Skip to content

Commit c405fdf

Browse files
authored
Merge branch 'main' into typo-stack-monitoring
2 parents d2a2268 + 5de52fe commit c405fdf

File tree

5 files changed

+12
-4
lines changed

5 files changed

+12
-4
lines changed

solutions/observability/streams/management/extract.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Streams supports the following processors:
2626

2727
- [**Date**](./extract/date.md): Converts date strings into timestamps, with options for timezone, locale, and output formatting.
2828
- [**Dissect**](./extract/dissect.md): Extracts fields from structured log messages using defined delimiters instead of patterns, making it faster than Grok and ideal for consistently formatted logs.
29-
- [**Grok**](./extract/grok.md): Extracts fields from unstructured log messages using predefined or custom patterns, supports multiple match attempts in sequence, and can automatically generate patterns with an LLM connector.
29+
- [**Grok**](./extract/grok.md): Extracts fields from unstructured log messages using predefined or custom patterns, supports multiple match attempts in sequence, and can automatically generate patterns with an [LLM connector](../../../security/ai/set-up-connectors-for-large-language-models-llm.md).
3030
- [**Set**](./extract/set.md): Assigns a specific value to a field, creating the field if it doesn’t exist or overwriting its value if it does.
3131
- [**Rename**](./extract/rename.md): Changes the name of a field, moving its value to a new field name and removing the original.
3232
- [**Append**](./extract/append.md): Adds a value to an existing array field, or creates the field as an array if it doesn’t exist.

solutions/observability/streams/management/extract/grok.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ The previous pattern can then be used in the processor.
3939

4040
## Generate patterns [streams-grok-patterns]
4141
:::{note}
42-
Requires an LLM Connector to be configured.
42+
This feature requires an [LLM connector](../../../../security/ai/set-up-connectors-for-large-language-models-llm.md).
4343
:::
4444

4545
Instead of writing the Grok patterns by hand, you can use the **Generate Patterns** button to generate the patterns for you.

solutions/observability/streams/management/significant-events.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,5 +10,5 @@ Significant Events periodically runs a query on your stream to find important ev
1010

1111
To define significant events, either:
1212

13-
- **Generate significant events with AI:** If you don't know what you're looking for, let AI suggest queries based on your data. This works by using the previously identified [features](./advanced.md#streams-advanced-features) in your Stream to create specific queries based on the data you have in your Stream. Then, select the suggestions that make sense to you.
13+
- **Generate significant events with AI:** (requires an [LLM connector](../../../security/ai/set-up-connectors-for-large-language-models-llm.md)) If you don't know what you're looking for, let AI suggest queries based on your data. This works by using the previously identified [features](./advanced.md#streams-advanced-features) in your Stream to create specific queries based on the data you have in your Stream. Then, select the suggestions that make sense to you.
1414
- **Create significant events from a query:** If you know what you're looking for, write your own query to find important events.

solutions/security/configure-elastic-defend/configure-an-integration-policy-for-elastic-defend.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -238,8 +238,11 @@ stack: ga 9.2
238238
serverless: ga
239239
```
240240
241+
Device control helps protect your Linux and Mac endpoints from data loss, malware, and unauthorized access by managing which devices can connect to your computers. Specifically, it restricts which external USB storage devices can connect to hosts that have {{elastic-defend}} installed.
241242
242-
Device control helps protect your organization from data loss, malware, and unauthorized access by managing which devices can connect to your computers. Specifically, it restricts which external USB storage devices can connect to hosts that have {{elastic-defend}} installed.
243+
::::{important}
244+
Device control only affects external USB storage devices. It does not affect other peripherals such as Yubikeys, webcams, or keyboards.
245+
::::
243246
244247
To configure device control for one or more hosts, edit the {{elastic-defend}} policy that affects those hosts. Your policy specifies which operations these devices are allowed to take on a host. You can create [trusted devices](/solutions/security/manage-elastic-defend/trusted-devices.md) to define exceptions to your policy for specific devices.
245248

solutions/security/manage-elastic-defend/trusted-devices.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,11 @@ products:
1212

1313
By default, {{elastic-defend}} policies have [device control](/solutions/security/configure-elastic-defend/configure-an-integration-policy-for-elastic-defend.md#device-control) enabled, with access level set to block all operations. This prevents external storage devices from connecting to protected hosts.
1414

15+
::::{important}
16+
- Device control only affects external USB storage devices. It does not affect other peripherals such as Yubikeys, webcams, or keyboards.
17+
- Device control only supports Windows and Mac endpoints.
18+
::::
19+
1520
Trusted devices are specific external devices that are allowed to connect to your protected hosts regardless of device control settings. Create trusted devices to avoid interfering with expected workflows that involve known hardware.
1621

1722
By default, a trusted device is recognized globally across all hosts running {{elastic-defend}}. You can also assign a trusted device to a specific {{elastic-defend}} integration policy, enabling the device to be trusted by only the hosts assigned to that policy.

0 commit comments

Comments
 (0)