Skip to content

Commit 6e01750

Browse files
[Security] Runscript for MS Defender + script picker (#2278)
Resolves #1498 and #1532. Adds the appropriate 9.1 'applies' labels for the MS Defender `runscript` response action and the script picker functionality. ### Related PRs MS Defender `runscript`: * #1820 * elastic/security-docs#6903 Script picker: * #1650 * elastic/security-docs#6896
1 parent 9f80667 commit 6e01750

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

solutions/security/endpoint-response-actions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -253,7 +253,7 @@ For CrowdStrike, you must include one of the following parameters to identify th
253253
* `--Raw`: The full script content provided directly as a string.
254254
* `--CloudFile`: The name of the script stored in a cloud storage location.
255255

256-
{applies_to}`serverless: ga` When using this parameter, select from a list of saved custom scripts.
256+
{applies_to}`stack: ga 9.1` When using this parameter, select from a list of saved custom scripts.
257257

258258
* `--HostPath`: The absolute or relative file path of the script located on the host machine.
259259

@@ -277,7 +277,7 @@ Examples:
277277

278278
#### Microsoft Defender for Endpoint
279279
```yaml {applies_to}
280-
serverless:
280+
stack: ga 9.1
281281
```
282282
283283
For Microsoft Defender for Endpoint, you must include the following parameter to identify the script you want to run:

solutions/security/endpoint-response-actions/configure-third-party-response-actions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ Expand a section below for your endpoint security system:
9797
* Microsoft Defender for Endpoint Fleet integration policy: Permission to read alert data (`Windows Defender ATP: Alert.Read.All`).
9898
* Microsoft Defender for Endpoint connector: Permission to read machine information as well as isolate and release a machine (`Windows Defender ATP: Machine.Read.All` and `Machine.Isolate`).
9999

100-
* To run a script on a host:
100+
* {applies_to}`stack: ga 9.1` To run a script on a host:
101101

102102
* Microsoft Defender for Endpoint connector: Permission to manage live response library files as well as run live response on a specific machine (`Windows Defender ATP: Library.Manage` and `Machine.LiveResponse`)
103103

solutions/security/endpoint-response-actions/third-party-response-actions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ These response actions are supported for Microsoft Defender for Endpoint–enrol
4949

5050
Refer to the instructions on [isolating](/solutions/security/endpoint-response-actions/isolate-host.md#isolate-a-host) and [releasing](/solutions/security/endpoint-response-actions/isolate-host.md#release-a-host) hosts for more details.
5151

52-
* **Run a script on a host** with the [`runscript` response action](/solutions/security/endpoint-response-actions.md#microsoft-defender-for-endpoint).
52+
* {applies_to}`stack: ga 9.1` **Run a script on a host** with the [`runscript` response action](/solutions/security/endpoint-response-actions.md#microsoft-defender-for-endpoint).
5353

5454
## SentinelOne response actions [sentinelone-response-actions]
5555

0 commit comments

Comments
 (0)