You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The default index patterns for Elastic Security events are `auditbeat-*`, `winlogbeat-*`,
38
+
`filebeat-*`, `packetbeat-*`, `endgame-*`, `logs-*`, and `apm-*-transaction*`. To change the default pattern patterns, go to *Stack Management > Advanced Settings > securitySolution:defaultIndex*.
38
39
39
40
[float]
40
-
=== Elastic Endpoint Sensor Management Platform
41
+
=== Elastic Security endpoint agent
41
42
42
-
The Elastic Endpoint Sensor Management Platform (SMP) ships host and network events directly to the SIEM application, and is fully ECS compliant.
43
+
The agent detects and protects against malware, and ships host and network
44
+
events directly to Elastic Security.
43
45
44
46
[float]
45
47
=== Elastic Common Schema (ECS) for normalizing data
@@ -49,7 +51,7 @@ used for storing event data in Elasticsearch. ECS helps users normalize their
49
51
event data to better analyze, visualize, and correlate the data represented in
50
52
their events.
51
53
52
-
SIEM can ingest and normalize events from ECS-compatible data sources.
54
+
Elastic Security can ingest and normalize events from ECS-compatible data sources.
0 commit comments