Hi, Im only using Fleet-managed workloads in my 7.17-cluster, using Windows, System and Endpoint-integrations. (so filebeat is being utilized on the workloads)
Can I use the Threat Intel-module to enrich alerts, and if so how do I configure it with Fleet?
I only use Fleet-enrolled agents everywhere, and i know that Filebeat is being distributed through fleet by the misc. integrations, but I haven't fiddled with filebeat manually.
I do have Threat Intel activated in Elastic's "Security Overview", and AbuseCH and some other feeds activated, but it shows 0 on all feeds. Do I have to upgrade to 8.x to get further?
Hey, the Threat Intelligence card in your screenshot support only Filebeat threat integrations on version 7.17.
Version 8.0 supports both Fleet agent threat intel (by default) and Filebeat (need to configure)- here is the doc, how to enable Threat Intel. So, if you use fleet agents and you want to see the coming threat indicators in this view it's worth updating to 8.x.
Although, is potentially possible to have enrichment on alerts not only from Filebeat on version 7.17.
First, we need to be sure that you have threat indicators in your Elasticsearch.
If it will return some documents, then you have threat indicators in your system.
Then you can update the securitySolution:defaultThreatIndexadvanced setting to logs-ti*,filebeat-*
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.