Elastic Security: Secure my hosts with endpoint security

Overview

Introduction to Elastic Security

Elastic Security is a unified security solution that brings together SIEM, endpoint, and cloud security into a single platform. This makes it easier to protect, investigate, and respond to security events from all parts of your environment.

In this guide below, you’ll learn how to get started with Elastic Security for Endpoint so you can protect your hosts from malware, ransomware and more.


Let's get started

Create an Elastic Cloud project

Get started with a 14-day trial. Once you go to cloud.elastic.co and create an account. Be sure to select Security with Elasticsearch then SIEM and Security Analytics. In addition, you should select if you're migrating data from somewhere (for the purpose of this guide we'll select "no"), your preferred cloud regions then when you create your first project.

Before you get started with Elastic Security for Endpoint, make sure you've set up your deployment for Elastic Security for SIEM solution first. If you haven't, check out the Elastic Security for SIEM getting started guide.

Once you select View Assets, you'll be brought to the below screen within the following screen.

security endpoint - assets.png

Next you'll select Hosts which will bring you to the endpoint list within Elastic Security.

security endpoint - endpointlist.png

Next you'll configure the policies for your endpoint. Simply click Elastic Defend by your chosen endpoint.

security endpoint - endable protections.png

To take advantage of the complete endpoint detection and response (EDR) capabilities, from here, along the right, simply enable the following protections in your policy:

  • Malware protections
  • Ransomware protections
  • Memory threat protections
  • Malicious behavior protections

For more information on configuring your Elastic Defend policy check out our documentation.

Then select Save and you're ready to start exploring your data.


Working with Elastic Security for Endpoint

Automate troubleshooting

Prior to getting started with automating troubleshooting ensure you know how to do the following view and analyze your data using dashboards as well as configure alerts.

Next, when you automate troubleshooting you're able to deconflict to understand how things are running. Simply select the endpoint name and a flyout will appear. Choose your preferred connector and click Scan.

security endpoint - endpoint flyout.png

You'll see another application that's running on your hosts. Here, McAfee is conflicting with Elastic Security, thus, you want to accept it as a trusted application.

security endpoint - workflow flyout.png

Once you select the application you're brought to the Trusted Application form with a flyout. Here you can fill out the necessary information and select Add trusted application.

security endpoint - trusted apps.png

Investigate and hunt

Elastic is the platform of choice for threat hunting and incident investigation. Let's put it to the test with your data. Use the following resources to perform your own investigations — from initial triage to closing a case.

Next steps

Thanks for taking the time to get started with Elastic Security for endpoint. As you begin your journey with Elastic, be sure to understand some operational, security, and data components you should manage as a user when you deploy across your environment.

Ready to get started? Spin up a free 14-day trial on Elastic Cloud or try out these 15-minute hands-on learnings on Security 101.

Free 14-day trial