Skip to content

Commit 91d4bdc

Browse files
authored
[DOCS] Updates to Elastic Security Overview (#476)
1 parent 6f110cb commit 91d4bdc

File tree

1 file changed

+38
-8
lines changed

1 file changed

+38
-8
lines changed

docs/es-overview.asciidoc

+38-8
Original file line numberDiff line numberDiff line change
@@ -41,8 +41,8 @@ logs, and metrics. Common security-related modules are listed
4141
<<enable-beat-modules, here>>.
4242
* The {security-app} in {kib} is used to manage the *Detection engine*,
4343
*Cases*, and *Timeline*, as well as administer hosts running Endpoint Security:
44-
** Detection engine - Automatically searches for suspicious host and network
45-
activity via:
44+
** Detection engine: Automatically searches for suspicious host and network
45+
activity via the following:
4646
*** <<detection-engine-overview, Detection rules>>: Periodically search the data
4747
({es} indices) sent from your hosts for suspicious events. When a suspicious
4848
event is discovered, a detection alert is generated. External systems, such as
@@ -55,14 +55,14 @@ values that can be used as part of an exception's conditions. When
5555
{es-sec-endpoint} is installed on your hosts, you can add malware exceptions
5656
directly to the endpoint from the Security app.
5757
*** <<included-jobs, {ml-cap} jobs>>: Automatic anomaly detection of host and
58-
network events. Anomaly scores are provided per host, and can be used with
58+
network events. Anomaly scores are provided per host and can be used with
5959
detection rules.
6060
** <<timelines-ui, Timeline>>: Workspace for investigating alerts and events.
6161
Timelines use queries and filters to drill down into events related to
6262
a specific incident. Timeline templates are attached to rules and use predefined
6363
queries when alerts are investigated. Timelines can be saved and shared with
6464
others, as well as attached to Cases.
65-
** <<cases-overview, Cases>>: Internal system for opening, tracking, and sharing
65+
** <<cases-overview, Cases>>: An internal system for opening, tracking, and sharing
6666
security issues directly in the Security app. Cases can be integrated with
6767
external ticketing systems.
6868
** <<admin-page-ov, Administration>>: View and manage hosts running {es-sec-endpoint}.
@@ -76,7 +76,7 @@ For more background information, see:
7676
* https://www.elastic.co/products/elasticsearch[{es}]: A real-time,
7777
distributed storage, search, and analytics engine. {es} excels at indexing
7878
streams of semi-structured data, such as logs or metrics.
79-
* https://www.elastic.co/products/kibana[{kib}]: An open source analytics and
79+
* https://www.elastic.co/products/kibana[{kib}]: An open-source analytics and
8080
visualization platform designed to work with {es}. You use {kib} to search,
8181
view, and interact with data stored in {es} indices. You can easily perform
8282
advanced data analysis and visualize your data in a variety of charts, tables,
@@ -88,9 +88,38 @@ and maps.
8888
The Elastic https://www.elastic.co/endpoint-security/[Endpoint Security agent integration]
8989
provides capabilities such as collecting events, detecting and preventing
9090
malicious activity, exceptions, and artifact delivery. The
91-
{fleet-guide}/fleet-overview.html[{fleet}] is used to
91+
{fleet-guide}/fleet-overview.html[{fleet}] app is used to
9292
install and manage Elastic agents and integrations on your hosts.
9393

94+
[discrete]
95+
[[self-protection]]
96+
==== Elastic Endpoint self-protection
97+
98+
Self-protection means that {elastic-endpoint} has guards against users and attackers that may try to interfere with its functionality. This protection feature is consistently enhanced to prevent attackers who may attempt to use newer, more sophisticated tactics to interfere with the {elastic-endpoint}. Self-protection is enabled by default when {elastic-endpoint} installs on supported platforms, listed below.
99+
100+
Self-protection is enabled on the following 64-bit Windows versions:
101+
102+
* Windows 8.1
103+
* Windows 10
104+
* Windows Server 2012 R2
105+
* Windows Server 2016
106+
* Windows Server 2019
107+
108+
Self-protection is also enabled on the following macOS versions:
109+
110+
* macOS 10.15 (Catalina)
111+
* macOS 11 (Big Sur)
112+
113+
NOTE: Other Windows and macOS variants (and all Linux distributions) do not have self-protection.
114+
115+
For {stack} version >= 7.11.0, self-protection defines the following permissions:
116+
117+
* Users -- even Administrator/root -- *cannot* delete {elastic-endpoint} files (located at `c:\Program Files\Elastic\Endpoint` on Windows, and `/Library/Elastic/Endpoint` on macOS).
118+
* Users *cannot* terminate the {elastic-endpoint} program or service.
119+
* Administrator/root users *can* read the Endpoint's files. On Windows, the easiest way to read Endpoint files is to start an Administrator `cmd.exe` prompt. On macOS, an Administrator can use the `sudo` command.
120+
* Administrator/root users *can* stop the {elastic-agent}'s service. On Windows, run the `sc stop "Elastic Agent"` command. On macOS, run the `sudo launchctl stop elastic-agent` command.
121+
122+
94123
[discrete]
95124
[[siem-integration]]
96125
=== Integration with other Elastic products
@@ -113,12 +142,13 @@ By default, {es-sec} monitors {apm-app-ref}/apm-getting-started.html[APM]
113142
index patterns in the `securitySolution:defaultIndex` setting ({kib} -> Stack Management -> Advanced Settings -> `securitySolution:defaultIndex`).
114143

115144
[discrete]
116-
=== Third-party collectors mapped to ECS
145+
[[ecs-compliant-reqs]]
146+
=== ECS compliance data requirements
117147

118148
The {ecs-ref}[Elastic Common Schema (ECS)] defines a common set of fields to be used for
119149
storing event data in Elasticsearch. ECS helps users normalize their event data
120150
to better analyze, visualize, and correlate the data represented in their
121-
events. {es-sec} can ingest and normalize events from any ECS-compliant data source.
151+
events. {es-sec} supports events and indicator index data from any ECS-compliant data source.
122152

123153
IMPORTANT: {es-sec} requires {ecs-ref}[ECS-compliant data]. If you use third-party data collectors to ship data to {es}, the data must be mapped to ECS.
124154
<<siem-field-reference>> lists ECS fields used in {es-sec}.

0 commit comments

Comments
 (0)