You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: solutions/security/manage-elastic-defend/trusted-applications.md
+41-7Lines changed: 41 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,12 +37,20 @@ To add a trusted application:
37
37
38
38
1. Find **Trusted applications** in the navigation menu or use the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md).
39
39
2. Click **Add trusted application**.
40
-
3. Fill in the following fields in the **Add trusted application**flyout:
40
+
3. Fill in these fields in the **Details**section:
41
41
42
-
*`Name your trusted application`: Enter a name for the trusted application.
43
-
*`Description`(Optional): Enter a description for the trusted application.
44
-
*`Select operating system`: Select the appropriate operating system from the drop-down.
45
-
*`Field`: Select a field to identify the trusted application:
42
+
1.`Name`: Enter a name for the trusted application.
43
+
2.`Description` (Optional): Enter a description for the trusted application.
44
+
4. Select an option in the **Conditions** section:
45
+
46
+
:::::{tab-set}
47
+
48
+
::::{tab-item} Basic
49
+
50
+
Define conditions based on the application's hash, executable path, or signer.
51
+
52
+
1.`Select operating system`: Select the appropriate operating system from the drop-down.
53
+
2.`Field`: Select a field to identify the trusted application:
46
54
47
55
*`Hash`: The MD5, SHA-1, or SHA-256 hash value of the application’s executable.
48
56
*`Path`: The full file path of the application’s executable.
@@ -52,17 +60,43 @@ To add a trusted application:
52
60
To find the signer’s name for an application, go to **Discover** and query the process name of the application’s executable (for example, `process.name : "mctray.exe"` for a McAfee security binary). Then, search the results for the `process.code_signature.subject_name` field, which contains the signer’s name (for example, `McAfee, Inc.`).
53
61
::::
54
62
55
-
*`Operator`: Select an operator to define the condition:
63
+
3.`Operator`: Select an operator to define the condition:
56
64
57
65
*`is`: Must be *exactly* equal to `Value`; wildcards are not supported. This operator is required for the `Hash` and `Signature` field types.
58
66
*`matches`: Can include wildcards in `Value`, such as `C:\path\*\app.exe`. This option is only available for the `Path` field type. Available wildcards are `?` (match one character) and `*` (match zero or more characters).
59
67
60
-
*`Value`: Enter the hash value, file path, or signer name. To add an additional value, click **AND**.
68
+
4.`Value`: Enter the hash value, file path, or signer name. To add an additional value, click **AND**.
61
69
62
70
::::{note}
63
71
You can only add a single field type value per trusted application. For example, if you try to add two `Path` values, you’ll get an error message. Also, an application’s hash value must be valid to add it as a trusted application. In addition, to minimize visibility gaps in the {{security-app}}, be as specific as possible in your entries. For example, combine `Signature` information with a known `Path`.
64
72
::::
65
73
74
+
::::
75
+
76
+
::::{tab-item} Advanced
77
+
78
+
{applies_to}`stack: ga 9.2`
79
+
80
+
Define more complex conditions, such as trusting specific file paths or remote IP addresses.
81
+
82
+
1.`Select operating system`: Select the appropriate operating system from the drop-down.
83
+
2.`Field`: Select a field to identify the trusted application.
84
+
3.`Operator`: Select an operator to define the condition:
85
+
*`is`
86
+
*`is not`
87
+
*`is one of`
88
+
*`is not one of`
89
+
*`matches` | `does not match`: Allows you to use wildcards in `Value`, such as `C:\path\*\app.exe`. Available wildcards are `?` (match one character) and `*` (match zero or more characters).
90
+
91
+
::::{important}
92
+
Using wildcards can impact performance. To create a more efficient trusted application using wildcards, use multiple conditions and make them as specific as possible. For example, adding conditions using `process.name` or `file.name` can help limit the scope of wildcard matching.
93
+
::::
94
+
95
+
4.`Value`: Enter the value associated with the `Field`. To enter multiple values (when using `is one of` or `is not one of`), enter each value, then press **Return**.
96
+
5. To define multiple conditions, click `AND` and configure a new condition. You can also add nested conditions by selecting `Add nested condition`.
97
+
98
+
:::::
99
+
66
100
4. Select an option in the **Assignment** section to assign the trusted application to a specific integration policy:
67
101
68
102
*`Global`: Assign the trusted application to all integration policies for {{elastic-defend}}.
0 commit comments