Quick Start Guide

Follow

 

Welcome to Threat Stack!

Thank you for choosing to evaluate the Threat Stack Cloud Security Platform  .

Before you begin to deploy any agents:

If you have completed both of those tasks, you are ready to get started with your cloud security journey by deploying Threat Stack agents.

Deploying the Agents

Threat Stack gives in depth visibility into user, process, network, and file activities on the host, so we recommend installing the agent on a high-traffic host such as a jump host. Alternately, you can install the agent on a test host that you can throw away.

Deploying the Threat Stack agent to a server within your environment will give you instant visibility into system, user, process and network activity.

Add Servers Page

The Threat Stack Servers page contains in app instructions for all of our supported servers. Select your preferred server to display specific instructions.

Alternatively, you can install the agent using Chef, Puppet, Salt, or Ansible.

Important!

Regardless of the distrobution that you select, make sure you also select the Investigate plan level unless you are specifically testing the Monitoring plan functionality instead.

Servers page 

Was this article helpful?
1 out of 1 found this helpful
Have more questions? Submit a request

Comments

0 comments

Article is closed for comments.