You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/AI-for-security/connect-to-azure-openai.asciidoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,7 +101,7 @@ The following video demonstrates these steps.
101
101
Finally, configure the connector in {kib}:
102
102
103
103
. Log in to {kib}.
104
-
. Go to **Stack Management → Connectors → Create connector → OpenAI**.
104
+
. Find the **Connectors** page in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. Then click **Create Connector**, and select **OpenAI**.
105
105
. Give your connector a name to help you keep track of different models, such as `Azure OpenAI (GPT-4 Turbo v. 0125)`.
106
106
. For **Select an OpenAI provider**, choose **Azure OpenAI**.
107
107
. Update the **URL** field. We recommend doing the following:
Copy file name to clipboardExpand all lines: docs/AI-for-security/connect-to-bedrock.asciidoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -147,7 +147,7 @@ The following video demonstrates these steps.
147
147
Finally, configure the connector in {kib}:
148
148
149
149
. Log in to {kib}.
150
-
. Go to **Stack Management → Connectors → Create connector → Amazon Bedrock**.
150
+
. . Find the **Connectors** page in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. Then click **Create Connector**, and select **Amazon Bedrock**.
151
151
. Name your connector.
152
152
. (Optional) Configure the Amazon Bedrock connector to use a different AWS region where Anthropic models are supported by editing the **URL** field, for example by changing `us-east-1` to `eu-central-1`.
153
153
. (Optional) Add one of the following strings if you want to use a model other than the default:
Copy file name to clipboardExpand all lines: docs/AI-for-security/connect-to-byo.asciidoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -178,7 +178,7 @@ image::images/lms-custom-logs-config.png[The configuration window for the custom
178
178
Finally, configure the connector:
179
179
180
180
1. Log in to your Elastic deployment.
181
-
2. Navigate to **Stack Management → Connectors → Create Connector → OpenAI**. The OpenAI connector enables this use case because LM Studio uses the OpenAI SDK.
181
+
2. Find the **Connectors** page in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. Then click **Create Connector**, and select **OpenAI**. The OpenAI connector enables this use case because LM Studio uses the OpenAI SDK.
182
182
3. Name your connector to help keep track of the model version you are using.
183
183
4. Under **Select an OpenAI provider**, select **Other (OpenAI Compatible Service)**.
184
184
5. Under **URL**, enter the domain name specified in your Nginx configuration file, followed by `/v1/chat/completions`.
. Find the **Connectors** page in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. Then click **Create Connector**, and select **OpenAI**.
51
51
. Provide a name for your connector, such as `OpenAI (GPT-4 Turbo Preview)`, to help keep track of the model and version you are using.
52
52
. Under **Select an OpenAI provider**, choose **OpenAI**.
Copy file name to clipboardExpand all lines: docs/AI-for-security/connect-to-vertex.asciidoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -93,7 +93,7 @@ The following video demonstrates these steps.
93
93
Finally, configure the connector in your Elastic deployment:
94
94
95
95
1. Log in to your Elastic deployment.
96
-
2. Navigate to **Stack Management → Connectors → Create Connector → Google Gemini**.
96
+
2. Find the **Connectors** page in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. Then click **Create Connector**, select **Google Gemini**.
97
97
3. Name your connector to help keep track of the model version you are using.
98
98
4. Under **URL**, enter the URL for your region.
99
99
5. Enter your **GCP Region** and **GCP Project ID**.
Copy file name to clipboardExpand all lines: docs/cloud-native-security/cspm-benchmark-rules.asciidoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ NOTE: Benchmark rules are not editable.
23
23
[discrete]
24
24
== Review your benchmarks
25
25
26
-
To access your active benchmarks, go to **Rules -> Benchmarks**. From there, you can click a benchmark's name to view the benchmark rules associated with it. You can click a benchmark rule's name to see details including information about how to remediate it, and related links.
26
+
Find **Benchmarks** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. From there, you can click a benchmark's name to view the benchmark rules associated with it. You can click a benchmark rule's name to see details including information about how to remediate it, and related links.
27
27
28
28
Benchmark rules are enabled by default, but you can disable some of them — at the benchmark level — to suit your environment. This means for example that if you have two integrations using the `CIS AWS` benchmark, disabling a rule for that benchmark affects both integrations. To enable or disable a rule, use the **Enabled** toggle on the right of the rules table.
. Under **Configure integration**, select **Azure**, then select either **Azure Organization** or **Single Subscription**, depending on which resources you want to monitor.
Copy file name to clipboardExpand all lines: docs/cloud-native-security/d4c-get-started.asciidoc
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ This page describes how to set up Cloud Workload Protection (CWP) for Kubernetes
22
22
23
23
First, you'll need to deploy Elastic's Defend for Containers integration to the Kubernetes clusters you wish to monitor.
24
24
25
-
. Go to *Manage > Container Workload Security > Add D4C Integration*.
25
+
. Find **Container Workload Security** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. Click **Add D4C Integration**.
26
26
. Name the integration. The default name, which you can change, is `cloud_defend-1`.
27
27
. Optional — make any desired changes to the integration's policy by adjusting the *Selectors* and *Responses* sections. (For more information, refer to the <<d4c-policy-guide, Defend for Containers policy guide>>). You can also change these later.
28
28
. Under *Where to add this integration*, select an existing or new agent policy.
@@ -54,7 +54,7 @@ In order to detect threats using this data, you'll need active <<detection-engin
54
54
55
55
To install and enable the prebuilt rules:
56
56
57
-
. Go to *Security > Rules > Detection rules (SIEM)*, then click *Add Elastic rules*.
57
+
. Find **Detection rules (SIEM)** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. Click **Add Elastic rules**.
58
58
. Click the *Tags* filter next to the search bar, and search for the `Data Source: Elastic Defend for Containers` tag.
59
59
. Select all the displayed rules, then click *Install _x_ selected rule(s)*.
60
60
. Return to the *Rules* page. Click the *Tags* filter next to the search bar, and search for the `Data Source: Elastic Defend for Containers` tag.
@@ -75,8 +75,7 @@ To enable drift detection, you can use the default D4C policy:
75
75
76
76
To enable drift prevention, create a new policy:
77
77
78
-
. Add a new selector called `blockDrift`.
79
-
. Go to *Security > Manage > Container Workload Security > Your integration name*.
78
+
. Find **Container Workload Security** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then select your integration.
80
79
. Under *Selectors*, click *Add selector > File Selector*. By default, it selects the operations `createExecutable` and `modifyExecutable`.
81
80
. Name the selector, for example: `blockDrift`.
82
81
. Scroll down to the *Responses* section and click *Add response > File Response*.
0 commit comments