Skip to content

Commit 3d8347b

Browse files
natasha-moore-elasticmergify[bot]
authored andcommitted
Navigation changes: Upgrade Security, post-upgrade steps, endpoint pr… (#5980)
* Navigation changes: Upgrade Security, post-upgrade steps, endpoint protection, explore, and EA sections * Changes main menu to navigation menu (cherry picked from commit 958fbb8)
1 parent 0348dad commit 3d8347b

17 files changed

+43
-42
lines changed

docs/advanced-entity-analytics/machine-learning.asciidoc

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -49,13 +49,12 @@ interface. They are available when either:
4949

5050
* You ship data using https://www.elastic.co/products/beats[Beats] or the
5151
<<install-endpoint,{agent}>>, and {kib} is configured with the required index
52-
patterns (such as `auditbeat-*`, `filebeat-*`, `packetbeat-*`, or `winlogbeat-*`
53-
in *{kib}* -> *{stack-manage-app}* -> *Data Views*).
52+
patterns (such as `auditbeat-*`, `filebeat-*`, `packetbeat-*`, or `winlogbeat-*`) on the **Data Views** page. To find this page, navigate to **Data Views** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
5453

5554
Or
5655

5756
* Your shipped data is ECS-compliant, and {kib} is configured with the shipped
58-
data's index patterns in *{kib}* -> *{stack-manage-app}* -> *Data Views*.
57+
data's index patterns on the **Data Views** page.
5958

6059
Or
6160

@@ -78,6 +77,5 @@ To view the `Anomalies` table widget and `Max Anomaly Score By Job` details,
7877
the user must have the `machine_learning_admin` or `machine_learning_user` role.
7978

8079
NOTE: To adjust the `score` threshold that determines which anomalies are shown,
81-
you can modify
82-
*{kib}* -> *{stack-manage-app}* -> *Advanced Settings* -> *`securitySolution:defaultAnomalyScore`*.
80+
you can modify the `securitySolution:defaultAnomalyScore` <<advanced-settings,advanced setting>>.
8381

docs/advanced-entity-analytics/tune-anomaly-results.asciidoc

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,8 @@ For example, to filter out results from a housekeeping process, named
2424
[[create-fiter-list]]
2525
=== Create a filter list
2626

27-
. Go to *Machine Learning* -> *Anomaly Detection* -> *Settings*.
27+
. Find **Machine Learning** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
28+
. Under **Anomaly Detection**, select **Settings**.
2829
. Click *Filter Lists* and then *New*.
2930
+
3031
The *Create new filter list* pane is displayed.
@@ -44,7 +45,8 @@ The new filter appears in the Filter List and can be added to relevant jobs.
4445
[[add-job-filter]]
4546
=== Add the filter to the relevant job
4647

47-
. Go to *Machine Learning* -> *Anomaly Detection* -> *Anomaly Explorer*.
48+
. Find **Machine Learning** in the navigation menu.
49+
. Under **Anomaly Detection**, select **Anomaly Explorer**.
4850
. Navigate to the job results for which the filter is required. If the job results
4951
are not listed, click *Edit job selection* and select the relevant job.
5052
. In the *actions* column, click the gear icon and then select _Configure rules_.
@@ -78,7 +80,8 @@ must clone and run the cloned job.
7880
IMPORTANT: Running the cloned job can take some time. Only run the job after you
7981
have completed all job rule changes.
8082

81-
. Go to *Machine Learning* -> *Anomaly Detection* -> *Job Management*.
83+
. Find **Machine Learning** in the navigation menu.
84+
. Under **Anomaly Detection**, select **Jobs**.
8285
. Navigate to the job for which you configured the rule.
8386
. Optionally, expand the job row and click *JSON* to verify the configured filter
8487
appears under `custom rules` in the JSON code.
@@ -121,7 +124,8 @@ Depending on your anomaly detection results, you may want to set a
121124
minimum event count threshold for the `packetbeat_dns_tunneling` job:
122125

123126

124-
. Go to *Machine Learning* -> *Anomaly Detection* -> *Anomaly Explorer*.
127+
. Find **Machine Learning** in the navigation menu.
128+
. Under **Anomaly Detection**, select **Anomaly Explorer**.
125129
. Navigate to the job results for the `packetbeat_dns_tunneling` job. If the
126130
job results are not listed, click *Edit job selection* and select
127131
`packetbeat_dns_tunneling`.
@@ -139,5 +143,5 @@ _WHEN actual IS GREATER THAN <X>_
139143
+
140144
Where `<X>` is the threshold above which anomalies are detected.
141145
. Click *Save*.
142-
. To apply the new threshold, rerun the job (*Job Management* -> *Actions* ->
143-
*Start datafeed*).
146+
. To apply the new threshold, rerun the job by selecting *Actions* ->
147+
*Start datafeed* on the **Anomaly Detection Jobs** page.

docs/advanced-entity-analytics/turn-on-risk-engine.asciidoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ You can preview risky entities before installing the latest risk engine. The pre
1212

1313
NOTE: The preview is limited to two risk scores per {kib} instance.
1414

15-
To preview risky entities, go to **Manage** -> **Entity Risk Score**:
15+
To preview risky entities, find **Entity Risk Score** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
1616

1717
[role="screenshot"]
1818
image::images/preview-risky-entities.png[Preview of risky entities]
@@ -28,7 +28,7 @@ image::images/preview-risky-entities.png[Preview of risky entities]
2828

2929
If you're installing the risk scoring engine for the first time:
3030

31-
. Go to **Manage** -> **Entity Risk Score**.
31+
. Find **Entity Risk Score** in the navigation menu.
3232
. Turn the **Entity risk score** toggle on.
3333

3434
[role="screenshot"]
@@ -49,7 +49,7 @@ If you upgraded to 8.11 from an earlier {stack} version, and you have the origin
4949
[role="screenshot"]
5050
image::images/risk-engine-upgrade-prompt.png[Prompt to upgrade to the latest risk engine]
5151

52-
. Click **Manage** in the upgrade prompt, or go to **Manage** -> **Entity Risk Score**.
52+
. Click **Manage** in the upgrade prompt, or find **Entity Risk Score** in the navigation menu.
5353
. On the Entity Risk Score page, click **Start update** next to the **Update available** label.
5454
+
5555
[role="screenshot"]

docs/getting-started/agent-tamper-protection.asciidoc

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,8 @@ image::images/agent-tamper-protection.png[Agent tamper protection setting highli
2626

2727
You can enable Agent tamper protection by configuring the {agent} policy.
2828

29-
. Go to *{fleet}* -> *Agent policies*, then select the Agent policy you want to configure.
29+
. Find *{fleet}* in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
30+
. Select *Agent policies*, then select the Agent policy you want to configure.
3031
. Select the *Settings* tab on the policy details page.
3132
. In the *Agent tamper protection* section, turn on the *Prevent agent tampering* setting.
3233
+
@@ -43,7 +44,7 @@ If you need the uninstall token to remove {agent} from an endpoint, you can find
4344

4445
* *On the Agent policy* — Go to the Agent policy's *Settings* tab, then click the *Get uninstall command* link. The *Uninstall agent* flyout opens, containing the full uninstall command with the token.
4546

46-
* *On the {fleet} page* — Go to *{fleet}* -> *Uninstall tokens* for a list of the uninstall tokens generated for your Agent policies. You can:
47+
* *On the {fleet} page* — Select *Uninstall tokens* for a list of the uninstall tokens generated for your Agent policies. You can:
4748

4849
** Click the *Show token* icon in the *Token* column to reveal a specific token.
4950
** Click the *View uninstall command* icon in the *Actions* column to open the *Uninstall agent* flyout, containing the full uninstall command with the token.

docs/getting-started/artifact-control.asciidoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,8 @@ CAUTION: It is strongly advised to keep automatic updates enabled to ensure the
1616

1717
To configure the protection artifacts version deployed in your environment:
1818

19-
. Go to **Manage** → **Policies**, select an {elastic-defend} integration policy, then select the **Protection updates** tab.
19+
. Find **Policies** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
20+
. Select an {elastic-defend} integration policy, then select the **Protection updates** tab.
2021
. Turn off the **Enable automatic updates** toggle.
2122
. Use the **Version to deploy** date picker to select the date of the protection artifacts you want to use in your environment.
2223
. (Optional) Enter a **Note** to explain the reason for selecting a particular version of protection artifacts.

docs/getting-started/configure-integration-policy.asciidoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ on protected hosts (some features require a Platinum or Enterprise license). If
77
integration policy to configure protection settings, event collection, antivirus settings, trusted applications,
88
event filters, host isolation exceptions, and blocked applications to meet your organization's security needs.
99

10-
You can also create multiple {elastic-defend} integration policies to maintain unique configuration profiles. To create an additional {elastic-defend} integration policy, go to **Management** -> **Integrations**, then follow the steps for <<add-security-integration, adding the {elastic-defend} integration>>.
10+
You can also create multiple {elastic-defend} integration policies to maintain unique configuration profiles. To create an additional {elastic-defend} integration policy, find **Integrations** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then follow the steps for <<add-security-integration, adding the {elastic-defend} integration>>.
1111

1212
.Requirements
1313
[sidebar]
@@ -19,7 +19,7 @@ TIP: In addition to configuring an {elastic-defend} policy through the {elastic-
1919

2020
To configure an integration policy:
2121

22-
1. In the {security-app}, go to **Manage** -> **Policies** to view the **Policies** page.
22+
1. Find **Policies** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
2323
2. Select the integration policy you want to configure. The integration policy configuration page appears.
2424
3. On the **Policy settings** tab, review and configure the following settings as appropriate:
2525
* <<malware-protection>>
@@ -47,7 +47,7 @@ then select an item from the flyout. This view lists any existing artifacts that
4747
+
4848
NOTE: You can't create a new endpoint policy artifact while configuring an integration policy.
4949
To create a new artifact, go to its main page in the {security-app} (for example,
50-
to create a new trusted application, go to **Manage** -> **Trusted applications**).
50+
to create a new trusted application, find **Trusted applications** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]).
5151

5252
5. Click the *Protection updates* tab to configure how {elastic-defend} receives updates from Elastic with the latest threat detections, malware models, and other protection artifacts. Refer to <<artifact-control>> for more information.
5353

docs/getting-started/create-defend-policy-api.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ Replace these values:
8080

8181
. `<KIBANA-VERSION>` with your version of {kib}.
8282
. `<POLICY-ID>` with the agent policy ID you received in step 1.
83-
. `<LATEST-ELASTIC-DEFEND-PACKAGE-VERSION>` with the latest {elastic-defend} package version (for example, `8.9.1`). To find it, go to **Management** -> **Integrations** and select *{elastic-defend}*.
83+
. `<LATEST-ELASTIC-DEFEND-PACKAGE-VERSION>` with the latest {elastic-defend} package version (for example, `8.9.1`). To find it, navigate to **Integrations** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], and select *{elastic-defend}*.
8484

8585
This adds the {elastic-defend} integration to your agent policy with the default settings.
8686

@@ -490,7 +490,7 @@ Include the resulting JSON object in the following call to save your customized
490490

491491
. `<PACKAGE-POLICY-ID>` with the {elastic-defend} policy ID you received in step 2.
492492
. `<KIBANA-VERSION>` with your version of {kib}.
493-
. `<LATEST-ELASTIC-DEFEND-PACKAGE-VERSION>` with the latest {elastic-defend} package version (for example, `8.9.1`). To find it, go to **Management** -> **Integrations** and select *{elastic-defend}*.
493+
. `<LATEST-ELASTIC-DEFEND-PACKAGE-VERSION>` with the latest {elastic-defend} package version (for example, `8.9.1`). To find it, navigate to **Integrations** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], and select *{elastic-defend}*.
494494

495495
[source,console]
496496
----

docs/getting-started/defend-feature-privs.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88

99
You can create user roles and define privileges to manage feature access in {elastic-sec}. This allows you to use the principle of least privilege while managing access to {elastic-defend}'s features.
1010

11-
Configure roles and privileges in *Stack Management* → *Roles* in {kib}. For more details on using this UI, refer to {kibana-ref}/kibana-role-management.html#adding_kibana_privileges[{kib} privileges].
11+
To configure roles and privileges, find **Roles** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. For more details on using this UI, refer to {kibana-ref}/kibana-role-management.html#adding_kibana_privileges[{kib} privileges].
1212

1313
NOTE: {elastic-defend}'s feature privileges must be assigned to *All Spaces*. You can't assign them to an individual space.
1414

docs/getting-started/endpoint-diagnostic-data.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ By default, {elastic-defend} streams diagnostic data to your cluster, which Elas
55

66
NOTE: {kib} also collects usage telemetry, which includes {elastic-defend} diagnostic data. You can modify telemetry preferences in {kibana-ref}/telemetry-settings-kbn.html[Advanced Settings].
77

8-
. In the {security-app}, go to *Manage* -> *Endpoints* to view the Endpoints list.
8+
. To view the Endpoints list, find **Endpoints** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
99
. Locate the endpoint for which you want to disable diagnostic data, then click the integration policy in the *Policy* column.
1010
. Scroll down to the bottom of the policy and click *Show advanced settings*.
1111
. Enter `false` for these settings:

docs/getting-started/install-endpoint.asciidoc

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -28,11 +28,7 @@ NOTE: {elastic-defend} does not support deployment within an {agent} DaemonSet i
2828
[[add-security-integration]]
2929
== Add the {elastic-defend} integration
3030

31-
. Go to the *Integrations* page, which you can access in several ways:
32-
33-
* In {kib}: *Management* -> *Integrations*
34-
* In the {security-app}: *Get started* -> *Add security integrations*
35-
31+
. Find **Integrations** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
3632
+
3733
[role="screenshot"]
3834
image::images/install-endpoint/endpoint-cloud-sec-integrations-page.png[Search result for "{elastic-defend}" on the Integrations page.]
@@ -100,7 +96,7 @@ If you have upgraded to an {stack} version that includes {fleet-server} 7.13.0 o
10096
[[enroll-agent]]
10197
=== Add the {agent}
10298

103-
. If you're in the process of installing an {agent} integration (such as {elastic-defend}), the **Add agent** UI opens automatically. Otherwise, go to *{fleet}* -> *Agents* -> **Add agent**.
99+
. If you're in the process of installing an {agent} integration (such as {elastic-defend}), the **Add agent** UI opens automatically. Otherwise, find **{fleet}** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], and select **Agents** → **Add agent**.
104100
+
105101
[role="screenshot"]
106102
image::images/install-endpoint/endpoint-cloud-sec-add-agent.png[Add agent flyout on the Fleet page.]

0 commit comments

Comments
 (0)