
112-
113-
114-
115-
### Resolve UI error messages [_resolve_ui_error_messages]
79+
## Resolve UI error messages [_resolve_ui_error_messages]
11680

11781
Depending on your privileges and whether detection system indices have already been created for the {{kib}} space, you might get one of these error messages when you open the **Alerts** or **Rules** page:
11882

0 commit comments

Comments
 (0)