Skip to content

Commit c789d23

Browse files
formatting fixes
1 parent 55f2a60 commit c789d23

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

release-notes/elastic-security/index.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -154,9 +154,9 @@ To check for security updates, go to [Security announcements for the Elastic sta
154154

155155
### Features and enhancements [elastic-security-9.0.6-features-enhancements]
156156
* Improves the reliability of {{elastic-defend}}'s connection to its kernel driver. This should reduce the instances of temporary `DEGRADED` policy statuses at boot due to `connect_kernel` failures.
157-
* Makes {elastic-defend} malware scan queue operate more efficiently by not blocking scan requests when an oplock for the file being scanned cannot be acquired.
158-
* To help identify which parts of elastic-endpoint.exe are using a significant amount of CPU, {elastic-defend} on Windows can now include CPU profiling data in diagnostics. To request CPU profiling data via the command line, see the [Agent command reference](https://www.elastic.co/docs/reference/fleet/agent-command-reference#_options). To request CPU profiling data via Kibana, check the "Collect additional CPU metrics" box when requesting Agent diagnostics.
159-
* Enriches {elastic-defend} macOS network connect events with `network.direction`. Possible values are ingress and egress.
157+
* Improves {{elastic-defend}} malware scan queue efficiency by not blocking scan requests when an oplock for the file being scanned cannot be acquired.
158+
* To help identify which parts of `elastic-endpoint.exe` are using a significant amount of CPU, {{elastic-defend}} on Windows can now include CPU profiling data in diagnostics. To request CPU profiling data using the command line, refer to [{{agent}} command reference](/reference/fleet/agent-command-reference.md#_options). To request CPU profiling data using {{kib}}, check the **Collect additional CPU metrics** box when requesting {{agent}} diagnostics.
159+
* Enriches {{elastic-defend}} macOS network connect events with `network.direction`. Possible values are `ingress` and `egress`.
160160

161161
### Fixes [elastic-security-9.0.6-fixes]
162162
* Prevents the {{esql}} form from locking in read-only mode in the rule upgrade flyout [#231699]({{kib-pull}}231699).

0 commit comments

Comments
 (0)