-
Notifications
You must be signed in to change notification settings - Fork 195
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Browse files
Browse the repository at this point in the history
* Issue #63: Add Endpoint installation instructions * Add installation instructions to index * Small tweak to intro * add image for verifying datasets. Fix ordered lists * Remove hosts-overview reference * Fix ordered list * Fix level 2 header in preview. Add link to full disk access * Switch images to new directory * Fix TOC * Fix headers * Fix headers by adding float tags * Make top Ingest manager a warning * Address Eriks feedback. Add identifiers to each heder * Try removing xpack. Incorporate feedback * Fix code block for beats * Remove Ingest manager file. * Remove Ingest Manager warning * Experiment with header structure * Rearrange TOC * Fix toc * Final TOC fix * Fix title header on main page * Another TOC fix * TOC fixes * Fix full disk access include * [DOCS] Updates nesting in Getting Started * Fix broken link * Add part intro to Investigate Events section * Fix Investigate Event build errors Co-authored-by: lcawl <lcawley@elastic.co> Co-authored-by: Nate Archer <12628964+DonNateR@users.noreply.github.com> Co-authored-by: lcawl <lcawley@elastic.co>
- Loading branch information
1 parent
0285a6b
commit b7b1b8a
Showing
15 changed files
with
116 additions
and
44 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,9 +1,11 @@ | ||
[chapter] | ||
[[investigate-events]] | ||
|
||
= Investigate events | ||
|
||
[partintro] | ||
--- | ||
This sections describes how to use timelines and the timeline graphical interface to investigate events. | ||
--- | ||
|
||
include::timeline-ui-overview.asciidoc[] | ||
include::timeline-templates.asciidoc[] | ||
include::timeline-ui-overview.asciidoc[leveloffset=+1] | ||
include::timeline-templates.asciidoc[leveloffset=+1] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+404 KB
docs/getting-started/images/install-endpoint/add-elastic-endpoint-security.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+222 KB
docs/getting-started/images/install-endpoint/endpoint-configuration.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,74 @@ | ||
[[install-endpoint]] | ||
[role="xpack"] | ||
= Configure and install Elastic Security | ||
|
||
|
||
Like other Elastic integrations, Elastic Endpoint Security can be integrated into the Elastic Agent through {ingest-guide}/ingest-management-overview.html[Ingest Manager]. Upon configuration, the integration allows the Elastic Agent to monitor for events on your host and send data to the Elastic Security app. | ||
|
||
NOTE: Configuring the Endpoint Integration on the Elastic Agent requires that the user have permission to use Ingest Manager in Kibana. | ||
|
||
[discrete] | ||
[[security-before-you-begin]] | ||
== Before you begin | ||
|
||
If you're using the Elastic Agent on macOS Mojave (10.14) or later, ensure that you have enabled <<sensor-full-disk-access,Full Disk Access>>. Lastly, review the Elastic Security system requirements. | ||
|
||
[discrete] | ||
[[add-security-integration]] | ||
== Add Elastic Security integration | ||
|
||
1. In Kibana, select **Security** > **Administration**. If this is not your first time using Elastic Security, select **Ingest Manager** > **Integrations** and search for "Elastic Endpoint Security". | ||
+ | ||
[role="screenshot"] | ||
image::images/install-endpoint/security-integration.png[] | ||
+ | ||
2. On the Administration page of the security app or the Elastic Endpoint Security integration page in Ingest Manager, select **Add Endpoint Security**. The integration configuration page appears. | ||
3. Select a configuration for the Elastic Agent. You can use either the **Default config**, or adds security integration to a custom or existing configuration. For more details on Elastic Agent configuration settings, see {ingest-guide}/elastic-agent-configuration.html[Configuration settings]. | ||
4. Configure the Elastic Endpoint Security integration with a name and optional description. When done configuring, select **Save integration**. Kibana redirects you back to the administration section of the security app. | ||
+ | ||
[role="screenshot"] | ||
image::images/install-endpoint/add-elastic-endpoint-security.png[] | ||
+ | ||
5. On the Enable Elastic Endpoint Security on your Agent's page, select the name of your new integration. To enroll your Agents with Endpoint Security, select **Enroll Agent**. | ||
6. Kibana redirects you back to Ingest manager to add the Elastic Agent to your host. | ||
|
||
[discrete] | ||
[[enroll-security-agent]] | ||
== Configure and enroll Elastic Agent | ||
|
||
There are two methods to install the Elastic Agent with the Elastic Endpoint Security integration using Ingest Manager. | ||
|
||
[discrete] | ||
=== Enroll with Fleet | ||
|
||
1. Go to Ingest Manager. Select **Overview** > **Add agent**. | ||
+ | ||
[role="screenshot"] | ||
image::images/install-endpoint/add-agent.png[] | ||
+ | ||
2. In the Add agent pane of the Configurations section, download the Elastic Agent on your host's machine. | ||
3. After the download is complete, select an agent configuration. The selected integrations should include **Elastic Endpoint Security**. | ||
+ | ||
[role="screenshot"] | ||
image::images/install-endpoint/endpoint-configuration.png[] | ||
+ | ||
4. After the Elastic Agent is installed on your host machine, open a command-line interface, and navigate to your Agent's directory. Copy the commands from Ingest Manager for your OS to enroll and run the Agent. | ||
|
||
After you have enrolled the Elastic Agent on your host, select **Continue**. The host now appears on the Hosts view page inside the Elastic Security app. | ||
|
||
[discrete] | ||
=== Standalone mode | ||
|
||
If you want to manage the Elastic Agent without using Fleet to manage your hosts, you can enroll the Agent on your host in {ingest-guide}/ingest-management-getting-started.html#agent-standalone-mode. | ||
|
||
1. In the Add agent pane, select the **Standalone mode** tab. | ||
2. Download the Elastic Agent on your host's machine and select an agent configuration. | ||
3. In the installed Agent's directory, create a file named `elastic-agent.yml`. Copy your configuration into the file from Step 3 of the Add agent pane. Remember to modify `ES_USERNAME` and `ES_PASSWORD` in the `outputs` section with your Elastic username and password. | ||
4. Save the file and start the Agent using `./elastic-agent run` for your OS. | ||
5. Once the Agent begins to send data, verify that the data is viewable in Kibana by going to **Ingest Manager** > **Datasets**. | ||
|
||
[role="screenshot"] | ||
image::images/install-endpoint/datasets.png[] | ||
|
||
|
||
TIP: To unenroll an agent from your host, see {ingest-guide}/unenroll-elastic-agent.html[Unenroll Elastic Agent]. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters