📘 Part 1: How to Create Enrollment Token Through Fleet Server to Collect Windows System Logs
Before we begin, let's understand some key concepts.
What is Fleet Server?
Fleet Server is a component that connects Elastic Agent to Fleet. It supports many Elastic Agent connections and serves as
Architecture Diagram
What is Elasticsearch Agent?
Elastic Agent is a single, unified way to add monitoring for logs, metrics, and other types of data to a host. It can protect
Architecture diagram
Now we are moving towards to how to create enrollment token for the Windows system
Step 1: Log in into your Kibana Console
Step 2: Click on the eui-Icon
Step 3: Scroll down below to the Management section and Click on Fleet
After clicking on Fleet, the Fleet UI will be in front of you.
Step 4: Click on Agent policies
Step 5: Click on Create agent policy
Step 6: Enter the agent policy Name and then click on Create agent policy
Note: I am not going to Advanced options
Now policy has been created
Step 7: Click on • • • below Actions.
then click on Add agent
Note: We didn't added Fleet Server, so now we are adding a Fleet Server
Step 8: Click on the Add Fleet Server
Step 9: Enter Name (should be hostname) and URL (where you are installing elastic Agent)
NOTE: The name and URL must be the host system that is sending logs towards our Elasticsearch.
Step 10: Click on Generate Fleet Server Policy.
Step 11: Token has generated Select Windows and click on copy icon 📋 to copy the token
Once you have copied the token we have put into the Windows system (open PowerShell in Administrator mode), in the next article we will cover that part.
Conclusion
We explored how to create an enrollment token using Fleet Server to begin collecting logs from a Windows machine via the Elastic Agent. We started with an overview of how Fleet Server and Elastic Agent work together, then walked through the step-by-step process using the Kibana interface. This sets the foundation for scalable and secure log ingestion from Windows systems into the Elastic Stack.
SOC | SOC Platform | SIEM Engineer | Threat Intelligence | Threat hunting | IR | Detection Engineer | Cloud Security