Skip to content

Commit 23a0a42

Browse files
benironsidemergify[bot]
authored andcommitted
Updates nav references (#6147)
(cherry picked from commit 3c3e4c8) # Conflicts: # docs/serverless/AI-for-security/connect-to-azure-openai.asciidoc # docs/serverless/AI-for-security/connect-to-bedrock.asciidoc # docs/serverless/AI-for-security/connect-to-byo-llm.asciidoc # docs/serverless/AI-for-security/connect-to-openai.asciidoc # docs/serverless/AI-for-security/connect-to-vertex.asciidoc # docs/serverless/cloud-native-security/benchmark-rules.asciidoc # docs/serverless/cloud-native-security/cspm-get-started-azure.asciidoc # docs/serverless/cloud-native-security/cspm-get-started-gcp.asciidoc # docs/serverless/cloud-native-security/cspm-get-started.asciidoc # docs/serverless/cloud-native-security/d4c-get-started.asciidoc # docs/serverless/cloud-native-security/environment-variable-capture.asciidoc # docs/serverless/cloud-native-security/get-started-with-kspm.asciidoc # docs/serverless/cloud-native-security/kspm.asciidoc # docs/serverless/cloud-native-security/security-posture-management.asciidoc # docs/serverless/cloud-native-security/vuln-management-get-started.asciidoc
1 parent e9d33cd commit 23a0a42

31 files changed

+2325
-26
lines changed

docs/AI-for-security/connect-to-azure-openai.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ The following video demonstrates these steps.
101101
Finally, configure the connector in {kib}:
102102

103103
. Log in to {kib}.
104-
. Go to **Stack Management → Connectors → Create connector → OpenAI**.
104+
. Find the **Connectors** page in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. Then click **Create Connector**, and select **OpenAI**.
105105
. Give your connector a name to help you keep track of different models, such as `Azure OpenAI (GPT-4 Turbo v. 0125)`.
106106
. For **Select an OpenAI provider**, choose **Azure OpenAI**.
107107
. Update the **URL** field. We recommend doing the following:

docs/AI-for-security/connect-to-bedrock.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ The following video demonstrates these steps.
147147
Finally, configure the connector in {kib}:
148148

149149
. Log in to {kib}.
150-
. Go to **Stack Management → Connectors → Create connector → Amazon Bedrock**.
150+
. . Find the **Connectors** page in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. Then click **Create Connector**, and select **Amazon Bedrock**.
151151
. Name your connector.
152152
. (Optional) Configure the Amazon Bedrock connector to use a different AWS region where Anthropic models are supported by editing the **URL** field, for example by changing `us-east-1` to `eu-central-1`.
153153
. (Optional) Add one of the following strings if you want to use a model other than the default:

docs/AI-for-security/connect-to-byo.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -178,7 +178,7 @@ image::images/lms-custom-logs-config.png[The configuration window for the custom
178178
Finally, configure the connector:
179179

180180
1. Log in to your Elastic deployment.
181-
2. Navigate to **Stack Management → Connectors → Create ConnectorOpenAI**. The OpenAI connector enables this use case because LM Studio uses the OpenAI SDK.
181+
2. Find the **Connectors** page in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. Then click **Create Connector**, and select **OpenAI**. The OpenAI connector enables this use case because LM Studio uses the OpenAI SDK.
182182
3. Name your connector to help keep track of the model version you are using.
183183
4. Under **Select an OpenAI provider**, select **Other (OpenAI Compatible Service)**.
184184
5. Under **URL**, enter the domain name specified in your Nginx configuration file, followed by `/v1/chat/completions`.

docs/AI-for-security/connect-to-openai.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ The following video demonstrates these steps.
4747
To integrate with {kib}:
4848

4949
. Log in to {kib}.
50-
. Navigate to **Stack Management → Connectors → Create ConnectorOpenAI**.
50+
. Find the **Connectors** page in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. Then click **Create Connector**, and select **OpenAI**.
5151
. Provide a name for your connector, such as `OpenAI (GPT-4 Turbo Preview)`, to help keep track of the model and version you are using.
5252
. Under **Select an OpenAI provider**, choose **OpenAI**.
5353
. The **URL** field can be left as default.

docs/AI-for-security/connect-to-vertex.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ The following video demonstrates these steps.
9393
Finally, configure the connector in your Elastic deployment:
9494

9595
1. Log in to your Elastic deployment.
96-
2. Navigate to **Stack Management → Connectors → Create ConnectorGoogle Gemini**.
96+
2. Find the **Connectors** page in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. Then click **Create Connector**, select **Google Gemini**.
9797
3. Name your connector to help keep track of the model version you are using.
9898
4. Under **URL**, enter the URL for your region.
9999
5. Enter your **GCP Region** and **GCP Project ID**.

docs/cloud-native-security/cspm-benchmark-rules.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ NOTE: Benchmark rules are not editable.
2323
[discrete]
2424
== Review your benchmarks
2525

26-
To access your active benchmarks, go to **Rules -> Benchmarks**. From there, you can click a benchmark's name to view the benchmark rules associated with it. You can click a benchmark rule's name to see details including information about how to remediate it, and related links.
26+
Find **Benchmarks** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. From there, you can click a benchmark's name to view the benchmark rules associated with it. You can click a benchmark rule's name to see details including information about how to remediate it, and related links.
2727

2828
Benchmark rules are enabled by default, but you can disable some of them — at the benchmark level — to suit your environment. This means for example that if you have two integrations using the `CIS AWS` benchmark, disabling a rule for that benchmark affects both integrations. To enable or disable a rule, use the **Enabled** toggle on the right of the rules table.
2929

docs/cloud-native-security/cspm-get-started-aws.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ You can set up CSPM for AWS either by enrolling a single cloud account, or by en
3535
== Agentless deployment
3636
beta::[]
3737

38-
. From the Elastic Security *Get started* page, click *Add integrations*.
38+
. Find **Integrations** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
3939
. Search for `CSPM`, then click on the result.
4040
. Click *Add Cloud Security Posture Management (CSPM)*.
4141
. Select *AWS*, then either *AWS Organization* to onboard multiple accounts, or *Single Account* to onboard an individual account.
@@ -53,7 +53,7 @@ beta::[]
5353
[discrete]
5454
[[cspm-add-and-name-integration]]
5555
=== Add the CSPM integration
56-
. From the Elastic Security *Get started* page, click *Add integrations*.
56+
. Find **Integrations** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
5757
. Search for `CSPM`, then click on the result.
5858
. Click *Add Cloud Security Posture Management (CSPM)*.
5959
. Select *AWS*, then either *AWS Organization* to onboard multiple accounts, or *Single Account* to onboard an individual account.

docs/cloud-native-security/cspm-get-started-azure.asciidoc

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ You can set up CSPM for Azure by by enrolling an Azure organization (management
3535
== Agentless deployment
3636
beta::[]
3737

38-
. From the Elastic Security *Get started* page, click *Add integrations*.
38+
. Find **Integrations** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
3939
. Search for `CSPM`, then click on the result.
4040
. Click *Add Cloud Security Posture Management (CSPM)*.
4141
. Select *Azure*, then either *Azure Organization* to onboard your whole organization, or *Single Subscription* to onboard an individual subscription.
@@ -51,7 +51,8 @@ beta::[]
5151
[discrete]
5252
[[cspm-add-and-name-integration-azure]]
5353
=== Add your CSPM integration
54-
. From the Elastic Security *Get started* page, click *Add integrations*.
54+
55+
. Find **Integrations** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
5556
. Search for `CSPM`, then click on the result.
5657
. Click *Add Cloud Security Posture Management (CSPM)*.
5758
. Under **Configure integration**, select **Azure**, then select either **Azure Organization** or **Single Subscription**, depending on which resources you want to monitor.

docs/cloud-native-security/cspm-get-started-gcp.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ You can set up CSPM for GCP either by enrolling a single project, or by enrollin
3535
== Agentless deployment
3636
beta::[]
3737

38-
. From the Elastic Security *Get started* page, click *Add integrations*.
38+
. Find **Integrations** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
3939
. Search for `CSPM`, then click on the result.
4040
. Click *Add Cloud Security Posture Management (CSPM)*.
4141
. Select *GCP*, then either *GCP Organization* to onboard your whole organization, or *Single Account* to onboard an individual account.
@@ -52,7 +52,7 @@ beta::[]
5252
[discrete]
5353
[[cspm-add-and-name-integration-gcp]]
5454
=== Add your CSPM integration
55-
. From the Elastic Security *Get started* page, click *Add integrations*.
55+
. Find **Integrations** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
5656
. Search for `CSPM`, then click on the result.
5757
. Click *Add Cloud Security Posture Management (CSPM)*.
5858
. Under *Configure integration*, select *GCP*, then either *GCP Organization* (recommended) or *Single Account*.

docs/cloud-native-security/d4c-get-started.asciidoc

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ This page describes how to set up Cloud Workload Protection (CWP) for Kubernetes
2222

2323
First, you'll need to deploy Elastic's Defend for Containers integration to the Kubernetes clusters you wish to monitor.
2424

25-
. Go to *Manage > Container Workload Security > Add D4C Integration*.
25+
. Find **Container Workload Security** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. Click **Add D4C Integration**.
2626
. Name the integration. The default name, which you can change, is `cloud_defend-1`.
2727
. Optional — make any desired changes to the integration's policy by adjusting the *Selectors* and *Responses* sections. (For more information, refer to the <<d4c-policy-guide, Defend for Containers policy guide>>). You can also change these later.
2828
. Under *Where to add this integration*, select an existing or new agent policy.
@@ -54,7 +54,7 @@ In order to detect threats using this data, you'll need active <<detection-engin
5454

5555
To install and enable the prebuilt rules:
5656

57-
. Go to *Security > Rules > Detection rules (SIEM)*, then click *Add Elastic rules*.
57+
. Find **Detection rules (SIEM)** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. Click **Add Elastic rules**.
5858
. Click the *Tags* filter next to the search bar, and search for the `Data Source: Elastic Defend for Containers` tag.
5959
. Select all the displayed rules, then click *Install _x_ selected rule(s)*.
6060
. Return to the *Rules* page. Click the *Tags* filter next to the search bar, and search for the `Data Source: Elastic Defend for Containers` tag.
@@ -75,8 +75,7 @@ To enable drift detection, you can use the default D4C policy:
7575

7676
To enable drift prevention, create a new policy:
7777

78-
. Add a new selector called `blockDrift`.
79-
. Go to *Security > Manage > Container Workload Security > Your integration name*.
78+
. Find **Container Workload Security** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then select your integration.
8079
. Under *Selectors*, click *Add selector > File Selector*. By default, it selects the operations `createExecutable` and `modifyExecutable`.
8180
. Name the selector, for example: `blockDrift`.
8281
. Scroll down to the *Responses* section and click *Add response > File Response*.

0 commit comments

Comments
 (0)