Skip to content

Commit 14a88a2

Browse files
authored
add 9.2.0 advanced options and sort unsorted options (#3215)
1. Add advanced options recently added in Kibana. 2. Sort improperly sorted options.
1 parent d21fdfc commit 14a88a2

File tree

1 file changed

+87
-39
lines changed

1 file changed

+87
-39
lines changed

reference/security/defend-advanced-settings.md

Lines changed: 87 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -62,25 +62,25 @@ Advanced settings are not recommended for most users. Use them only if you have
6262
::::
6363

6464

65-
`windows.advanced.alerts.rollback.self_healing.registry_enabled`
65+
`windows.advanced.alerts.rollback.self_healing.process_enabled`
6666
: Added in 8.8.0.
6767

68-
*Enable self-healing of registry based malware artifacts when prevention alerts are triggered. Requires `rollback.self_healing.enabled` to also be enabled. Default: `true`.*
68+
*Enable automatic removal of malware processes when a related prevention alert fires, including processes which were not directly involved in the alert. Requires `rollback.self_healing.enabled` to also be enabled. Default: `true`.*
69+
70+
As an extension to the base-level self-healing rollback feature, {{elastic-endpoint}} can terminate recently spawned processes when an attack occurs. Use this setting to enable this feature.
6971

70-
As an extension to the base-level self-healing rollback feature, {{elastic-endpoint}} can roll back recent registry changes when an attack occurs. Use this setting to enable this feature.
71-
7272
::::{warning}
7373
This feature can cause permanent data loss.
7474
::::
7575

7676

77-
`windows.advanced.alerts.rollback.self_healing.process_enabled`
77+
`windows.advanced.alerts.rollback.self_healing.registry_enabled`
7878
: Added in 8.8.0.
7979

80-
*Enable automatic removal of malware processes when a related prevention alert fires, including processes which were not directly involved in the alert. Requires `rollback.self_healing.enabled` to also be enabled. Default: `true`.*
81-
82-
As an extension to the base-level self-healing rollback feature, {{elastic-endpoint}} can terminate recently spawned processes when an attack occurs. Use this setting to enable this feature.
80+
*Enable self-healing of registry based malware artifacts when prevention alerts are triggered. Requires `rollback.self_healing.enabled` to also be enabled. Default: `true`.*
8381

82+
As an extension to the base-level self-healing rollback feature, {{elastic-endpoint}} can roll back recent registry changes when an attack occurs. Use this setting to enable this feature.
83+
8484
::::{warning}
8585
This feature can cause permanent data loss.
8686
::::
@@ -210,6 +210,12 @@ Advanced settings are not recommended for most users. Use them only if you have
210210
Use this setting to include a limited number of environment variables in process `create` events.
211211

212212

213+
`[mac,windows].advanced.device_control.filter_images`
214+
: Added in 9.2.0.
215+
216+
*Filter out file backed images and CD-ROM volumes from consideration by device control. Default: `true`.*
217+
218+
213219
`[linux,mac,windows].advanced.diagnostic.enabled`
214220
: Added in 7.11.0 (Windows), 7.12.0 (macOS and Linux).
215221

@@ -435,6 +441,12 @@ Advanced settings are not recommended for most users. Use them only if you have
435441
Use this setting to enable reporting of process capabilities on Linux. {{elastic-endpoint}} began reporting these capabilities in 8.11.0, but this was disabled by default in 8.14.0 due to data volume concerns. This setting must be enabled for some SIEM detection rules, but all malicious behavior detection rules running within {{elastic-defend}} work regardless of its status.
436442

437443

444+
`windows.advanced.events.enforce_registry_filters`
445+
: Added in 8.15.0.
446+
447+
*Reduce data volume by filtering out registry events which are not relevant to behavioral protections. Default: `true`.*
448+
449+
438450
`windows.advanced.events.event_on_access.file_paths`
439451
: Added in 8.15.0.
440452

@@ -456,6 +468,12 @@ Advanced settings are not recommended for most users. Use them only if you have
456468
::::
457469

458470

471+
`windows.advanced.events.file.origin_info_collection`
472+
: Added in 8.19.0.
473+
474+
*Include `file.origin_url`, `file.origin_referrer_url`, and `file.Ext.windows.zone_identifier` in file events. These fields show the details of file's Mark of the Web. Default: `true`.*
475+
476+
459477
`[linux,mac,windows].advanced.events.hash.md5`
460478
: Added in 8.16.0.
461479

@@ -492,6 +510,12 @@ Advanced settings are not recommended for most users. Use them only if you have
492510
:::
493511

494512

513+
`windows.advanced.events.image_load.origin_info_collection`
514+
: Added in 8.19.0.
515+
516+
*Include `dll.origin_url`, `dll.origin_referrer_url`, and `dll.Ext.windows.zone_identifier` in image load events. These fields normally show where the loaded DLL was downloaded from, using information taken from the file's Mark of the Web. Default: <=9.1: `false`, >=9.2: `true`.*
517+
518+
495519
`windows.advanced.events.memory_scan`
496520
: Added in: 8.14.0.
497521

@@ -500,6 +524,14 @@ Advanced settings are not recommended for most users. Use them only if you have
500524
Additional memory scanning of behavior alerts provides more context for responders analyzing alerts. Use this setting to disable this feature.
501525

502526

527+
`[linux,mac,windows].advanced.events.process_ancestry_length`
528+
: Added in 8.15.0.
529+
530+
*Maximum number of process ancestry entries to include in process events. Default: <=8.14: `20`, >=8.15: `5`.*
531+
532+
Use this setting to control how many ancestor processes {{elastic-endpoint}} includes in the `process.ancestry` field. Prior to 8.15, this field contained the last 20 ancestor processes; starting with 8.15, it was reduced to the last 5, to limit data volume.
533+
534+
503535
`windows.advanced.events.process.creation_flags`
504536
: Added in 8.13.0.
505537

@@ -508,18 +540,22 @@ Advanced settings are not recommended for most users. Use them only if you have
508540
Use this setting to control whether {{elastic-endpoint}} captures process creation flags, such as `CREATE_SUSPENDED`, in process events.
509541

510542

511-
`[linux,mac,windows].advanced.events.process_ancestry_length`
512-
: Added in 8.15.0.
543+
`windows.advanced.events.process.origin_info_collection`
544+
: Added in 8.19.0.
513545

514-
*Maximum number of process ancestry entries to include in process events. Default: <=8.14: `20`, >=8.15: `5`.*
546+
*Include `process.origin_url`, `process.origin_referrer_url`, and `process.Ext.windows.zone_identifier` in process events. These fields normally show where the process's executable file was downloaded from, using information taken from the file's Mark of the Web. Default: <=9.1: `false`, >=9.2: `true`.*
515547

516-
Use this setting to control how many ancestor processes {{elastic-endpoint}} includes in the `process.ancestry` field. Prior to 8.15, this field contained the last 20 ancestor processes; starting with 8.15, it was reduced to the last 5, to limit data volume.
517548

549+
`windows.advanced.events.security.event_disabled`
550+
: Added in 9.2.0.
518551

519-
`windows.advanced.events.enforce_registry_filters`
520-
: Added in 8.15.0.
552+
*Provide a comma-separated list of security event IDs to selectively disable. An example is `4624,4800,4801`. Default: none.*
521553

522-
*Reduce data volume by filtering out registry events which are not relevant to behavioral protections. Default: `true`.*
554+
555+
`windows.advanced.events.security.provider_etw`
556+
: Added in 8.19.0.
557+
558+
*Enable the Microsoft-Windows-Security-Auditing ETW provider for security events collection. Default: `true`.*
523559

524560

525561
`linux.advanced.fanotify.ignore_unknown_filesystems`
@@ -560,6 +596,12 @@ Advanced settings are not recommended for most users. Use them only if you have
560596
Elastic caches information about recently read files in memory. Use this setting to control the number of recent file entries to cache.
561597

562598

599+
`windows.advanced.firewall_anti_tamper`
600+
: Added in 9.2.0.
601+
602+
*Enable firewall anti tamper prevention or detection. Tamper protetion must also be enabled. Allowed values are `prevent`, `detect`, and `off`. Default: `prevent`.*
603+
604+
563605
`[linux,mac,windows].advanced.flags`
564606
: Added in 8.13.0 (Windows), 8.16.0 (macOS and Linux).
565607

@@ -874,6 +916,24 @@ Advanced settings are not recommended for most users. Use them only if you have
874916
Use this setting to collect memory surrounding detected malicious regions when Memory Threat alerts are triggered by YARA rule scanning.
875917

876918

919+
`windows.advanced.memory_protection.scan_on_api_event`
920+
: Added in 8.17.6.
921+
922+
*Scan for memory threats in response to API events. Default: `true`.*
923+
924+
925+
`[linux,mac,windows].advanced.memory_protection.scan_on_image_load_event`
926+
: Added in 8.17.6.
927+
928+
*Scan for memory threats in response to image loads. Default: `true`.*
929+
930+
931+
`[linux,mac,windows].advanced.memory_protection.scan_on_network_event`
932+
: Added in 8.17.6.
933+
934+
*Scan for memory threats in response to network activity. Default: `true`.*
935+
936+
877937
`windows.advanced.memory_protection.shellcode`
878938
: Added in 7.15.0.
879939

@@ -918,6 +978,18 @@ Advanced settings are not recommended for most users. Use them only if you have
918978
Use this setting to disable ransomware detection based on canary files, even if ransomware protection is enabled. Ransomware protection will remain effective even when this ransomware detection is disabled.
919979

920980

981+
`mac.advanced.ransomware.diagnostic`
982+
: Added in 9.2.0.
983+
984+
*Enable diagnostic ransomware protection. Default: `true`.*
985+
986+
987+
`windows.advanced.ransomware.dump_process`
988+
: Added in 8.11.0.
989+
990+
*Enable the generation of a memory dump of the ransomware process. This is ignored if the canary protection is off. Default: `true`.*
991+
992+
921993
`windows.advanced.ransomware.mbr`
922994
: Added in 7.12.0.
923995

@@ -966,27 +1038,3 @@ Advanced settings are not recommended for most users. Use them only if you have
9661038
: Added in 8.12.0.
9671039

9681040
*Control how much memory (in MB) should be kept resident in RAM. This setting affects Private Working Set but does not affect the amount of virtual memory requested from the OS (Private Bytes or Commit Charge). If plenty of unused RAM is available, Windows may give {{elastic-endpoint}} more RAM than requested to reduce unnecessary paging and improve performance. If the current {{elastic-defend}} configuration requires regularly touching more than the requested amount of memory, then the Private Working Set will be higher than requested here. The minimum value is 50. Default: `200`.*
969-
970-
971-
`windows.advanced.events.image_load.origin_info_collection`
972-
: Added in 8.19.0.
973-
974-
*Include `dll.origin_url`, `dll.origin_referrer_url`, and `dll.Ext.windows.zone_identifier` in image load events. These fields normally show where the loaded DLL was downloaded from, using information taken from the file's Mark of the Web. Default: <=9.1: `false`, >=9.2: `true`.*
975-
976-
977-
`windows.advanced.events.process.origin_info_collection`
978-
: Added in 8.19.0.
979-
980-
*Include `process.origin_url`, `process.origin_referrer_url`, and `process.Ext.windows.zone_identifier` in process events. These fields normally show where the process's executable file was downloaded from, using information taken from the file's Mark of the Web. Default: <=9.1: `false`, >=9.2: `true`.*
981-
982-
983-
`windows.advanced.events.file.origin_info_collection`
984-
: Added in 8.19.0.
985-
986-
*Include `file.origin_url`, `file.origin_referrer_url`, and `file.Ext.windows.zone_identifier` in file events. These fields show the details of file's Mark of the Web. Default: `true`.*
987-
988-
989-
`windows.advanced.events.security.provider_etw`
990-
: Added in 8.19.0.
991-
992-
*Enable the Microsoft-Windows-Security-Auditing ETW provider for security events collection. Default: `true`.*

0 commit comments

Comments
 (0)