Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Elastic: Using Elastic Defend

Premium room

Explore Elastic Defend telemetry and alerts to investigate endpoint activity.

medium

60 min

872

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

As an analyst, visibility into event data is essential for analyzing activity and detecting potential threats. In the previous room, Elastic: Setting up a Lab, you established that foundation by building your Elastic-based environment. Now, we move beyond centralized log analysis and explore Elastic Defend, the endpoint security component of the Elastic Security suite, enabling detection, investigation, and response directly on monitored hosts.

Learning Objectives

  • Configure the Elastic Defend integration
  • Understand what Elastic Defend monitors and protects
  • Explore endpoint telemetry data in Discover
  • Analyze key fields and events within endpoint logs
  • Investigate alerts in Elastic Security

Prerequisites

Some familiarity with the command line, concepts, and log analysis is recommended. However, all required commands and necessary information are provided in the walkthrough.

Machine Access

Click the Start Machine button below. The machine will start in Split-Screen mode. Once you gain access, use the Elastic desktop shortcut to open Elastic in your browser. Please allow the machine a few minutes to start up, and use the following credentials to log in.

  • Username: elastic
  • Password: W4h*Pn=7+WtUUmixs03H

We recommend switching to full screen mode for a more immersive experience. This provides a larger workspace, making it easier to manage the terminal and browser as you progress through the room. If your side menu is stuck while in full screen mode, please enter and exit the split screen view to resolve the issue.

Set up your virtual environment

To successfully complete this room, you'll need to set up your virtual environment. This involves starting the Target Machine, ensuring you're equipped with the necessary tools and access to tackle the challenges ahead.
Target machine
Status:Off
Answer the questions below

I understand the learning objectives and am ready to learn about Elastic Defend!

Ready to learn Cyber Security?

The Elastic: Using Elastic Defend room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.