- Elastic Cloud Serverless
- Elasticsearch
- Elastic Observability
- Get started
- Observability overview
- Elastic Observability Serverless billing dimensions
- Create an Observability project
- Quickstart: Monitor hosts with Elastic Agent
- Quickstart: Monitor your Kubernetes cluster with Elastic Agent
- Quickstart: Monitor hosts with OpenTelemetry
- Quickstart: Unified Kubernetes Observability with Elastic Distributions of OpenTelemetry (EDOT)
- Quickstart: Collect data with AWS Firehose
- Get started with dashboards
- Applications and services
- Application performance monitoring (APM)
- Get started with traces and APM
- Learn about data types
- Collect application data
- View and analyze data
- Act on data
- Use APM securely
- Reduce storage
- Managed intake service event API
- Troubleshooting
- Synthetic monitoring
- Get started
- Scripting browser monitors
- Configure lightweight monitors
- Manage monitors
- Work with params and secrets
- Analyze monitor data
- Monitor resources on private networks
- Use the CLI
- Configure a Synthetics project
- Multifactor Authentication for browser monitors
- Configure Synthetics settings
- Grant users access to secured resources
- Manage data retention
- Scale and architect a deployment
- Synthetics Encryption and Security
- Troubleshooting
- Application performance monitoring (APM)
- Infrastructure and hosts
- Logs
- Inventory
- Incident management
- Data set quality
- Observability AI Assistant
- Machine learning
- Reference
- Get started
- Elastic Security
- Elastic Security overview
- Security billing dimensions
- Create a Security project
- Elastic Security requirements
- Elastic Security UI
- AI for Security
- Ingest data
- Configure endpoint protection with Elastic Defend
- Manage Elastic Defend
- Endpoints
- Policies
- Trusted applications
- Event filters
- Host isolation exceptions
- Blocklist
- Optimize Elastic Defend
- Event capture and Elastic Defend
- Endpoint protection rules
- Identify antivirus software on your hosts
- Allowlist Elastic Endpoint in third-party antivirus apps
- Elastic Endpoint self-protection features
- Elastic Endpoint command reference
- Endpoint response actions
- Cloud Security
- Explore your data
- Dashboards
- Detection engine overview
- Rules
- Alerts
- Advanced Entity Analytics
- Investigation tools
- Asset management
- Manage settings
- Troubleshooting
- Manage your project
- Changelog
Elastic Security Serverless
editElastic Security Serverless
editElastic Security combines threat detection analytics, cloud native security, and endpoint protection in a single solution, so you can quickly detect, investigate, and respond to threats and vulnerabilities across your environment.
Serverless projects provide you with the existing Elastic Security on-premise and Elastic Cloud deployment functionality, and the following new features and capabilities:
- Continuous onboarding hub at the center of the Get started page
- Security-focused, single-level navigation
- Osquery availability within Investigations
- Assets management for Fleet, endpoints, and Cloud
- Security-specific roles
- Machine learning nodes included, by default
- Developer tools for interacting with your data
Get started
edit- Create a Security project: Create your first serverless Security project.
- Ingest data: Learn how to add your own data to Elastic Security.
How to
edit- Enable detection rules: Activate prebuilt rules from Elastic, and create your own custom rules.
- Protect endpoints: Install and configure real-time endpoint protection with Elastic Defend.
- Secure your cloud: Improve cloud security posture, scan for vulnerabilities, and monitor workloads.
- Triage and respond to alerts: Analyze potential threats and launch investigations.
- Investigate security events: Query security event data and hunt for threats.
- Visualize security data: Use prebuilt dashboards and create your own visualizations.
On this page
Was this helpful?
Thank you for your feedback.