Skip to content

Commit 9ceeae4

Browse files
[Security] Advanced mode for trusted applications (#2676)
Resolves #1520 by documenting `Advanced` mode for trusted applications. Preview: [Trusted applications](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/2676/solutions/security/manage-elastic-defend/trusted-applications)
1 parent 7470085 commit 9ceeae4

File tree

1 file changed

+41
-7
lines changed

1 file changed

+41
-7
lines changed

solutions/security/manage-elastic-defend/trusted-applications.md

Lines changed: 41 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -37,12 +37,20 @@ To add a trusted application:
3737

3838
1. Find **Trusted applications** in the navigation menu or use the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md).
3939
2. Click **Add trusted application**.
40-
3. Fill in the following fields in the **Add trusted application** flyout:
40+
3. Fill in these fields in the **Details** section:
4141

42-
* `Name your trusted application`: Enter a name for the trusted application.
43-
* `Description`(Optional): Enter a description for the trusted application.
44-
* `Select operating system`: Select the appropriate operating system from the drop-down.
45-
* `Field`: Select a field to identify the trusted application:
42+
1. `Name`: Enter a name for the trusted application.
43+
2. `Description` (Optional): Enter a description for the trusted application.
44+
4. Select an option in the **Conditions** section:
45+
46+
:::::{tab-set}
47+
48+
::::{tab-item} Basic
49+
50+
Define conditions based on the application's hash, executable path, or signer.
51+
52+
1. `Select operating system`: Select the appropriate operating system from the drop-down.
53+
2. `Field`: Select a field to identify the trusted application:
4654

4755
* `Hash`: The MD5, SHA-1, or SHA-256 hash value of the application’s executable.
4856
* `Path`: The full file path of the application’s executable.
@@ -52,17 +60,43 @@ To add a trusted application:
5260
To find the signer’s name for an application, go to **Discover** and query the process name of the application’s executable (for example, `process.name : "mctray.exe"` for a McAfee security binary). Then, search the results for the `process.code_signature.subject_name` field, which contains the signer’s name (for example, `McAfee, Inc.`).
5361
::::
5462

55-
* `Operator`: Select an operator to define the condition:
63+
3. `Operator`: Select an operator to define the condition:
5664

5765
* `is`: Must be *exactly* equal to `Value`; wildcards are not supported. This operator is required for the `Hash` and `Signature` field types.
5866
* `matches`: Can include wildcards in `Value`, such as `C:\path\*\app.exe`. This option is only available for the `Path` field type. Available wildcards are `?` (match one character) and `*` (match zero or more characters).
5967

60-
* `Value`: Enter the hash value, file path, or signer name. To add an additional value, click **AND**.
68+
4. `Value`: Enter the hash value, file path, or signer name. To add an additional value, click **AND**.
6169

6270
::::{note}
6371
You can only add a single field type value per trusted application. For example, if you try to add two `Path` values, you’ll get an error message. Also, an application’s hash value must be valid to add it as a trusted application. In addition, to minimize visibility gaps in the {{security-app}}, be as specific as possible in your entries. For example, combine `Signature` information with a known `Path`.
6472
::::
6573

74+
::::
75+
76+
::::{tab-item} Advanced
77+
78+
{applies_to}`stack: ga 9.2`
79+
80+
Define more complex conditions, such as trusting specific file paths or remote IP addresses.
81+
82+
1. `Select operating system`: Select the appropriate operating system from the drop-down.
83+
2. `Field`: Select a field to identify the trusted application.
84+
3. `Operator`: Select an operator to define the condition:
85+
* `is`
86+
* `is not`
87+
* `is one of`
88+
* `is not one of`
89+
* `matches` | `does not match`: Allows you to use wildcards in `Value`, such as `C:\path\*\app.exe`. Available wildcards are `?` (match one character) and `*` (match zero or more characters).
90+
91+
::::{important}
92+
Using wildcards can impact performance. To create a more efficient trusted application using wildcards, use multiple conditions and make them as specific as possible. For example, adding conditions using `process.name` or `file.name` can help limit the scope of wildcard matching.
93+
::::
94+
95+
4. `Value`: Enter the value associated with the `Field`. To enter multiple values (when using `is one of` or `is not one of`), enter each value, then press **Return**.
96+
5. To define multiple conditions, click `AND` and configure a new condition. You can also add nested conditions by selecting `Add nested condition`.
97+
98+
:::::
99+
66100
4. Select an option in the **Assignment** section to assign the trusted application to a specific integration policy:
67101

68102
* `Global`: Assign the trusted application to all integration policies for {{elastic-defend}}.

0 commit comments

Comments
 (0)