Skip to content

Commit a43e3cb

Browse files
edits
1 parent fe84171 commit a43e3cb

File tree

1 file changed

+9
-7
lines changed

1 file changed

+9
-7
lines changed

solutions/security/advanced-entity-analytics/entity-risk-scoring-requirements.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,18 +6,19 @@ mapped_urls:
66

77
# Entity risk scoring requirements
88

9-
To use entity risk scoring, asset criticality, and entity store in {{stack}}, your role must have certain cluster, index, and {{kib}} privileges. In serverless, you need the appropriate user roles or a custom role with the right privileges.
9+
This page covers the requirements and guidelines for using the entity risk scoring, asset criticality, and entity store features, as well as their known limitations.
1010

11-
In {{stack}}, these features require a [Platinum subscription](https://www.elastic.co/pricing) or higher. In serverless, they require the Security Analytics Complete [project feature](deploy-manage/deploy/elastic-cloud/project-settings.md).
11+
To use these features in {{stack}}, your role must have certain cluster, index, and {{kib}} privileges. In serverless, you need the appropriate user roles or a custom role with the right privileges.
1212

13-
This page covers the requirements and guidelines for using the entity risk scoring, asset criticality, and entity store features, as well as their known limitations.
13+
In {{stack}}, these features require a [Platinum subscription](https://www.elastic.co/pricing) or higher. In serverless, they require the Security Analytics Complete [project feature](/deploy-manage/deploy/elastic-cloud/project-settings.md).
1414

1515

1616
## Entity risk scoring [_entity_risk_scoring]
1717

18-
In {{stack}}, to turn on the risk scoring engine, you need the appropriate [privileges](#_privileges).
18+
To turn on the risk scoring engine, you need the following:
1919

20-
In serverless, to turn on the risk scoring engine, you need either the appropriate [predefined Security user role](#ers_roles) or a [custom role](/deploy-manage/users-roles/cloud-organization/user-roles.md) with the right [privileges](#_privileges).
20+
* In {{stack}}, you need the appropriate [privileges](#_privileges).
21+
* In serverless, you need either the appropriate [predefined Security user role](#ers_roles) or a [custom role](/deploy-manage/users-roles/cloud-organization/user-roles.md) with the right [privileges](#_privileges).
2122

2223

2324
### Privileges [_privileges]
@@ -52,9 +53,10 @@ Follow these guidelines to ensure clusters have adequate memory to handle data v
5253
5354
## Asset criticality [_asset_criticality]
5455
55-
In {{stack}}, to use asset criticality, you need the appropriate [privileges](#_privileges_2) for the `.asset-criticality.asset-criticality-<space-id>` index.
56+
To use asset criticality, you need the following:
5657
57-
In serverless, to use asset criticality, you need you need either the appropriate [predefined Security user role](#ac_roles) or a [custom role](/deploy-manage/users-roles/cloud-organization/user-roles.md) with the right [privileges](#_privileges_2).
58+
* In {{stack}}, you need the appropriate [privileges](#_privileges_2) for the `.asset-criticality.asset-criticality-<space-id>` index.
59+
* In serverless, you need either the appropriate [predefined Security user role](#ac_roles) or a [custom role](/deploy-manage/users-roles/cloud-organization/user-roles.md) with the right [privileges](#_privileges_2) for the `.asset-criticality.asset-criticality-<space-id>` index.
5860

5961
### Privileges [_privileges_2]
6062

0 commit comments

Comments
 (0)