-
Notifications
You must be signed in to change notification settings - Fork 25.2k
[Security Solution] Add read
index privileges to kibana_system
role for Microsoft Defender integration indexes
#126803
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Security Solution] Add read
index privileges to kibana_system
role for Microsoft Defender integration indexes
#126803
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
New data index read privileges LGTM!
Reasoning: Usually data indices are not allowed to be read by kibana_system
, but logs-*
are known, documented collision pattern and an exception is made for these patterns
Hi @paul-tavares, I've created a changelog YAML for you. |
Pinging @elastic/es-security (Team:Security) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚀
…le for Microsoft Defender integration indexes (elastic#126803) adds read privilege to the kibana_system role for indexes associated with the Microsoft Defender Integrations. Changes are necessary in order to support Security Solution bi-directional response actions
Description
read
privilege to thekibana_system
role for indexes associated with the Microsoft Defender Integrations