Quick Start Guide


Welcome to Threat Stack!

Thank you for choosing to evaluate the Threat Stack Cloud Security Platform.

Before you begin to deploy any Agents:

If you have completed both of those tasks, you are ready to get started with your cloud security journey by deploying Threat Stack Agents.

Deploy Threat Stack Agents

Threat Stack gives in depth visibility into user, process, network, and file activities on the host. We recommend installing the Agent on a high-traffic host such as a jump host. Alternately, you can install the Agent on a test host that you can throw away.

Deploying the Threat Stack Agent to a server within your environment gives you instant visibility into system, user, process, and network activity.

Add Servers Page

The Threat Stack Servers page contains in app instructions for all of our supported servers. Select your preferred server to display specific instructions.

Alternatively, you can install the Linux Agent using Chef, Puppet, Salt, or Ansible.


For the latest instructions deploying the Threat Stack Agent, see:

Was this article helpful?
1 out of 1 found this helpful