-
Notifications
You must be signed in to change notification settings - Fork 25.6k
[Security Solution] Add read index privileges to kibana_system role for Microsoft Defender integration indexes
#126803
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Security Solution] Add read index privileges to kibana_system role for Microsoft Defender integration indexes
#126803
Conversation
kc13greiner
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
New data index read privileges LGTM!
Reasoning: Usually data indices are not allowed to be read by kibana_system, but logs-* are known, documented collision pattern and an exception is made for these patterns
|
Hi @paul-tavares, I've created a changelog YAML for you. |
|
Pinging @elastic/es-security (Team:Security) |
ashokaditya
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚀
…le for Microsoft Defender integration indexes (elastic#126803) adds read privilege to the kibana_system role for indexes associated with the Microsoft Defender Integrations. Changes are necessary in order to support Security Solution bi-directional response actions
Description
readprivilege to thekibana_systemrole for indexes associated with the Microsoft Defender Integrations