You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/serverless/advanced-entity-analytics/ers-req.mdx
+63-99Lines changed: 63 additions & 99 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,38 +13,26 @@ This page covers the requirements for using the entity risk scoring and asset cr
13
13
14
14
### User roles
15
15
16
-
{/* TO-DO: Remove the DocIf conditionals once the feature is available in production. */}
16
+
To turn on the risk scoring engine, you need either the appropriate <DocLinkslug="/serverless/general/assign-user-roles">predefined Security user role</DocLink> or a <DocLinkslug="/serverless/custom-roles">custom role</DocLink> with the right privileges:
To turn on the risk scoring engine, you need one of the following <DocLinkslug="/serverless/general/assign-user-roles"section="security">Security user roles</DocLink>:
To turn on the risk scoring engine, you need either the appropriate <DocLinkslug="/serverless/general/assign-user-roles">predefined Security user role</DocLink> or a <DocLinkslug="/serverless/custom-roles">custom role</DocLink> with the right privileges:
The following <DocLinkslug="/serverless/general/assign-user-roles"section="security">Security user roles</DocLink> allow you to view an entity's asset criticality:
64
-
65
-
* Viewer
66
-
* Tier 1 analyst
67
-
68
-
The following Security user roles allow you to view, assign, change, or unassign an entity's asset criticality:
To use asset criticality, you need either the appropriate <DocLinkslug="/serverless/general/assign-user-roles">predefined Security user role</DocLink> or a <DocLinkslug="/serverless/custom-roles">custom role</DocLink> with the right privileges:
<DocCell>View, assign, or change asset criticality</DocCell>
123
-
<DocCell>`read` and `write`</DocCell>
124
-
</DocRow>
125
-
<DocRow>
126
-
<DocCell>Unassign asset criticality</DocCell>
127
-
<DocCell>`delete`</DocCell>
128
-
</DocRow>
129
-
</DocTable>
130
-
</DocIf>
48
+
To use asset criticality, you need either the appropriate <DocLinkslug="/serverless/general/assign-user-roles">predefined Security user role</DocLink> or a <DocLinkslug="/serverless/custom-roles">custom role</DocLink> with the right privileges:
{/* TO-DO: Remove the DocIf conditionals once the feature is available in production. */}
10
+
You can create user roles and define privileges to manage feature access in ((elastic-sec)). This allows you to use the principle of least privilege while managing access to ((elastic-defend))'s features.
Configure roles and privileges in **Stack Management** → **Custom Roles**. For more details on using this UI, refer to <DocLinkslug="/serverless/custom-roles" />.
You can create user roles and define privileges to manage feature access in ((elastic-sec)). This allows you to use the principle of least privilege while managing access to ((elastic-defend))'s features.
14
+
<DocCallOuttitle="Note">
15
+
((elastic-defend))'s feature privileges must be assigned to **All Spaces**. You can't assign them to an individual space.
16
+
</DocCallOut>
18
17
19
-
Configure roles and privileges in **Stack Management**→ **Custom Roles**. For more details on using this UI, refer to <DocLinkslug="/serverless/custom-roles" />.
18
+
To grant access, select **All** for the **Security** feature in the **((kib)) privileges**configuration UI, then turn on the **Customize sub-feature privileges** switch. For each of the following sub-feature privileges, select the type of access you want to allow:
20
19
21
-
<DocCallOuttitle="Note">
22
-
((elastic-defend))'s feature privileges must be assigned to **All Spaces**. You can't assign them to an individual space.
23
-
</DocCallOut>
20
+
***All**: Users have full access to the feature, which includes performing all available actions and managing configuration.
21
+
***Read**: Users can view the feature, but can't perform any actions or manage configuration (some features don't have this privilege).
22
+
***None**: Users can't access or view the feature.
24
23
25
-
To grant access, select **All** for the **Security** feature in the **((kib)) privileges** configuration UI, then turn on the **Customize sub-feature privileges** switch. For each of the following sub-feature privileges, select the type of access you want to allow:
26
-
27
-
***All**: Users have full access to the feature, which includes performing all available actions and managing configuration.
28
-
***Read**: Users can view the feature, but can't perform any actions or manage configuration (some features don't have this privilege).
29
-
***None**: Users can't access or view the feature.
<DocCell>Access the <DocLinkslug="/serverless/security/endpoints-page">Endpoints</DocLink> page, which lists all hosts running ((elastic-defend)), and associated integration details.</DocCell>
35
-
</DocRow>
36
-
<DocRow>
37
-
<DocCell>**Trusted Applications**</DocCell>
38
-
<DocCell>Access the <DocLinkslug="/serverless/security/trusted-applications">Trusted applications</DocLink> page to remediate conflicts with other software, such as antivirus or endpoint security applications</DocCell>
39
-
</DocRow>
40
-
<DocRow>
41
-
<DocCell>**Host Isolation Exceptions**</DocCell>
42
-
<DocCell>Access the <DocLinkslug="/serverless/security/host-isolation-exceptions">Host isolation exceptions</DocLink> page to add specific IP addresses that isolated hosts can still communicate with.</DocCell>
43
-
</DocRow>
44
-
<DocRow>
45
-
<DocCell>**Blocklist**</DocCell>
46
-
<DocCell>Access the <DocLinkslug="/serverless/security/blocklist">Blocklist</DocLink> page to prevent specified applications from running on hosts, extending the list of processes that ((elastic-defend)) considers malicious.</DocCell>
47
-
</DocRow>
48
-
<DocRow>
49
-
<DocCell>**Event Filters**</DocCell>
50
-
<DocCell>Access the <DocLinkslug="/serverless/security/event-filters">Event Filters</DocLink> page to filter out endpoint events that you don't want stored in ((es)).</DocCell>
<DocCell>Access the <DocLinkslug="/serverless/security/policies-page">Policies</DocLink> page and ((elastic-defend)) integration policies to configure protections, event collection, and advanced policy features.</DocCell>
55
-
</DocRow>
56
-
<DocRow>
57
-
<DocCell>**Response Actions History**</DocCell>
58
-
<DocCell>Access the <DocLinkslug="/serverless/security/response-actions-history">response actions history</DocLink> for endpoints.</DocCell>
59
-
</DocRow>
60
-
<DocRow>
61
-
<DocCell>**Host Isolation**</DocCell>
62
-
<DocCell>Allow users to <DocLinkslug="/serverless/security/isolate-host">isolate and release hosts</DocLink>.</DocCell>
63
-
</DocRow>
64
-
<DocRow>
65
-
<DocCell>**Process Operations**</DocCell>
66
-
<DocCell>Perform host process-related <DocLinkslug="/serverless/security/response-actions">response actions</DocLink>, including `processes`, `kill-process`, and `suspend-process`.</DocCell>
67
-
</DocRow>
68
-
<DocRow>
69
-
<DocCell>**File Operations**</DocCell>
70
-
<DocCell>Perform file-related <DocLinkslug="/serverless/security/response-actions">response actions</DocLink> in the response console.</DocCell>
71
-
</DocRow>
72
-
<DocRow>
73
-
<DocCell>**Execute Operations**</DocCell>
74
-
<DocCell>
75
-
Perform shell commands and script-related <DocLinkslug="/serverless/security/response-actions">response actions</DocLink> in the response console.
76
-
<DocCallOuttitle="Warning"color="warning">
77
-
The commands are run on the host using the same user account running the ((elastic-defend)) integration, which normally has full control over the system. Only grant this feature privilege to ((elastic-sec)) users who require this level of access.
78
-
</DocCallOut>
79
-
</DocCell>
80
-
</DocRow>
81
-
<DocRow>
82
-
<DocCell>**Scan Operations**</DocCell>
83
-
<DocCell>Perform folder scan <DocLinkslug="/serverless/security/response-actions">response actions</DocLink> in the response console.</DocCell>
<DocCell>Access the <DocLinkslug="/serverless/security/endpoints-page">Endpoints</DocLink> page, which lists all hosts running ((elastic-defend)), and associated integration details.</DocCell>
28
+
</DocRow>
29
+
<DocRow>
30
+
<DocCell>**Trusted Applications**</DocCell>
31
+
<DocCell>Access the <DocLinkslug="/serverless/security/trusted-applications">Trusted applications</DocLink> page to remediate conflicts with other software, such as antivirus or endpoint security applications</DocCell>
32
+
</DocRow>
33
+
<DocRow>
34
+
<DocCell>**Host Isolation Exceptions**</DocCell>
35
+
<DocCell>Access the <DocLinkslug="/serverless/security/host-isolation-exceptions">Host isolation exceptions</DocLink> page to add specific IP addresses that isolated hosts can still communicate with.</DocCell>
36
+
</DocRow>
37
+
<DocRow>
38
+
<DocCell>**Blocklist**</DocCell>
39
+
<DocCell>Access the <DocLinkslug="/serverless/security/blocklist">Blocklist</DocLink> page to prevent specified applications from running on hosts, extending the list of processes that ((elastic-defend)) considers malicious.</DocCell>
40
+
</DocRow>
41
+
<DocRow>
42
+
<DocCell>**Event Filters**</DocCell>
43
+
<DocCell>Access the <DocLinkslug="/serverless/security/event-filters">Event Filters</DocLink> page to filter out endpoint events that you don't want stored in ((es)).</DocCell>
<DocCell>Access the <DocLinkslug="/serverless/security/policies-page">Policies</DocLink> page and ((elastic-defend)) integration policies to configure protections, event collection, and advanced policy features.</DocCell>
48
+
</DocRow>
49
+
<DocRow>
50
+
<DocCell>**Response Actions History**</DocCell>
51
+
<DocCell>Access the <DocLinkslug="/serverless/security/response-actions-history">response actions history</DocLink> for endpoints.</DocCell>
52
+
</DocRow>
53
+
<DocRow>
54
+
<DocCell>**Host Isolation**</DocCell>
55
+
<DocCell>Allow users to <DocLinkslug="/serverless/security/isolate-host">isolate and release hosts</DocLink>.</DocCell>
56
+
</DocRow>
57
+
<DocRow>
58
+
<DocCell>**Process Operations**</DocCell>
59
+
<DocCell>Perform host process-related <DocLinkslug="/serverless/security/response-actions">response actions</DocLink>, including `processes`, `kill-process`, and `suspend-process`.</DocCell>
60
+
</DocRow>
61
+
<DocRow>
62
+
<DocCell>**File Operations**</DocCell>
63
+
<DocCell>Perform file-related <DocLinkslug="/serverless/security/response-actions">response actions</DocLink> in the response console.</DocCell>
64
+
</DocRow>
65
+
<DocRow>
66
+
<DocCell>**Execute Operations**</DocCell>
67
+
<DocCell>
68
+
Perform shell commands and script-related <DocLinkslug="/serverless/security/response-actions">response actions</DocLink> in the response console.
69
+
<DocCallOuttitle="Warning"color="warning">
70
+
The commands are run on the host using the same user account running the ((elastic-defend)) integration, which normally has full control over the system. Only grant this feature privilege to ((elastic-sec)) users who require this level of access.
71
+
</DocCallOut>
72
+
</DocCell>
73
+
</DocRow>
74
+
<DocRow>
75
+
<DocCell>**Scan Operations**</DocCell>
76
+
<DocCell>Perform folder scan <DocLinkslug="/serverless/security/response-actions">response actions</DocLink> in the response console.</DocCell>
To view the map, you need the appropriate <DocLinkslug="/serverless/general/assign-user-roles">predefined user role</DocLink> or a <DocLinkslug="/serverless/custom-roles">custom role</DocLink> with at least `Read` privileges for the `Maps` feature.
34
-
</DocIf>
27
+
28
+
To view the map, you need the appropriate <DocLinkslug="/serverless/general/assign-user-roles">predefined user role</DocLink> or a <DocLinkslug="/serverless/custom-roles">custom role</DocLink> with at least `Read` privileges for the `Maps` feature.
0 commit comments