Install Elastic Agent on Windows with Fleet
- Last updated: May 19, 2026
Now that our full Elastic Stack deployment is installed and includes a ready-to-use Fleet Server, we can start enrolling Elastic Agents to monitor Windows servers.
In this tutorial, we will install Elastic Agent on Windows servers, add the Windows integration in Kibana, and use the built-in Elastic Stack dashboards to monitor Windows logs and events.
Network Architecture Diagram
As shown in the diagram, Elastic Agents are installed on each Windows Server. They send Windows logs, metrics, and security events to the Fleet Server, which listens on port 8220/tcp.
Add the Windows Integration in Kibana
First, open Kibana to add the Windows integration. From there, you can also retrieve the complete PowerShell command used to install and enroll Elastic Agent on a Windows Server with Fleet.
- In Kibana, open the main menu and go to Management → Integrations:
- Search for Windows, then click the Windows integration:
- Click the Add Windows button:
- Enter a name for the Windows integration, then scroll down:
- At the bottom of the page, select the Existing hosts tab, choose the Fleet Server Policy, then click Save and continue:
- Finally, click Save and deploy changes to apply the Windows integration to the selected Fleet policy:
Install Elastic Agent on Windows with Fleet
- In Kibana, open the main menu and go to Management → Fleet:
- Click Add, then select Agent:
- Enter a name for the agent policy, then click Create policy:
- Select Enroll in Fleet, then choose the Windows x86_64 Elastic Agent platform:
- Copy the PowerShell commands provided by Kibana and run them in an elevated PowerShell terminal on the Windows Server where you want to install Elastic Agent. In this lab, because we use self-signed certificates, add the
-ioption to the.\elastic-agent.exe installcommand to allow the agent to enroll through an insecure TLS connection:
- Once the installation is complete, Kibana should confirm that the Elastic Agent has been enrolled and that incoming data has been received. You can then close the window:
- Repeat the Elastic Agent installation on each Windows Server you want to monitor. The enrolled Windows servers should now appear as Healthy in the Agents tab:
Monitor Windows Servers with Kibana Dashboards
- In Kibana, open the main menu and go to Analytics → Dashboards:
- Search for Windows, then open the [System Windows Security] User Logons dashboard:
- The Windows User Logons dashboard is now available and displays logon activity, administrator logons, logon types, and related Windows security events collected by Elastic Agent: