You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*Enable self-healing of registry based malware artifacts when prevention alerts are triggered. Requires `rollback.self_healing.enabled` to also be enabled. Default: `true`.*
68
+
*Enable automatic removal of malware processes when a related prevention alert fires, including processes which were not directly involved in the alert. Requires `rollback.self_healing.enabled` to also be enabled. Default: `true`.*
69
+
70
+
As an extension to the base-level self-healing rollback feature, {{elastic-endpoint}} can terminate recently spawned processes when an attack occurs. Use this setting to enable this feature.
69
71
70
-
As an extension to the base-level self-healing rollback feature, {{elastic-endpoint}} can roll back recent registry changes when an attack occurs. Use this setting to enable this feature.
*Enable automatic removal of malware processes when a related prevention alert fires, including processes which were not directly involved in the alert. Requires `rollback.self_healing.enabled` to also be enabled. Default: `true`.*
81
-
82
-
As an extension to the base-level self-healing rollback feature, {{elastic-endpoint}} can terminate recently spawned processes when an attack occurs. Use this setting to enable this feature.
80
+
*Enable self-healing of registry based malware artifacts when prevention alerts are triggered. Requires `rollback.self_healing.enabled` to also be enabled. Default: `true`.*
83
81
82
+
As an extension to the base-level self-healing rollback feature, {{elastic-endpoint}} can roll back recent registry changes when an attack occurs. Use this setting to enable this feature.
83
+
84
84
::::{warning}
85
85
This feature can cause permanent data loss.
86
86
::::
@@ -210,6 +210,12 @@ Advanced settings are not recommended for most users. Use them only if you have
210
210
Use this setting to include a limited number of environment variables in process `create` events.
*Filter out file backed images and CD-ROM volumes from consideration by device control. Default: `true`.*
217
+
218
+
213
219
`[linux,mac,windows].advanced.diagnostic.enabled`
214
220
: Added in 7.11.0 (Windows), 7.12.0 (macOS and Linux).
215
221
@@ -435,6 +441,12 @@ Advanced settings are not recommended for most users. Use them only if you have
435
441
Use this setting to enable reporting of process capabilities on Linux. {{elastic-endpoint}} began reporting these capabilities in 8.11.0, but this was disabled by default in 8.14.0 due to data volume concerns. This setting must be enabled for some SIEM detection rules, but all malicious behavior detection rules running within {{elastic-defend}} work regardless of its status.
*Include `file.origin_url`, `file.origin_referrer_url`, and `file.Ext.windows.zone_identifier` in file events. These fields show the details of file's Mark of the Web. Default: `true`.*
475
+
476
+
459
477
`[linux,mac,windows].advanced.events.hash.md5`
460
478
: Added in 8.16.0.
461
479
@@ -492,6 +510,12 @@ Advanced settings are not recommended for most users. Use them only if you have
*Include `dll.origin_url`, `dll.origin_referrer_url`, and `dll.Ext.windows.zone_identifier` in image load events. These fields normally show where the loaded DLL was downloaded from, using information taken from the file's Mark of the Web. Default: <=9.1: `false`, >=9.2: `true`.*
517
+
518
+
495
519
`windows.advanced.events.memory_scan`
496
520
: Added in: 8.14.0.
497
521
@@ -500,6 +524,14 @@ Advanced settings are not recommended for most users. Use them only if you have
500
524
Additional memory scanning of behavior alerts provides more context for responders analyzing alerts. Use this setting to disable this feature.
*Maximum number of process ancestry entries to include in process events. Default: <=8.14: `20`, >=8.15: `5`.*
531
+
532
+
Use this setting to control how many ancestor processes {{elastic-endpoint}} includes in the `process.ancestry` field. Prior to 8.15, this field contained the last 20 ancestor processes; starting with 8.15, it was reduced to the last 5, to limit data volume.
533
+
534
+
503
535
`windows.advanced.events.process.creation_flags`
504
536
: Added in 8.13.0.
505
537
@@ -508,18 +540,22 @@ Advanced settings are not recommended for most users. Use them only if you have
508
540
Use this setting to control whether {{elastic-endpoint}} captures process creation flags, such as `CREATE_SUSPENDED`, in process events.
*Maximum number of process ancestry entries to include in process events. Default: <=8.14: `20`, >=8.15: `5`.*
546
+
*Include `process.origin_url`, `process.origin_referrer_url`, and `process.Ext.windows.zone_identifier` in process events. These fields normally show where the process's executable file was downloaded from, using information taken from the file's Mark of the Web. Default: <=9.1: `false`, >=9.2: `true`.*
515
547
516
-
Use this setting to control how many ancestor processes {{elastic-endpoint}} includes in the `process.ancestry` field. Prior to 8.15, this field contained the last 20 ancestor processes; starting with 8.15, it was reduced to the last 5, to limit data volume.
@@ -560,6 +596,12 @@ Advanced settings are not recommended for most users. Use them only if you have
560
596
Elastic caches information about recently read files in memory. Use this setting to control the number of recent file entries to cache.
561
597
562
598
599
+
`windows.advanced.firewall_anti_tamper`
600
+
: Added in 9.2.0.
601
+
602
+
*Enable firewall anti tamper prevention or detection. Tamper protetion must also be enabled. Allowed values are `prevent`, `detect`, and `off`. Default: `prevent`.*
603
+
604
+
563
605
`[linux,mac,windows].advanced.flags`
564
606
: Added in 8.13.0 (Windows), 8.16.0 (macOS and Linux).
565
607
@@ -874,6 +916,24 @@ Advanced settings are not recommended for most users. Use them only if you have
874
916
Use this setting to collect memory surrounding detected malicious regions when Memory Threat alerts are triggered by YARA rule scanning.
*Scan for memory threats in response to network activity. Default: `true`.*
935
+
936
+
877
937
`windows.advanced.memory_protection.shellcode`
878
938
: Added in 7.15.0.
879
939
@@ -918,6 +978,18 @@ Advanced settings are not recommended for most users. Use them only if you have
918
978
Use this setting to disable ransomware detection based on canary files, even if ransomware protection is enabled. Ransomware protection will remain effective even when this ransomware detection is disabled.
*Enable the generation of a memory dump of the ransomware process. This is ignored if the canary protection is off. Default: `true`.*
991
+
992
+
921
993
`windows.advanced.ransomware.mbr`
922
994
: Added in 7.12.0.
923
995
@@ -966,27 +1038,3 @@ Advanced settings are not recommended for most users. Use them only if you have
966
1038
: Added in 8.12.0.
967
1039
968
1040
*Control how much memory (in MB) should be kept resident in RAM. This setting affects Private Working Set but does not affect the amount of virtual memory requested from the OS (Private Bytes or Commit Charge). If plenty of unused RAM is available, Windows may give {{elastic-endpoint}} more RAM than requested to reduce unnecessary paging and improve performance. If the current {{elastic-defend}} configuration requires regularly touching more than the requested amount of memory, then the Private Working Set will be higher than requested here. The minimum value is 50. Default: `200`.*
*Include `dll.origin_url`, `dll.origin_referrer_url`, and `dll.Ext.windows.zone_identifier` in image load events. These fields normally show where the loaded DLL was downloaded from, using information taken from the file's Mark of the Web. Default: <=9.1: `false`, >=9.2: `true`.*
*Include `process.origin_url`, `process.origin_referrer_url`, and `process.Ext.windows.zone_identifier` in process events. These fields normally show where the process's executable file was downloaded from, using information taken from the file's Mark of the Web. Default: <=9.1: `false`, >=9.2: `true`.*
*Include `file.origin_url`, `file.origin_referrer_url`, and `file.Ext.windows.zone_identifier` in file events. These fields show the details of file's Mark of the Web. Default: `true`.*
987
-
988
-
989
-
`windows.advanced.events.security.provider_etw`
990
-
: Added in 8.19.0.
991
-
992
-
*Enable the Microsoft-Windows-Security-Auditing ETW provider for security events collection. Default: `true`.*
0 commit comments