- Welcome to Elastic serverless
- Elasticsearch
- Serverless differences
- Elasticsearch billing dimensions
- Get started
- Connect to your endpoint
- Client libraries
- Get started with the serverless Go client
- Get started with the serverless Java client
- Get started with the serverless .NET client
- Get started with the serverless Node.js client
- Get started with the serverless PHP client
- Get started with the serverless Python client
- Get started with the serverless Ruby client
- REST APIs
- Developer tools
- Ingest your data
- Search your data
- Explore your data
- Playground
- Elastic Observability
- Observability overview
- Quickstarts
- Observability billing dimensions
- Create an Observability project
- Log monitoring
- Inventory
- Application performance monitoring (APM)
- Get started with traces and APM
- Send APM data to Elastic
- View and analyze traces
- APM data types
- Distributed tracing
- Reduce your data usage
- Keep APM data secure
- Troubleshooting
- Reference
- Infrastructure monitoring
- Synthetic monitoring
- Get started
- Scripting browser monitors
- Configure lightweight monitors
- Manage monitors
- Work with params and secrets
- Analyze monitor data
- Monitor resources on private networks
- Use the CLI
- Configure a Synthetics project
- Multifactor Authentication for browser monitors
- Configure Synthetics settings
- Grant users access to secured resources
- Manage data retention
- Scale and architect a deployment
- Synthetics Encryption and Security
- Troubleshooting
- Dashboards
- Alerting
- SLOs
- Cases
- AIOps
- Data set quality monitoring
- AI Assistant
- Elastic Entity Model
- Limitations
- Elastic Security
- Elastic Security overview
- Security billing dimensions
- Create a Security project
- Elastic Security requirements
- Elastic Security UI
- AI for Security
- Ingest data
- Configure endpoint protection with Elastic Defend
- Manage Elastic Defend
- Endpoint response actions
- Secure cloud native resources
- Explore your data
- Dashboards
- Detection engine overview
- Rules
- Alerts
- Advanced Entity Analytics
- Investigation tools
- Asset management
- Manage settings
- Troubleshooting
- Dev tools
- Project and management settings
Elastic Security serverless
editElastic Security serverless
editElastic Security combines threat detection analytics, cloud native security, and endpoint protection in a single solution, so you can quickly detect, investigate, and respond to threats and vulnerabilities across your environment.
Serverless projects provide you with the existing Elastic Security on-premise and Elastic Cloud deployment functionality, and the following new features and capabilities:
- Continuous onboarding hub at the center of the Get started page
- Security-focused, single-level navigation
- Osquery availability within Investigations
- Assets management for Fleet, endpoints, and Cloud
- Security-specific roles
- Machine learning nodes included, by default
- Developer tools for interacting with your data
Get started
edit- Create a Security project: Create your first Serverless Security project.
- Ingest data: Learn how to add your own data to Elastic Security.
How to
edit- Enable detection rules: Activate prebuilt rules from Elastic, and create your own custom rules.
- Protect endpoints: Install and configure real-time endpoint protection with Elastic Defend.
- Secure your cloud: Improve cloud security posture, scan for vulnerabilities, and monitor workloads.
- Triage and respond to alerts: Analyze potential threats and launch investigations.
- Investigate security events: Query security event data and hunt for threats.
- Visualize security data: Use prebuilt dashboards and create your own visualizations.
On this page
Was this helpful?
Thank you for your feedback.