|
| 1 | +[[security-install-edr]] |
| 2 | += Install the {elastic-defend} integration |
| 3 | + |
| 4 | +// :description: Start protecting your endpoints with {elastic-defend}. |
| 5 | +// :keywords: serverless, security, how-to |
| 6 | + |
| 7 | +++++ |
| 8 | +<titleabbrev>Install Elastic Defend</titleabbrev> |
| 9 | +++++ |
| 10 | + |
| 11 | + |
| 12 | +Like other Elastic integrations, {elastic-defend} is integrated into the {agent} using {fleet-guide}/fleet-overview.html[{fleet}]. Upon configuration, the integration allows the {agent} to monitor events on your host and send data to the {security-app}. |
| 13 | + |
| 14 | +.Requirements |
| 15 | +[NOTE] |
| 16 | +==== |
| 17 | +* {fleet} is required for {elastic-defend}. |
| 18 | +* To configure the {elastic-defend} integration on the {agent}, you must have permission to use {fleet}. |
| 19 | +* You must have the appropriate user role to configure an integration policy and access the **Endpoints** page. |
| 20 | +
|
| 21 | +// Placeholder statement until we know which specific roles are required. Classic statement below for reference. |
| 22 | +
|
| 23 | +// * You must have the **{elastic-defend} Policy Management: All** <DocLink slug="/serverless/security/endpoint-management-req">privilege</DocLink> to configure an integration policy, and the **Endpoint List** <DocLink slug="/serverless/security/endpoint-management-req">privilege</DocLink> to access the **Endpoints** page. |
| 24 | +==== |
| 25 | + |
| 26 | +[discrete] |
| 27 | +[[security-before-you-begin]] |
| 28 | +== Before you begin |
| 29 | + |
| 30 | +If you're using macOS, some versions may require you to grant Full Disk Access to different kernels, system extensions, or files. Refer to <<security-elastic-endpoint-deploy-reqs>> for more information. |
| 31 | + |
| 32 | +[NOTE] |
| 33 | +==== |
| 34 | +{elastic-defend} does not support deployment within an {agent} DaemonSet in Kubernetes. |
| 35 | +==== |
| 36 | + |
| 37 | +[discrete] |
| 38 | +[[add-security-integration]] |
| 39 | +== Add the {elastic-defend} integration |
| 40 | + |
| 41 | +. Go to the **Integrations** page, which you can access in several ways: |
| 42 | ++ |
| 43 | +** The **Add integrations** link at the top of most pages |
| 44 | +** **Assets** → **Browse Integrations** |
| 45 | +** **Project settings** → **Integrations** |
| 46 | ++ |
| 47 | +[role="screenshot"] |
| 48 | +image::images/install-endpoint/-getting-started-install-endpoint-endpoint-cloud-sec-integrations-page.png[Search result for "{elastic-defend}" on the Integrations page.] |
| 49 | +. Search for and select **{elastic-defend}**, then select **Add {elastic-defend}**. The integration configuration page appears. |
| 50 | ++ |
| 51 | +[NOTE] |
| 52 | +==== |
| 53 | +If this is the first integration you've installed and the **Ready to add your first integration?** page appears instead, select **Add integration only (skip agent installation)** to proceed. You can <<enroll-agent,install {agent}>> after setting up the {elastic-defend} integration. |
| 54 | +==== |
| 55 | ++ |
| 56 | +[role="screenshot"] |
| 57 | +image:images/install-endpoint/-getting-started-install-endpoint-endpoint-cloud-security-configuration.png[Add {elastic-defend} integration page] |
| 58 | +. Configure the {elastic-defend} integration with an **Integration name** and optional **Description**. |
| 59 | +. Select the type of environment you want to protect, either **Traditional Endpoints** or **Cloud Workloads**. |
| 60 | +. Select a configuration preset. Each preset comes with different default settings for {agent} — you can further customize these later by <<security-configure-endpoint-integration-policy,configuring the {elastic-defend} integration policy>>. |
| 61 | ++ |
| 62 | +|=== |
| 63 | +| | |
| 64 | + |
| 65 | +| **Traditional Endpoint presets** |
| 66 | +a| All traditional endpoint presets _except_ **Data Collection** have these preventions enabled by default: malware, ransomware, memory threat, malicious behavior, and credential theft. Each preset collects the following events: |
| 67 | + |
| 68 | +* **Data Collection:** All events; no preventions |
| 69 | +* **Next-Generation Antivirus (NGAV):** Process events; all preventions |
| 70 | +* **Essential EDR (Endpoint Detection & Response):** Process, Network, File events; all preventions |
| 71 | +* **Complete EDR (Endpoint Detection & Response):** All events; all preventions |
| 72 | + |
| 73 | +| **Cloud Workloads presets** |
| 74 | +a| Both cloud workload presets are intended for monitoring cloud-based Linux hosts. Therefore, <<security-session-view,session data>> collection, which enriches process events, is enabled by default. They both have all preventions disabled by default, and collect process, network, and file events. |
| 75 | + |
| 76 | +* **All events:** Includes data from automated sessions. |
| 77 | +* **Interactive only:** Filters out data from non-interactive sessions by creating an <<security-event-filters,event filter>>. |
| 78 | +|=== |
| 79 | +. Enter a name for the agent policy in **New agent policy name**. If other agent policies already exist, you can click the **Existing hosts** tab and select an existing policy instead. For more details on {agent} configuration settings, refer to {fleet-guide}/agent-policy.html[{agent} policies]. |
| 80 | +. When you're ready, click **Save and continue**. |
| 81 | +. To complete the integration, select **Add {agent} to your hosts** and continue to the next section to install the {agent} on your hosts. |
| 82 | + |
| 83 | +[discrete] |
| 84 | +[[enroll-security-agent]] |
| 85 | +== Configure and enroll the {agent} |
| 86 | + |
| 87 | +To enable the {elastic-defend} integration, you must enroll agents in the relevant policy using {fleet}. |
| 88 | + |
| 89 | +[IMPORTANT] |
| 90 | +==== |
| 91 | +Before you add an {agent}, a {fleet-server} must be running. Refer to {fleet-guide}/add-a-fleet-server.html[Add a {fleet-server}]. |
| 92 | +
|
| 93 | +{elastic-defend} cannot be integrated with an {agent} in standalone mode. |
| 94 | +==== |
| 95 | + |
| 96 | +[discrete] |
| 97 | +[[enroll-agent]] |
| 98 | +=== Add the {agent} |
| 99 | + |
| 100 | +. If you're in the process of installing an {agent} integration (such as {elastic-defend}), the **Add agent** UI opens automatically. Otherwise, go to **Assets** → **{fleet}** → **Agents** → **Add agent**. |
| 101 | ++ |
| 102 | +[role="screenshot"] |
| 103 | +image::images/install-endpoint/-getting-started-install-endpoint-endpoint-cloud-sec-add-agent.png[Add agent flyout on the Fleet page.] |
| 104 | +. Select an agent policy for the {agent}. You can select an existing policy, or select **Create new agent policy** to create a new one. For more details on {agent} configuration settings, refer to {fleet-guide}/agent-policy.html[{agent} policies]. |
| 105 | ++ |
| 106 | +The selected agent policy should include the integration you want to install on the hosts covered by the agent policy (in this example, {elastic-defend}). |
| 107 | ++ |
| 108 | +[role="screenshot"] |
| 109 | +image:images/install-endpoint/-getting-started-install-endpoint-endpoint-cloud-sec-add-agent-detail.png[Add agent flyout with {elastic-defend} integration highlighted.] |
| 110 | +. Ensure that the **Enroll in {fleet}** option is selected. {elastic-defend} cannot be integrated with {agent} in standalone mode. |
| 111 | +. Select the appropriate platform or operating system for the host, then copy the provided commands. |
| 112 | +. On the host, open a command-line interface and navigate to the directory where you want to install {agent}. Paste and run the commands from {fleet} to download, extract, enroll, and start {agent}. |
| 113 | +. (Optional) Return to the **Add agent** flyout in {fleet}, and observe the **Confirm agent enrollment** and **Confirm incoming data** steps automatically checking the host connection. It may take a few minutes for data to arrive in {es}. |
| 114 | +. After you have enrolled the {agent} on your host, you can click **View enrolled agents** to access the list of agents enrolled in {fleet}. Otherwise, select **Close**. |
| 115 | ++ |
| 116 | +The host will now appear on the **Endpoints** page in the {security-app}. It may take another minute or two for endpoint data to appear in {elastic-sec}. |
| 117 | +. For macOS, continue with <<security-install-endpoint-manually,these instructions>> to grant {elastic-endpoint} the required permissions. |
0 commit comments