You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To use entity risk scoring, asset criticality, and entity store, your role must have certain cluster, index, and {{kib}} privileges. These features require a [Platinum subscription](https://www.elastic.co/pricing) or higher.
17
10
18
11
This page covers the requirements and guidelines for using the entity risk scoring, asset criticality, and entity store features, as well as their known limitations.
19
12
20
13
21
14
## Entity risk scoring [_entity_risk_scoring]
22
15
16
+
In {{stack}}, to turn on the risk scoring engine, you need the appropriate [privileges](#_privileges).
23
17
24
-
### Privileges [_privileges]
18
+
In serverless, to turn on the risk scoring engine, you need either the appropriate [predefined Security user role](#ers_roles) or a [custom role](/deploy-manage/users-roles/cloud-organization/user-roles.md) with the right [privileges](#_privileges).
25
19
26
-
To turn on the risk scoring engine, you need the following privileges:
20
+
21
+
### Privileges [_privileges]
27
22
28
23
| Cluster | Index | {{kib}} |
29
24
| --- | --- | --- |
30
-
| * `manage_index_templates`<br>*`manage_transform`<br> |`all` privilege for `risk-score.risk-score-*`|**Read** for the **Security** feature |
25
+
| - `manage_index_templates`<br>- `manage_transform`<br> |`all` privilege for `risk-score.risk-score-*`|**Read** for the **Security** feature |
Follow these guidelines to ensure clusters have adequate memory to handle data volume:
36
40
@@ -40,30 +44,42 @@ Follow these guidelines to ensure clusters have adequate memory to handle data v
40
44
41
45
### Known limitations [_known_limitations]
42
46
43
-
The risk scoring engine uses an internal user role to score all hosts and users, and doesn’t respect privileges applied to custom users or roles. After you turn on the risk scoring engine for a {{kib}} space, all alerts in the space will contribute to host and user risk scores.
47
+
* The risk scoring engine uses an internal user role to score all hosts and users, and doesn’t respect privileges applied to custom users or roles. After you turn on the risk scoring engine for a {{kib}} space, all alerts in the space will contribute to host and user risk scores.
48
+
* You cannot customize alert data views or risk weights associated with alerts and asset criticality levels.
44
49
45
50
46
51
## Asset criticality [_asset_criticality]
47
52
53
+
In {{stack}}, to use asset criticality, you need the appropriate [privileges](#_privileges_2) for the `.asset-criticality.asset-criticality-<space-id>` index.
54
+
55
+
In serverless, to use asset criticality, you need you need either the appropriate [predefined Security user role](#ac_roles) or a [custom role](/deploy-manage/users-roles/cloud-organization/user-roles.md) with the right [privileges](#_privileges_2).
48
56
49
57
### Privileges [_privileges_2]
50
58
51
-
To use asset criticality, you need the following privileges for the `.asset-criticality.asset-criticality-<space-id>` index:
52
59
53
60
| Action | Index privilege |
54
61
| --- | --- |
55
62
| View asset criticality | `read` |
56
63
| View, assign, or change asset criticality | `read` and `write` |
To use the entity store, you need the following privileges:
79
+
To enable the entity store, you need the following privileges:
66
80
67
81
| Cluster | Index | {{kib}} |
68
82
| --- | --- | --- |
69
-
| * `manage_enrich`<br>*`manage_index_templates`<br>*`manage_ingest_pipelines`<br>*`manage_transform`<br> | * `read` and `view_index_metadata` for `.asset-criticality.asset-criticality-*`<br>*`read` and `manage` for `risk-score.risk-score-*`<br>*`read` and `manage` for `.entities.v1.latest.*`<br>*`read` and `view_index_metadata` for all {{elastic-sec}} indices<br> |**All** for the **Security** and **Saved Objects Management** features |
83
+
| - `manage_enrich`<br>- `manage_index_templates`<br>- `manage_ingest_pipelines`<br>- `manage_transform`<br> | - `read` and `view_index_metadata` for `.asset-criticality.asset-criticality-*`<br>- `read` and `manage` for `risk-score.risk-score-*`<br>- `read` and `manage` for `.entities.v1.latest.*`<br>- `read` and `view_index_metadata` for all {{elastic-sec}} indices<br> | **All** for the **Security** and **Saved Objects Management** features |
84
+
85
+
% pending info about user roles / custom role privileges needed for entity store in serverless
0 commit comments