You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/es-overview.asciidoc
+38-8
Original file line number
Diff line number
Diff line change
@@ -41,8 +41,8 @@ logs, and metrics. Common security-related modules are listed
41
41
<<enable-beat-modules, here>>.
42
42
* The {security-app} in {kib} is used to manage the *Detection engine*,
43
43
*Cases*, and *Timeline*, as well as administer hosts running Endpoint Security:
44
-
** Detection engine - Automatically searches for suspicious host and network
45
-
activity via:
44
+
** Detection engine: Automatically searches for suspicious host and network
45
+
activity via the following:
46
46
*** <<detection-engine-overview, Detection rules>>: Periodically search the data
47
47
({es} indices) sent from your hosts for suspicious events. When a suspicious
48
48
event is discovered, a detection alert is generated. External systems, such as
@@ -55,14 +55,14 @@ values that can be used as part of an exception's conditions. When
55
55
{es-sec-endpoint} is installed on your hosts, you can add malware exceptions
56
56
directly to the endpoint from the Security app.
57
57
*** <<included-jobs, {ml-cap} jobs>>: Automatic anomaly detection of host and
58
-
network events. Anomaly scores are provided per host, and can be used with
58
+
network events. Anomaly scores are provided per host and can be used with
59
59
detection rules.
60
60
** <<timelines-ui, Timeline>>: Workspace for investigating alerts and events.
61
61
Timelines use queries and filters to drill down into events related to
62
62
a specific incident. Timeline templates are attached to rules and use predefined
63
63
queries when alerts are investigated. Timelines can be saved and shared with
64
64
others, as well as attached to Cases.
65
-
** <<cases-overview, Cases>>: Internal system for opening, tracking, and sharing
65
+
** <<cases-overview, Cases>>: An internal system for opening, tracking, and sharing
66
66
security issues directly in the Security app. Cases can be integrated with
67
67
external ticketing systems.
68
68
** <<admin-page-ov, Administration>>: View and manage hosts running {es-sec-endpoint}.
@@ -76,7 +76,7 @@ For more background information, see:
76
76
* https://www.elastic.co/products/elasticsearch[{es}]: A real-time,
77
77
distributed storage, search, and analytics engine. {es} excels at indexing
78
78
streams of semi-structured data, such as logs or metrics.
79
-
* https://www.elastic.co/products/kibana[{kib}]: An opensource analytics and
79
+
* https://www.elastic.co/products/kibana[{kib}]: An open-source analytics and
80
80
visualization platform designed to work with {es}. You use {kib} to search,
81
81
view, and interact with data stored in {es} indices. You can easily perform
82
82
advanced data analysis and visualize your data in a variety of charts, tables,
@@ -88,9 +88,38 @@ and maps.
88
88
The Elastic https://www.elastic.co/endpoint-security/[Endpoint Security agent integration]
89
89
provides capabilities such as collecting events, detecting and preventing
90
90
malicious activity, exceptions, and artifact delivery. The
91
-
{fleet-guide}/fleet-overview.html[{fleet}] is used to
91
+
{fleet-guide}/fleet-overview.html[{fleet}] app is used to
92
92
install and manage Elastic agents and integrations on your hosts.
93
93
94
+
[discrete]
95
+
[[self-protection]]
96
+
==== Elastic Endpoint self-protection
97
+
98
+
Self-protection means that {elastic-endpoint} has guards against users and attackers that may try to interfere with its functionality. This protection feature is consistently enhanced to prevent attackers who may attempt to use newer, more sophisticated tactics to interfere with the {elastic-endpoint}. Self-protection is enabled by default when {elastic-endpoint} installs on supported platforms, listed below.
99
+
100
+
Self-protection is enabled on the following 64-bit Windows versions:
101
+
102
+
* Windows 8.1
103
+
* Windows 10
104
+
* Windows Server 2012 R2
105
+
* Windows Server 2016
106
+
* Windows Server 2019
107
+
108
+
Self-protection is also enabled on the following macOS versions:
109
+
110
+
* macOS 10.15 (Catalina)
111
+
* macOS 11 (Big Sur)
112
+
113
+
NOTE: Other Windows and macOS variants (and all Linux distributions) do not have self-protection.
114
+
115
+
For {stack} version >= 7.11.0, self-protection defines the following permissions:
116
+
117
+
* Users -- even Administrator/root -- *cannot* delete {elastic-endpoint} files (located at `c:\Program Files\Elastic\Endpoint` on Windows, and `/Library/Elastic/Endpoint` on macOS).
118
+
* Users *cannot* terminate the {elastic-endpoint} program or service.
119
+
* Administrator/root users *can* read the Endpoint's files. On Windows, the easiest way to read Endpoint files is to start an Administrator `cmd.exe` prompt. On macOS, an Administrator can use the `sudo` command.
120
+
* Administrator/root users *can* stop the {elastic-agent}'s service. On Windows, run the `sc stop "Elastic Agent"` command. On macOS, run the `sudo launchctl stop elastic-agent` command.
121
+
122
+
94
123
[discrete]
95
124
[[siem-integration]]
96
125
=== Integration with other Elastic products
@@ -113,12 +142,13 @@ By default, {es-sec} monitors {apm-app-ref}/apm-getting-started.html[APM]
113
142
index patterns in the `securitySolution:defaultIndex` setting ({kib} -> Stack Management -> Advanced Settings -> `securitySolution:defaultIndex`).
114
143
115
144
[discrete]
116
-
=== Third-party collectors mapped to ECS
145
+
[[ecs-compliant-reqs]]
146
+
=== ECS compliance data requirements
117
147
118
148
The {ecs-ref}[Elastic Common Schema (ECS)] defines a common set of fields to be used for
119
149
storing event data in Elasticsearch. ECS helps users normalize their event data
120
150
to better analyze, visualize, and correlate the data represented in their
121
-
events. {es-sec} can ingest and normalize events from any ECS-compliant data source.
151
+
events. {es-sec} supports events and indicator index data from any ECS-compliant data source.
122
152
123
153
IMPORTANT: {es-sec} requires {ecs-ref}[ECS-compliant data]. If you use third-party data collectors to ship data to {es}, the data must be mapped to ECS.
124
154
<<siem-field-reference>> lists ECS fields used in {es-sec}.
0 commit comments