Skip to content

Commit 17fcf08

Browse files
blocklist
1 parent 63096b5 commit 17fcf08

File tree

3 files changed

+5
-106
lines changed

3 files changed

+5
-106
lines changed

raw-migrated-files/docs-content/serverless/security-blocklist.md

Lines changed: 0 additions & 93 deletions
This file was deleted.

raw-migrated-files/toc.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,6 @@ toc:
195195
- file: docs-content/serverless/security-automatic-import.md
196196
- file: docs-content/serverless/security-benchmark-rules-kspm.md
197197
- file: docs-content/serverless/security-benchmark-rules.md
198-
- file: docs-content/serverless/security-blocklist.md
199198
- file: docs-content/serverless/security-building-block-rules.md
200199
- file: docs-content/serverless/security-cloud-native-security-overview.md
201200
- file: docs-content/serverless/security-cloud-posture-dashboard-dash-cspm.md

solutions/security/manage-elastic-defend/blocklist.md

Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,25 +6,18 @@ mapped_urls:
66

77
# Blocklist
88

9-
% What needs to be done: Align serverless/stateful
10-
11-
% Use migrated content from existing pages that map to this page:
12-
13-
% - [x] ./raw-migrated-files/security-docs/security/blocklist.md
14-
% - [ ] ./raw-migrated-files/docs-content/serverless/security-blocklist.md
159

1610
The blocklist allows you to prevent specified applications from running on hosts, extending the list of processes that {{elastic-defend}} considers malicious. This helps ensure that known malicious processes aren’t accidentally executed by end users.
1711

18-
The blocklist is not intended to broadly block benign applications for non-security reasons; only use it to block potentially harmful applications. To compare the blocklist with other endpoint artifacts, refer to [*Optimize {{elastic-defend}}*](/solutions/security/manage-elastic-defend/optimize-elastic-defend.md).
12+
The blocklist is not intended to broadly block benign applications for non-security reasons; only use it to block potentially harmful applications. To compare the blocklist with other endpoint artifacts, refer to [](/solutions/security/manage-elastic-defend/optimize-elastic-defend.md).
1913

2014
::::{admonition} Requirements
2115
* In addition to configuring specific entries on the **Blocklist** page, you must also ensure that the blocklist is enabled on the {{elastic-defend}} integration policy in the [Malware protection settings](/solutions/security/configure-elastic-defend/configure-an-integration-policy-for-elastic-defend.md#malware-protection). This setting is enabled by default.
22-
* You must have the **Blocklist** [privilege](/solutions/security/configure-elastic-defend/elastic-defend-feature-privileges.md) to access this feature.
23-
16+
* You must have the **Blocklist** [privilege](/solutions/security/configure-elastic-defend/elastic-defend-feature-privileges.md) or the appropriate user role to access this feature.
2417
::::
2518

2619

27-
By default, a blocklist entry is recognized globally across all hosts running {{elastic-defend}}. If you have a [Platinum or Enterprise subscription](https://www.elastic.co/pricing), you can also assign a blocklist entry to specific {{elastic-defend}} integration policies, which blocks the process only on hosts assigned to that policy.
20+
By default, a blocklist entry is recognized globally across all hosts running {{elastic-defend}}. You can also assign a blocklist entry to specific {{elastic-defend}} integration policies, which blocks the process only on hosts assigned to that policy.
2821

2922
1. Find **Blocklist** in the navigation menu or use the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md).
3023
2. Click **Add blocklist entry**. The **Add blocklist** flyout appears.
@@ -43,7 +36,7 @@ By default, a blocklist entry is recognized globally across all hosts running {{
4336
* `Signature`: (Windows only) The name of the application’s digital signer.
4437

4538
::::{tip}
46-
To find the signer’s name for an application, go to **Kibana****Discover** and query the process name of the application’s executable (for example, `process.name : "mctray.exe"` for a McAfee security binary). Then, search the results for the `process.code_signature.subject_name` field, which contains the signer’s name (for example, `McAfee, Inc.`).
39+
To find the signer’s name for an application, go to **Discover** and query the process name of the application’s executable (for example, `process.name : "mctray.exe"` for a McAfee security binary). Then, search the results for the `process.code_signature.subject_name` field, which contains the signer’s name (for example, `McAfee, Inc.`).
4740
::::
4841

4942
3. `Operator`: For hash and path conditions, the operator is `is one of` and can’t be modified. For signature conditions, choose `is one of` to enter multiple values or `is` for one value.
@@ -82,7 +75,7 @@ The **Blocklist** page displays all the blocklist entries that have been added t
8275

8376
### Edit a blocklist entry [edit-blocklist-entry]
8477

85-
You can individually modify each blocklist entry. With a Platinum or Enterprise subscription, you can also change the policies that a blocklist entry is assigned to.
78+
You can individually modify each blocklist entry. You can also change the policies that a blocklist entry is assigned to.
8679

8780
To edit a blocklist entry:
8881

0 commit comments

Comments
 (0)