Installation and Configuration Manual


About Enterprise Security

About Enterprise Security

Enterprise security includes the management and protection of data necessary to the enterprise, including infrastructure, processes, personnel, and security systems. Enterprise security requires visibility into any security-relevant threats found in your enterprise infrastructure, both in-bound and out-bound. Security practitioners need the ability to find and address root-cause questions about malicious and anomalous events throughout the IT infrastructure.

To be effective, security practitioners need to capture, monitor, and report on data from enterprise security devices, systems, and applications. With the correct information, issues are identified and security administrators can investigate and resolve security threats.

This documentation applies to the following versions of ES: 2.2 , 2.2.1 , 2.4 , 2.4.1 , 3.0 , 3.0.1 View the Article History for its revisions.

You must be logged into in order to post comments. Log in now.

Was this documentation topic helpful?

If you'd like to hear back from us, please provide your email address:

We'd love to hear what you think about this topic or the documentation as a whole. Feedback you enter here will be delivered to the documentation team.

Feedback submitted, thanks!