<

2021

<

april

>
Videos

The essentials of central log collection with WEF and WEC

Learn how to set up proper audit policies, configure your WEF, and set up your WEC server to forward your AD domain’s event logs to Elastic Security — all in this blog post.

Videos

Elastic Stack 7.12.1 released

Elastic Stack 7.12.1 has been released. Read about the updates and bug fixes that have been included.

Videos

Elastic and Alibaba Cloud: Reflecting on our partnership and looking to the future

This year, we’ve recognized Alibaba Cloud as our Ecosystem Partner of the Year to acknowledge their contributions in advocating for free and open technology and developing value for our joint customers over the past three years.

Videos

The essentials of Windows event logging

Being able to collect and process Windows Event Logs has a huge impact on the effectiveness of any cybersecurity team. In this multi-part blog series, we explore all things related to Windows Event Logs. Start here.

Videos

Elastic Cloud is now available on Microsoft Azure in South Central US (Texas)

Elastic Cloud helps you quickly and easily find information, gain insights, and protect your technology investments across AWS, Google Cloud, and Microsoft Azure.

Videos

How a customer turned digital transformation success with Elastic into a partnership opportunity

inq.'s journey with Elastic evolved to support new use cases and to secure a managed security service provider partnership (MSSP) so that their own customers could experience the same digital transformation success they've realized along the way.

Videos

Getting started with free and open Elastic Observability

Learn how to set up and run Elastic Observability and Elasticsearch and Kibana.

Videos

MITRE Engenuity ATT&CK® Round 3: Carbanak + FIN7 vs. the free and open capabilities in Elastic Security

Check out the evolution of Elastic Security, free and open, and evaluated by MITRE.

Videos

How attackers abuse Access Token Manipulation (ATT&CK T1134)

This blog teaches security practitioners how attackers abuse legitimate Windows functionalities to move laterally and compromise Active Directory domains.