Welcome to Threat Stack!
Thank you for choosing to evaluate the Threat Stack Cloud Security Platform .
Before you begin to deploy any agents:
- Review the System Requirements article
- Create your Threat Stack account
If you have completed both of those tasks, you are ready to get started with your cloud security journey by deploying Threat Stack agents.
Deploying the Agents
Threat Stack gives in depth visibility into user, process, network, and file activities on the host, so we recommend installing the agent on a high-traffic host such as a jump host. Alternately, you can install the agent on a test host that you can throw away.
Deploying the Threat Stack agent to a server within your environment will give you instant visibility into system, user, process and network activity.
Add Servers Page
The Threat Stack Servers page contains in app instructions for all of our supported servers. Select your preferred server to display specific instructions.
Regardless of the distribution that you select, make sure you also select the Investigate plan level unless you are specifically testing the Monitoring plan functionality instead.