Skip to content

Commit a24ac14

Browse files
Fix conflict?
1 parent e968f26 commit a24ac14

File tree

5 files changed

+12
-8
lines changed

5 files changed

+12
-8
lines changed

solutions/security/investigate/manage-integration.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,10 @@ mapped_pages:
33
- https://www.elastic.co/guide/en/kibana/current/manage-osquery-integration.html
44

55
navigation_title: "Osquery manager integration"
6+
7+
applies_to:
8+
stack: preview all
9+
serverless: preview all
610
---
711

812
# Manage the integration [manage-osquery-integration]
@@ -28,7 +32,7 @@ Depending on your [subscription level](https://www.elastic.co/subscriptions), yo
2832

2933
## Customize Osquery configuration [osquery-custom-config]
3034

31-
[preview] By default, all Osquery Manager integrations share the same Osquery configuration. However, you can customize how Osquery is configured by editing the Osquery Manager integration for each agent policy you want to adjust. The custom configuration is then applied to all agents in the policy. This powerful feature allows you to configure [File Integrity Monitoring](https://osquery.readthedocs.io/en/stable/deployment/file-integrity-monitoring), [Process auditing](https://osquery.readthedocs.io/en/stable/deployment/process-auditing), and [others](https://osquery.readthedocs.io/en/stable/deployment/configuration/#configuration-specification).
35+
By default, all Osquery Manager integrations share the same Osquery configuration. However, you can customize how Osquery is configured by editing the Osquery Manager integration for each agent policy you want to adjust. The custom configuration is then applied to all agents in the policy. This powerful feature allows you to configure [File Integrity Monitoring](https://osquery.readthedocs.io/en/stable/deployment/file-integrity-monitoring), [Process auditing](https://osquery.readthedocs.io/en/stable/deployment/process-auditing), and [others](https://osquery.readthedocs.io/en/stable/deployment/configuration/#configuration-specification).
3236

3337
::::{important}
3438
* Take caution when editing this configuration. The changes you make are distributed to all agents in the policy.
@@ -105,6 +109,6 @@ To get more details in the logs, change the agent logging level to debug:
105109

106110
1. Go to **{{fleet}}** using the navigation menu or the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md).
107111
2. Select the agent that you want to debug.
108-
3. On the **Logs** tab, change the ***Agent logging level*** to ***debug***, and then click ***Apply changes**.
112+
3. On the **Logs** tab, change the **Agent logging level** to **debug**, and then click **Apply changes**.
109113

110114
`agent.logging.level` is updated in `fleet.yml`, and the logging level is changed to `debug`.

solutions/security/investigate/run-osquery-from-alerts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Run live queries on hosts associated with alerts to learn more about your infras
1111
::::{admonition} Requirements
1212
* The [Osquery manager integration](/solutions/security/investigate/manage-integration.md) must be installed.
1313
* {{agent}}'s [status](asciidocalypse://docs/docs-content/docs/reference/ingestion-tools/fleet/monitor-elastic-agent.md) must be `Healthy`. Refer to [{{fleet}} Troubleshooting](/troubleshoot/ingest/fleet/common-problems.md) if it isn’t.
14-
* Your role must have the appropriate [feature privileges](osquery#required_osquery-privileges) in {{stack}} or [user role](/deploy-manage/users-roles/cloud-organization/user-roles.md) in {{serverless-short}}.
14+
* Your role must have the appropriate [feature privileges](/solutions/security/investigate/osquery#required_osquery-privileges) in {{stack}} or [user role](/deploy-manage/users-roles/cloud-organization/user-roles.md) in {{serverless-short}}.
1515

1616
::::
1717

@@ -51,7 +51,7 @@ To run Osquery from an alert:
5151

5252

5353
:::{image} ../../../images/security-setup-query.png
54-
:alt: Shows how to set up a single queryy
54+
:alt: Shows how to set up a single query
5555
:class: screenshot
5656
:::
5757

solutions/security/investigate/session-view.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ mapped_urls:
99
Session View is an investigation tool that allows you to examine Linux process data organized in a tree-like structure according to the Linux logical event model, with processes organized by parentage and time of execution. It displays events in a highly readable format that is inspired by the terminal. This makes it a powerful tool for monitoring and investigating session activity on your Linux infrastructure and understanding user and service behavior.
1010

1111
::::{admonition} Requirements
12-
* In {{stack}}, Session View requires an [Enterprise subscription](https://www.elastic.co/pricing).
12+
Ensure you have the appropriate [{{stack}}](https://www.elastic.co/pricing) subscription or [{{serverless-short}} project tier](../../../deploy-manage/deploy/elastic-cloud/project-settings.md).
1313

1414
::::
1515

solutions/security/investigate/timeline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ To add a field from the sidebar, hover over it, and click the **Add field as a c
8787

8888
## Use the Timeline query builder [narrow-expand]
8989

90-
Expand the query builder by clicking the query builder button (![Qery builder button](../../../images/security-query-builder-button.png "title =20x20")) to the right of the KQL query bar. Drop in fields to build a query that filters Timeline results. The fields' relative placement specifies their logical relationships: horizontally adjacent filters use `AND`, while vertically adjacent filters use `OR`.
90+
Expand the query builder by clicking the query builder button (![Query builder button](../../../images/security-query-builder-button.png "title =20x20")) to the right of the KQL query bar. Drop in fields to build a query that filters Timeline results. The fields' relative placement specifies their logical relationships: horizontally adjacent filters use `AND`, while vertically adjacent filters use `OR`.
9191

9292
::::{tip}
9393
Collapse the query builder and provide more space for Timeline results by clicking the query builder button (![Query builder button](../../../images/security-query-builder-button.png "title =20x20")).

solutions/security/investigate/visual-event-analyzer.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ mapped_urls:
99
{{elastic-sec}} allows any event detected by {{elastic-endpoint}} to be analyzed using a process-based visual analyzer, which shows a graphical timeline of processes that led up to the alert and the events that occurred immediately after. Examining events in the visual event analyzer is useful to determine the origin of potentially malicious activity and other areas in your environment that may be compromised. It also enables security analysts to drill down into all related hosts, processes, and other events to aid in their investigations.
1010

1111
::::{tip}
12-
If you’re on {{stack}} and experiencing performance degradation, you can [exclude cold and frozen tier data](/solutions/security/get-started/configure-advanced-settings.md#exclude-cold-frozen-tiers) from analyzer queries.
12+
If you’re experiencing performance degradation, you can [exclude cold and frozen tier data](/solutions/security/get-started/configure-advanced-settings.md#exclude-cold-frozen-tiers) from analyzer queries. This setting is only available for the {{stack}}.
1313
::::
1414

1515

@@ -167,8 +167,8 @@ When you select an `event.category` pill, all the events within that category ar
167167
:::
168168

169169
::::{note}
170+
- You must have the appropriate [{{stack}}](https://www.elastic.co/pricing) subscription or [{{serverless-short}} project tier](../../../deploy-manage/deploy/elastic-cloud/project-settings.md) to examine alerts associated with events.
170171
- There is no limit to the number of events that can be associated with a process.
171-
- In {{stack}}, you need a [Platinum or Enterprise subscription](https://www.elastic.co/pricing) to examine alerts associated with events.
172172
::::
173173

174174

0 commit comments

Comments
 (0)