Skip to content

Commit

Permalink
Removes tech preview banners and technical preview limitations page (#…
Browse files Browse the repository at this point in the history
  • Loading branch information
benironside authored Nov 20, 2024
1 parent 643b772 commit 9727cd4
Show file tree
Hide file tree
Showing 141 changed files with 2 additions and 164 deletions.
1 change: 0 additions & 1 deletion docs/serverless/AI-for-security/ai-assistant.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Elastic AI Assistant is a generative AI open-code chat assistant.
// :keywords: security, overview, get-started

preview:[]

The Elastic AI Assistant utilizes generative AI to bolster your cybersecurity operations team. It allows users to interact with {elastic-sec} for tasks such as alert investigation, incident response, and query generation or conversion using natural language and much more.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Learn about advanced behavioral detections and its capabilities.
// :keywords: serverless, security, overview, analyze

preview:[]

Elastic's {ml} capabilities and advanced correlation, scoring, and visualization techniques can help you identify potential behavioral threats that may be associated with security incidents.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,8 +4,6 @@
// :description: Learn about Advanced Entity Analytics and its capabilities.
// :keywords: serverless, security, overview, analyze

preview:[]

Advanced Entity Analytics generates a set of threat detection and risk analytics that allows you to expedite alert triage and hunt for new threats from within an entity's environment. This feature combines the power of the SIEM detection engine and Elastic's {ml} capabilities to identify unusual user behaviors and generate comprehensive risk analytics for hosts and users.

Advanced Entity Analytics provides two key capabilities:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,6 @@
<titleabbrev>View risk score data</titleabbrev>
++++

preview:[]

The {security-app} provides several options to monitor the change in the risk posture of hosts and users from your environment. Use the following places in the {security-app} to view and analyze risk score data:

* <<security-analyze-risk-score-data-entity-analytics-dashboard,Entity Analytics dashboard>>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,8 +4,6 @@
// :description: Learn how to use asset criticality to improve your security operations.
// :keywords: serverless, security, overview, analyze

preview:[]

.Requirements
[NOTE]
====
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Detect internal and external threats using behavioral detection integrations.
// :keywords: serverless, security, overview, analyze

preview:[]

Behavioral detection identifies potential internal and external threats based on user and host activity. It uses a threat-centric approach to flag suspicious activity by analyzing patterns, anomalies, and context enrichment.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Learn about the risk scoring engine and its features.
// :keywords: serverless, security, overview, analyze

preview:[]

Entity risk scoring is an advanced {elastic-sec} analytics feature that helps security analysts detect changes in an entity's risk posture, hunt for new threats, and prioritize incident response.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Use the power of machine learning to detect outliers and suspicious events.
// :keywords: serverless, security, overview, manage

preview:[]

{ml-docs}/ml-ad-overview.html[{ml-cap}] functionality is available when
you have the appropriate role. Refer to <<security-ml-requirements,Machine learning job and rule requirements>> for more information.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Requirements for using {ml} jobs and rules.
// :keywords: serverless, security, reference, manage

preview:[]

To run and create {ml} jobs and rules, you need the appropriate <<general-assign-user-roles,user role>>.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,5 @@

// :keywords: serverless, security, reference

preview:[]

Refer to {security-guide}/prebuilt-ml-jobs.html[Prebuilt job reference] for information on available prebuilt {ml} jobs.
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Learn how to fine-tune and filter anomaly results.
// :keywords: serverless, security, how-to

preview:[]

To gain clearer insights into real threats, you can tune the anomaly results. The following procedures help to reduce the number of false positives:

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@
<titleabbrev>Turn on risk scoring</titleabbrev>
++++

preview:[]

.Requirements
[NOTE]
Expand Down
1 change: 0 additions & 1 deletion docs/serverless/alerts/alert-schema.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: The alert schema describes all the fields present in alert events.
// :keywords: serverless, security, alerting, reference, manage

preview:[]

{elastic-sec} stores alerts that have been generated by detection rules in hidden {es} indices. The index pattern is `.alerts-security.alerts-<space-id->`.

Expand Down
1 change: 0 additions & 1 deletion docs/serverless/alerts/alert-suppression.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@
<titleabbrev>Suppress alerts</titleabbrev>
++++

preview:[]

.Requirements and notice
[IMPORTANT]
Expand Down
1 change: 0 additions & 1 deletion docs/serverless/alerts/alerts-ui-manage.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@
<titleabbrev>Alerts</titleabbrev>
++++

preview:[]

The Alerts page displays all detection alerts.

Expand Down
1 change: 0 additions & 1 deletion docs/serverless/alerts/query-alert-indices.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Index patterns for querying alert data.
// :keywords: serverless, security, how-to

preview:[]

This page explains how you should query alert indices, for example, when building rule queries, custom dashboards, or visualizations. For more information about alert event field definitions, review the <<security-alert-schema,Alert schema>>.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: A comparison of alert-reduction features.
// :keywords: serverless, security, how-to

preview:[]

{elastic-sec} offers several features to help reduce the number of notifications and alerts generated by your detection rules. This table provides a general comparison of these features, with links for more details:

Expand Down
1 change: 0 additions & 1 deletion docs/serverless/alerts/signals-to-cases.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@
<titleabbrev>Add alerts to cases</titleabbrev>
++++

preview:[]

From the Alerts table, you can attach one or more alerts to a <<signals-to-new-cases,new case>> or <<signals-to-existing-cases,an existing one>>. Alerts from any rule type can be added to a case.

Expand Down
1 change: 0 additions & 1 deletion docs/serverless/alerts/view-alert-details.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@
<titleabbrev>View alert details</titleabbrev>
++++

preview:[]

To learn more about an alert, click the **View details** button from the Alerts table. This opens the alert details flyout, which helps you understand and manage the alert.

Expand Down
1 change: 0 additions & 1 deletion docs/serverless/alerts/visual-event-analyzer.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Examine events and processes in a graphical timeline.
// :keywords: serverless, security, how-to

preview:[]

{elastic-sec} allows any event detected by {elastic-endpoint} to be analyzed using a process-based visual analyzer, which shows a graphical timeline of processes that led up to the alert and the events that occurred immediately after. Examining events in the visual event analyzer is useful to determine the origin of potentially malicious activity and other areas in your environment that may be compromised. It also enables security analysts to drill down into all related hosts, processes, and other events to aid in their investigations.

Expand Down
1 change: 0 additions & 1 deletion docs/serverless/alerts/visualize-alerts.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@
<titleabbrev>Visualize alerts</titleabbrev>
++++

preview:[]

Visualize and group detection alerts by specific parameters in the visualization section of the Alerts page.

Expand Down
1 change: 0 additions & 1 deletion docs/serverless/assets/asset-management.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,6 @@

// :keywords: serverless, security, overview, manage

preview:[]

The **Assets** page allows you to manage the following features:

Expand Down
2 changes: 0 additions & 2 deletions docs/serverless/billing.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -4,8 +4,6 @@
// :description: Learn about how Security usage affects pricing.
// :keywords: serverless, security, overview

preview:[]

{elastic-sec} serverless projects provide you with all the capabilities of {elastic-sec} to perform SIEM, security analytics, endpoint security, and cloud security workflows. Projects are provided using a Software as a Service (SaaS) model, and pricing is entirely consumption based. Security Analytics/SIEM is available in two tiers of carefully selected features to enable common security operations:

* **Security Analytics Essentials** — Includes everything you need to operationalize traditional SIEM in most organizations.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@

// tag::content[]

preview:[]

The Benchmarks page lets you view the cloud security posture (CSP) benchmarks for the <<security-cspm,Cloud security posture management>> (CSPM) and <<security-kspm,Kubernetes security posture management>> (KSPM) integrations.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Helps you improve your cloud security posture.
// :keywords: serverless, security, overview, cloud security

preview:[]

Elastic Security for Cloud helps you improve your cloud security posture by comparing your cloud configuration to best practices, and scanning for vulnerabilities. It also helps you monitor and investigate your cloud workloads inside and outside Kubernetes.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Use cloud workload protection to monitor and protect your Linux VMs.
// :keywords: serverless, security, overview, cloud security

preview:[]

Cloud workload protection helps you monitor and protect your Linux VMs. It uses the <<security-install-edr,{elastic-defend}>> integration to capture cloud workload telemetry containing process, file, and network activity.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@

// tag::content[]

preview:[]

The **Misconfigurations** tab on the **Findings** page displays the configuration risks identified by the <<security-cspm,CSPM>> and <<security-kspm,KSPM>> integrations, as well as data from <<ingest-third-party-cloud-security-data, third-party integrations>>.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Start monitoring the security posture of your Azure cloud assets.
// :keywords: serverless, security, overview, cloud security

preview:[]

[discrete]
[[cspm-overview-azure]]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Start monitoring the security posture of your GCP cloud assets.
// :keywords: serverless, security, overview, cloud security

preview:[]

[discrete]
[[cspm-overview-gcp]]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Start monitoring the security posture of your AWS cloud assets.
// :keywords: serverless, security, overview, cloud security

preview:[]

[discrete]
[[cspm-overview]]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Frequently asked questions about the CSPM and KSPM integrations.
// :keywords: serverless, security, overview, cloud security

preview:[]

[discrete]
[[cspm-security-posture-faq]]
Expand Down
1 change: 0 additions & 1 deletion docs/serverless/cloud-native-security/cspm.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Identify misconfigured cloud resources.
// :keywords: serverless, security, overview

preview:[]

The Cloud Security Posture Management (CSPM) feature discovers and evaluates the services in your cloud environment — like storage, compute, IAM, and more — against configuration security guidelines defined by the https://www.cisecurity.org/[Center for Internet Security] (CIS) to help you identify and remediate risks that could undermine the confidentiality, integrity, and availability of your cloud data.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Secure your containerized workloads and start detecting threats and vulnerabilities.
// :keywords: security, how-to, get-started, cloud security

preview:[]

beta:[]

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Identify and block unexpected system behavior in Kubernetes containers.
// :keywords: security, cloud, reference, manage

preview:[]

beta:[]

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Learn to build policies for cloud workload protection for Kubernetes.
// :keywords: security, cloud, reference, manage, cloud security

preview:[]

To unlock the full functionality of the Defend for Containers (D4C) integration, you'll need to understand its policy syntax. This will enable you to construct policies that precisely allow expected container behaviors and prevent unexpected behaviors — thereby hardening your container workloads' security posture.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Capture environment variables from monitored Linux sessions.
// :keywords: serverless, security, overview, cloud security

preview:[]

You can configure an {agent} policy to capture up to five environment variables (`env vars`).

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,6 @@

// :keywords: serverless, security, overview, cloud security

preview:[]

This page explains how to configure the Kubernetes Security Posture Management (KSPM) integration.

Expand Down
1 change: 0 additions & 1 deletion docs/serverless/cloud-native-security/kspm.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Identify configuration risks in your Kubernetes clusters.
// :keywords: serverless, security, overview, cloud security

preview:[]

[discrete]
[[kspm-overview]]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Frequently asked questions about the CSPM integration.
// :keywords: serverless, security, overview, cloud security

preview:[]

[discrete]
[[cspm-faq]]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Discovers and evaluates your cloud services and resources against security best practices.
// :keywords: serverless, security, overview, cloud security

preview:[]

[discrete]
== Overview
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Examine Linux process data in context with Session View.
// :keywords: serverless, security, overview, how to, cloud security

preview:[]

Session View is an investigation tool that allows you to examine Linux process data organized
in a tree-like structure according to the Linux logical event model, with processes organized by parentage and time of execution.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Frequently asked questions about the CNVM integration.
// :keywords: security, cloud, reference, manage

preview:[]

Frequently asked questions about the Cloud Native Vulnerability Management (CNVM) integration and features.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: The Findings page displays information about cloud vulnerabilities found in your environment.
// :keywords: serverless, security, overview, cloud security

preview:[]

The **Vulnerabilities** tab on the Findings page displays the vulnerabilities detected by the <<security-vuln-management-overview,CNVM integration>>, as well as those detected by <<ingest-third-party-cloud-security-data, third-party integrations>>.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Set up cloud native vulnerability management.
// :keywords: serverless, security, overview, cloud security

preview:[]

This page explains how to set up Cloud Native Vulnerability Management (CNVM).

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Find and track vulnerabilities in your cloud.
// :keywords: serverless, security, overview, cloud security

preview:[]

Elastic's Cloud Native Vulnerability Management (CNVM) feature helps you identify known vulnerabilities in your cloud workloads.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,6 @@
<titleabbrev>Cloud Security Posture</titleabbrev>
++++

preview:[]

The Cloud Security Posture dashboard summarizes your cloud infrastructure's overall performance against <<security-benchmark-rules,security guidelines>> defined by the Center for Internet Security (CIS). To start collecting this data, refer to <<security-cspm-get-started,Get started with Cloud Security Posture Management>> or <<security-get-started-with-kspm,Get started with Kubernetes Security Posture Management>>.

Expand Down
1 change: 0 additions & 1 deletion docs/serverless/dashboards/dashboards-overview.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@
// :description: Dashboards give you insight into your security environment.
// :keywords: security, overview, visualize, monitor, analyze

preview:[]

The {security-app}'s default dashboards provide useful visualizations of your security environment. To view them in {elastic-sec}, select **Dashboards** from the navigation menu. From the Dashboards page, you can access the default dashboards, as well as create and access custom dashboards.

Expand Down
1 change: 0 additions & 1 deletion docs/serverless/dashboards/data-quality-dash.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@
<titleabbrev>Data Quality</titleabbrev>
++++

preview:[]

The Data Quality dashboard shows you whether your data is correctly mapped to the https://www.elastic.co/guide/en/ecs/current/ecs-reference.html[Elastic Common Schema] (ECS). Successful {ref}/mapping.html[mapping] enables you to search, visualize, and interact with your data throughout {elastic-sec}.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@
<titleabbrev>Entity Analytics</titleabbrev>
++++

preview:[]

The Entity Analytics dashboard provides a centralized view of emerging insider threats - including host risk, user risk, and anomalies from within your network. Use it to triage, investigate, and respond to these emerging threats.

Expand Down
Loading

0 comments on commit 9727cd4

Please sign in to comment.