Quick Start Guide



  • By signing up for this trial, you're one step closer to protecting your cloud infrastructure with the Threat Stack Cloud Security Platform (TM)
  • Threat Stack continuously monitors events from cloud workloads via agents, your cloud infrastructure through integration, is constantly evaluating your security posture against a baseline ruleset while alerting on any detected indicators for compromise within your environment.

The first step in starting your cloud security journey with Threat Stack is to deploy agents following a few simple steps.


What are the Supported Operating Systems & Kernels for Agent deployment?


Deploying the Agents

  1. Deploy the Threat Stack agent to a server within your environment and you'll instantly get the visibility into system, user, process and network activity
  2. A simple way to an agent manually is by copying and running the  “curl” bash script from “Getting Started” page after logging into the application. This single command will download, install and register the agent. Voila! You are all set to start continuous security monitoring on your server.

  3. Optionally, you can use any of the popular configuration management tools such as Chef, Puppet, Ansible or Salt for multiple agent deployments. We provide everything you need within respective GitHub repositories to get you started under Server -> Clicking on ‘Add Server’ screen.


For questions around agents and network connectivity into our backend, this article would help.


Was this article helpful?
1 out of 1 found this helpful
Have more questions? Submit a request



Article is closed for comments.