Chapter 6: Data Collection with Beats and Elastic Agent
In the last chapter, we built the virtual machines (VMs) needed for your hunting lab. In this chapter, we're going to configure all of the infrastructure used to collect all of the data we're going to generate once we start threat hunting.
It is important that the two VMs you built in Chapter 4, Building Your Hunting Lab – Part 1 and Chapter 5, Building Your Hunting Lab – Part 2, are operational and are able to communicate using the connection test at the end of the chapter.
In this chapter, you'll learn how to configure the collection agents and tools you installed in Chapter 4, Building Your Hunting Lab – Part 1 and Chapter 5, Building Your Hunting Lab – Part 2. Additionally, we'll cover the configuration of Fleet that we'll use to manage Elastic Agent.
In this chapter, we'll go through the following topics:
- Data flow
- Configuring Winlogbeat and Packetbeat...