Skip to content

Commit bb8f49f

Browse files
authored
Merge branch 'main' into LikeTheSalad-patch-1
2 parents 3623b08 + b9e061f commit bb8f49f

File tree

3 files changed

+31
-5
lines changed

3 files changed

+31
-5
lines changed

solutions/security/endpoint-response-actions.md

Lines changed: 24 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Launch the response console from any of the following places in {{elastic-sec}}:
4141
* Endpoint details flyout → **Take action****Respond**
4242
* Alert details flyout → **Take action****Respond**
4343
* Host details page → **Respond**
44-
* {applies_to}`stack: ga 9.1` Event details flyout → **Take action****Respond**
44+
* {applies_to}`stack: ga 9.1` {applies_to}`serverless: ga` Event details flyout → **Take action****Respond**
4545

4646
To perform an action on the endpoint, enter a [response action command](/solutions/security/endpoint-response-actions.md#response-action-commands) in the input area at the bottom of the console, then press **Return**. Output from the action is displayed in the console.
4747

@@ -253,7 +253,7 @@ For CrowdStrike, you must include one of the following parameters to identify th
253253
* `--Raw`: The full script content provided directly as a string.
254254
* `--CloudFile`: The name of the script stored in a cloud storage location.
255255

256-
{applies_to}`stack: ga 9.1` When using this parameter, select from a list of saved custom scripts.
256+
{applies_to}`stack: ga 9.1` {applies_to}`serverless: ga` When using this parameter, select from a list of saved custom scripts.
257257

258258
* `--HostPath`: The absolute or relative file path of the script located on the host machine.
259259

@@ -278,6 +278,7 @@ Examples:
278278
#### Microsoft Defender for Endpoint
279279
```yaml {applies_to}
280280
stack: ga 9.1
281+
serverless: ga
281282
```
282283
283284
For Microsoft Defender for Endpoint, you must include the following parameter to identify the script you want to run:
@@ -300,6 +301,7 @@ Example: `runscript --ScriptName="Script2.sh" --Args="-Verbose true"`
300301
#### SentinelOne
301302
```yaml {applies_to}
302303
stack: ga 9.2
304+
serverless: ga
303305
```
304306
For SentinelOne, you must include the following parameter to identify the script you want to run:
305307

@@ -315,6 +317,26 @@ Required privilege (in {{stack}}) or custom role privilege (in {{serverless-shor
315317

316318
Example: `runscript --script="copy.sh" --inputParams="~/logs/log.txt /tmp/log.backup.txt"`
317319

320+
### `cancel` [cancel]
321+
```yaml {applies_to}
322+
stack: ga 9.2
323+
serverless: ga
324+
```
325+
326+
::::{note}
327+
This response action is supported only for [Microsoft Defender for Endpoint–enrolled hosts](/solutions/security/endpoint-response-actions/third-party-response-actions.md#defender-response-actions).
328+
::::
329+
330+
Cancel an ongoing action on the host. This allows you to force-cancel actions that are stuck in a pending state, unblocking further use of the response console.
331+
332+
You must include the following parameter to identify the action to cancel:
333+
334+
* `--action`: The response action to cancel. Select from a list of pending actions.
335+
336+
Required role or privilege: `cancel` doesn't have its own required role or privilege. To use it, you must have the same role or privilege that's required for the action you're canceling. For example, canceling a `runscript` action requires the **Execute Operations** privilege.
337+
338+
Example: `cancel --action="copy.sh" --comment="Canceled because it is stuck"`
339+
318340
## Supporting commands and parameters [supporting-commands-parameters]
319341

320342

solutions/security/endpoint-response-actions/configure-third-party-response-actions.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,10 +97,12 @@ Expand a section below for your endpoint security system:
9797
* Microsoft Defender for Endpoint Fleet integration policy: Permission to read alert data (`Windows Defender ATP: Alert.Read.All`).
9898
* Microsoft Defender for Endpoint connector: Permission to read machine information as well as isolate and release a machine (`Windows Defender ATP: Machine.Read.All` and `Machine.Isolate`).
9999

100-
* {applies_to}`stack: ga 9.1` To run a script on a host:
100+
* {applies_to}`stack: ga 9.1` {applies_to}`serverless: ga` To run a script on a host:
101101

102102
* Microsoft Defender for Endpoint connector: Permission to manage live response library files as well as run live response on a specific machine (`Windows Defender ATP: Library.Manage` and `Machine.LiveResponse`)
103103

104+
* {applies_to}`stack: ga 9.2` {applies_to}`serverless: ga` To cancel an ongoing action on a host, you need the same permissions that are required for the action you're canceling.
105+
104106
Refer to the [Microsoft Defender for Endpoint integration documentation](https://docs.elastic.co/en/integrations/microsoft_defender_endpoint) or [Microsoft’s documentation](https://learn.microsoft.com/en-us/defender-endpoint/api/exposed-apis-create-app-webapp) for details on creating a new Azure application.
105107

106108
After you create the applications, take note of the client ID, client secret, and tenant ID for each one; you’ll need them in later steps when you configure Elastic Security components to access Microsoft Defender for Endpoint.

solutions/security/endpoint-response-actions/third-party-response-actions.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,9 @@ These response actions are supported for Microsoft Defender for Endpoint–enrol
4949

5050
Refer to the instructions on [isolating](/solutions/security/endpoint-response-actions/isolate-host.md#isolate-a-host) and [releasing](/solutions/security/endpoint-response-actions/isolate-host.md#release-a-host) hosts for more details.
5151

52-
* {applies_to}`stack: ga 9.1` **Run a script on a host** with the [`runscript` response action](/solutions/security/endpoint-response-actions.md#microsoft-defender-for-endpoint).
52+
* {applies_to}`stack: ga 9.1` {applies_to}`serverless: ga` **Run a script on a host** with the [`runscript` response action](/solutions/security/endpoint-response-actions.md#microsoft-defender-for-endpoint).
53+
54+
* {applies_to}`stack: ga 9.2` {applies_to}`serverless: ga` **Cancel an ongoing action on a host** with the [`cancel` response action](/solutions/security/endpoint-response-actions.md#cancel).
5355

5456
## SentinelOne response actions [sentinelone-response-actions]
5557

@@ -79,4 +81,4 @@ These response actions are supported for SentinelOne-enrolled hosts:
7981

8082
* **View past response action activity** in the [response actions history](/solutions/security/endpoint-response-actions/response-actions-history.md) log.
8183

82-
* {applies_to}`stack: ga 9.2` **Run a script on a host** with the [`runscript` response action](/solutions/security/endpoint-response-actions.md#sentinelone).
84+
* {applies_to}`stack: ga 9.2` {applies_to}`serverless: ga` **Run a script on a host** with the [`runscript` response action](/solutions/security/endpoint-response-actions.md#sentinelone).

0 commit comments

Comments
 (0)