You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Navigation changes: Upgrade Security, post-upgrade steps, endpoint protection, explore, and EA sections
* Changes main menu to navigation menu
(cherry picked from commit 958fbb8)
Co-authored-by: natasha-moore-elastic <[email protected]>
Copy file name to clipboardExpand all lines: docs/advanced-entity-analytics/machine-learning.asciidoc
+3-5Lines changed: 3 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,13 +49,12 @@ interface. They are available when either:
49
49
50
50
* You ship data using https://www.elastic.co/products/beats[Beats] or the
51
51
<<install-endpoint,{agent}>>, and {kib} is configured with the required index
52
-
patterns (such as `auditbeat-*`, `filebeat-*`, `packetbeat-*`, or `winlogbeat-*`
53
-
in *{kib}* -> *{stack-manage-app}* -> *Data Views*).
52
+
patterns (such as `auditbeat-*`, `filebeat-*`, `packetbeat-*`, or `winlogbeat-*`) on the **Data Views** page. To find this page, navigate to **Data Views** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
54
53
55
54
Or
56
55
57
56
* Your shipped data is ECS-compliant, and {kib} is configured with the shipped
58
-
data's index patterns in *{kib}* -> *{stack-manage-app}* -> *Data Views*.
57
+
data's index patterns on the **Data Views** page.
59
58
60
59
Or
61
60
@@ -78,6 +77,5 @@ To view the `Anomalies` table widget and `Max Anomaly Score By Job` details,
78
77
the user must have the `machine_learning_admin` or `machine_learning_user` role.
79
78
80
79
NOTE: To adjust the `score` threshold that determines which anomalies are shown,
Copy file name to clipboardExpand all lines: docs/advanced-entity-analytics/turn-on-risk-engine.asciidoc
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ You can preview risky entities before installing the latest risk engine. The pre
12
12
13
13
NOTE: The preview is limited to two risk scores per {kib} instance.
14
14
15
-
To preview risky entities, go to **Manage** -> **Entity Risk Score**:
15
+
To preview risky entities, find **Entity Risk Score** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
16
16
17
17
[role="screenshot"]
18
18
image::images/preview-risky-entities.png[Preview of risky entities]
@@ -28,7 +28,7 @@ image::images/preview-risky-entities.png[Preview of risky entities]
28
28
29
29
If you're installing the risk scoring engine for the first time:
30
30
31
-
. Go to **Manage** -> **Entity Risk Score**.
31
+
. Find **Entity Risk Score** in the navigation menu.
32
32
. Turn the **Entity risk score** toggle on.
33
33
34
34
[role="screenshot"]
@@ -49,7 +49,7 @@ If you upgraded to 8.11 from an earlier {stack} version, and you have the origin
49
49
[role="screenshot"]
50
50
image::images/risk-engine-upgrade-prompt.png[Prompt to upgrade to the latest risk engine]
51
51
52
-
. Click **Manage** in the upgrade prompt, or go to **Manage** -> **Entity Risk Score**.
52
+
. Click **Manage** in the upgrade prompt, or find **Entity Risk Score** in the navigation menu.
53
53
. On the Entity Risk Score page, click **Start update** next to the **Update available** label.
You can enable Agent tamper protection by configuring the {agent} policy.
28
28
29
-
. Go to *{fleet}* -> *Agent policies*, then select the Agent policy you want to configure.
29
+
. Find *{fleet}* in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
30
+
. Select *Agent policies*, then select the Agent policy you want to configure.
30
31
. Select the *Settings* tab on the policy details page.
31
32
. In the *Agent tamper protection* section, turn on the *Prevent agent tampering* setting.
32
33
+
@@ -43,7 +44,7 @@ If you need the uninstall token to remove {agent} from an endpoint, you can find
43
44
44
45
* *On the Agent policy* — Go to the Agent policy's *Settings* tab, then click the *Get uninstall command* link. The *Uninstall agent* flyout opens, containing the full uninstall command with the token.
45
46
46
-
* *On the {fleet} page* — Go to *{fleet}* -> *Uninstall tokens* for a list of the uninstall tokens generated for your Agent policies. You can:
47
+
* *On the {fleet} page* — Select *Uninstall tokens* for a list of the uninstall tokens generated for your Agent policies. You can:
47
48
48
49
** Click the *Show token* icon in the *Token* column to reveal a specific token.
49
50
** Click the *View uninstall command* icon in the *Actions* column to open the *Uninstall agent* flyout, containing the full uninstall command with the token.
event filters, host isolation exceptions, and blocked applications to meet your organization's security needs.
9
9
10
-
You can also create multiple {elastic-defend} integration policies to maintain unique configuration profiles. To create an additional {elastic-defend} integration policy, go to **Management** -> **Integrations**, then follow the steps for <<add-security-integration, adding the {elastic-defend} integration>>.
10
+
You can also create multiple {elastic-defend} integration policies to maintain unique configuration profiles. To create an additional {elastic-defend} integration policy, find **Integrations** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then follow the steps for <<add-security-integration, adding the {elastic-defend} integration>>.
11
11
12
12
.Requirements
13
13
[sidebar]
@@ -19,7 +19,7 @@ TIP: In addition to configuring an {elastic-defend} policy through the {elastic-
19
19
20
20
To configure an integration policy:
21
21
22
-
1. In the {security-app}, go to **Manage** -> **Policies** to view the **Policies** page.
22
+
1. Find **Policies** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
23
23
2. Select the integration policy you want to configure. The integration policy configuration page appears.
24
24
3. On the **Policy settings** tab, review and configure the following settings as appropriate:
25
25
* <<malware-protection>>
@@ -47,7 +47,7 @@ then select an item from the flyout. This view lists any existing artifacts that
47
47
+
48
48
NOTE: You can't create a new endpoint policy artifact while configuring an integration policy.
49
49
To create a new artifact, go to its main page in the {security-app} (for example,
50
-
to create a new trusted application, go to **Manage** -> **Trusted applications**).
50
+
to create a new trusted application, find **Trusted applications** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]).
51
51
52
52
5. Click the *Protection updates* tab to configure how {elastic-defend} receives updates from Elastic with the latest threat detections, malware models, and other protection artifacts. Refer to <<artifact-control>> for more information.
Copy file name to clipboardExpand all lines: docs/getting-started/create-defend-policy-api.asciidoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -80,7 +80,7 @@ Replace these values:
80
80
81
81
. `<KIBANA-VERSION>` with your version of {kib}.
82
82
. `<POLICY-ID>` with the agent policy ID you received in step 1.
83
-
. `<LATEST-ELASTIC-DEFEND-PACKAGE-VERSION>` with the latest {elastic-defend} package version (for example, `8.9.1`). To find it, go to **Management** -> **Integrations** and select *{elastic-defend}*.
83
+
. `<LATEST-ELASTIC-DEFEND-PACKAGE-VERSION>` with the latest {elastic-defend} package version (for example, `8.9.1`). To find it, navigate to **Integrations** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], and select *{elastic-defend}*.
84
84
85
85
This adds the {elastic-defend} integration to your agent policy with the default settings.
86
86
@@ -490,7 +490,7 @@ Include the resulting JSON object in the following call to save your customized
490
490
491
491
. `<PACKAGE-POLICY-ID>` with the {elastic-defend} policy ID you received in step 2.
492
492
. `<KIBANA-VERSION>` with your version of {kib}.
493
-
. `<LATEST-ELASTIC-DEFEND-PACKAGE-VERSION>` with the latest {elastic-defend} package version (for example, `8.9.1`). To find it, go to **Management** -> **Integrations** and select *{elastic-defend}*.
493
+
. `<LATEST-ELASTIC-DEFEND-PACKAGE-VERSION>` with the latest {elastic-defend} package version (for example, `8.9.1`). To find it, navigate to **Integrations** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], and select *{elastic-defend}*.
Copy file name to clipboardExpand all lines: docs/getting-started/defend-feature-privs.asciidoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@
8
8
9
9
You can create user roles and define privileges to manage feature access in {elastic-sec}. This allows you to use the principle of least privilege while managing access to {elastic-defend}'s features.
10
10
11
-
Configure roles and privileges in *Stack Management* → *Roles* in {kib}. For more details on using this UI, refer to {kibana-ref}/kibana-role-management.html#adding_kibana_privileges[{kib} privileges].
11
+
To configure roles and privileges, find **Roles** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. For more details on using this UI, refer to {kibana-ref}/kibana-role-management.html#adding_kibana_privileges[{kib} privileges].
12
12
13
13
NOTE: {elastic-defend}'s feature privileges must be assigned to *All Spaces*. You can't assign them to an individual space.
Copy file name to clipboardExpand all lines: docs/getting-started/endpoint-diagnostic-data.asciidoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ By default, {elastic-defend} streams diagnostic data to your cluster, which Elas
5
5
6
6
NOTE: {kib} also collects usage telemetry, which includes {elastic-defend} diagnostic data. You can modify telemetry preferences in {kibana-ref}/telemetry-settings-kbn.html[Advanced Settings].
7
7
8
-
. In the {security-app}, go to *Manage* -> *Endpoints* to view the Endpoints list.
8
+
. To view the Endpoints list, find **Endpoints** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
9
9
. Locate the endpoint for which you want to disable diagnostic data, then click the integration policy in the *Policy* column.
10
10
. Scroll down to the bottom of the policy and click *Show advanced settings*.
Copy file name to clipboardExpand all lines: docs/getting-started/install-endpoint.asciidoc
+2-6Lines changed: 2 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,11 +28,7 @@ NOTE: {elastic-defend} does not support deployment within an {agent} DaemonSet i
28
28
[[add-security-integration]]
29
29
== Add the {elastic-defend} integration
30
30
31
-
. Go to the *Integrations* page, which you can access in several ways:
32
-
33
-
* In {kib}: *Management* -> *Integrations*
34
-
* In the {security-app}: *Get started* -> *Add security integrations*
35
-
31
+
. Find **Integrations** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
36
32
+
37
33
[role="screenshot"]
38
34
image::images/install-endpoint/endpoint-cloud-sec-integrations-page.png[Search result for "{elastic-defend}" on the Integrations page.]
@@ -100,7 +96,7 @@ If you have upgraded to an {stack} version that includes {fleet-server} 7.13.0 o
100
96
[[enroll-agent]]
101
97
=== Add the {agent}
102
98
103
-
. If you're in the process of installing an {agent} integration (such as {elastic-defend}), the **Add agent** UI opens automatically. Otherwise, go to *{fleet}* -> *Agents* -> **Add agent**.
99
+
. If you're in the process of installing an {agent} integration (such as {elastic-defend}), the **Add agent** UI opens automatically. Otherwise, find **{fleet}** in the navigation menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], and select **Agents** → **Add agent**.
104
100
+
105
101
[role="screenshot"]
106
102
image::images/install-endpoint/endpoint-cloud-sec-add-agent.png[Add agent flyout on the Fleet page.]
0 commit comments