The following topics provide information about securing the Winlogbeat process and connecting to a cluster that has security features enabled.
You can use role-based access control and optionally, API keys to grant Winlogbeat users access to secured resources.
After privileged users have been created, use authentication to connect to a secured Elastic cluster.
Intro to Kibana
ELK for Logs & Metrics