Skip to content

Commit c5c9b6a

Browse files
authored
Merge branch 'main' into 1730/9.0-upgrade-v2
2 parents 92eaa47 + fab0447 commit c5c9b6a

File tree

4 files changed

+11
-38
lines changed

4 files changed

+11
-38
lines changed
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Refer to [{{stack}} third-party dependencies](https://artifacts.elastic.co/reports/dependencies/dependencies-current.html) for the complete list of dependencies.

deploy-manage/deploy/self-managed/install-kibana.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,4 +52,9 @@ Running different patch version releases of {{kib}} and {{es}} (e.g. {{kib}} 9.0
5252
## Installation order
5353

5454
:::{include} /deploy-manage/deploy/_snippets/installation-order.md
55-
:::
55+
:::
56+
57+
## Third-party dependencies
58+
59+
:::{include} /deploy-manage/deploy/self-managed/_snippets/third-party-dependencies.md
60+
:::

deploy-manage/deploy/self-managed/installing-elasticsearch.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,4 +104,5 @@ Don’t use third-party Java agents that attach to the JVM. These agents can red
104104

105105
## Third-party dependencies [dependencies-versions]
106106

107-
See [Elastic Stack third-party dependencies](https://artifacts.elastic.co/reports/dependencies/dependencies-current.html) for the complete list of dependencies for {{es}}.
107+
:::{include} /deploy-manage/deploy/self-managed/_snippets/third-party-dependencies.md
108+
:::

solutions/security/detect-and-alert.md

Lines changed: 2 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -85,43 +85,9 @@ In addition, the following support restrictions are in place:
8585

8686
## Detections configuration and index privilege prerequisites [detections-permissions]
8787

88-
[*Detections requirements*](/solutions/security/detect-and-alert/detections-requirements.md) provides detailed information on all the permissions required to initiate and use the Detections feature.
88+
[Detections requirements](/solutions/security/detect-and-alert/detections-requirements.md) provides detailed information on all the permissions required to initiate and use the Detections feature.
8989

90-
91-
## Malware prevention [malware-prevention]
92-
93-
Malware, short for malicious software, is any software program designed to damage or execute unauthorized actions on a computer system. Examples of malware include viruses, worms, Trojan horses, adware, scareware, and spyware. Some malware, such as viruses, can severely damage a computer’s hard drive by deleting files or directory information. Other malware, such as spyware, can obtain user data without their knowledge.
94-
95-
Malware may be stealthy and appear as legitimate executable code, scripts, active content, and other software. It is also often embedded in non-malicious files, non-suspicious websites, and standard programs — sometimes making the root source difficult to identify. If infected and not resolved promptly, malware can cause irreparable damage to a computer network.
96-
97-
For information on how to enable malware protection on your host, see [Malware Protection](/solutions/security/configure-elastic-defend/configure-an-integration-policy-for-elastic-defend.md#malware-protection).
98-
99-
100-
### Machine learning model [machine-learning-model]
101-
102-
To determine if a file is malicious or benign, a machine learning model looks for static attributes of files (without executing the file) that include file structure, layout, and content. This includes information such as file header data, imports, exports, section names, and file size. These attributes are extracted from millions of benign and malicious file samples, which then are passed to a machine-learning algorithm that distinguishes a benign file from a malicious one. The machine learning model is updated as new data is procured and analyzed.
103-
104-
105-
### Threshold [_threshold]
106-
107-
A malware threshold determines the action the agent should take if malware is detected. The Elastic Agent uses a recommended threshold level that generates a balanced number of alerts with a low probability of undetected malware. This threshold also minimizes the number of false positive alerts.
108-
109-
110-
## Ransomware prevention [ransomware-prevention]
111-
112-
Ransomware is computer malware that installs discreetly on a user’s computer and encrypts data until a specified amount of money (ransom) is paid. Ransomware is usually similar to other malware in its delivery and execution, infecting systems through spear-phishing or drive-by downloads. If not resolved immediately, ransomware can cause irreparable damage to an entire computer network.
113-
114-
Behavioral ransomware prevention on the Elastic Endpoint detects and stops ransomware attacks on Windows systems by analyzing data from low-level system processes, and is effective across an array of widespread ransomware families — including those targeting the system’s master boot record.
115-
116-
For information on how to enable ransomware protection on your host, see [Ransomware protection](/solutions/security/configure-elastic-defend/configure-an-integration-policy-for-elastic-defend.md#ransomware-protection).
117-
118-
::::{note}
119-
Ransomware prevention is a paid feature and is enabled by default if you have a [Platinum or Enterprise license](https://www.elastic.co/pricing).
120-
::::
121-
122-
123-
124-
### Resolve UI error messages [_resolve_ui_error_messages]
90+
## Resolve UI error messages [_resolve_ui_error_messages]
12591

12692
Depending on your privileges and whether detection system indices have already been created for the {{kib}} space, you might get one of these error messages when you open the **Alerts** or **Rules** page:
12793

0 commit comments

Comments
 (0)