Skip to content

Conversation

jalogisch
Copy link
Member

The previous description for Trusted Applications was ambiguous. It contained these two statements:

  • Doesn’t monitor the application for threats, nor does it generate alerts, even if it behaves like malware, ransomware, etc.
  • Might still generate malicious behavior alerts, if the application’s process events indicate malicious behavior.

For users unfamiliar with the underlying mechanics of Elastic Defend, this created a logical conflict: How can an application that "isn't monitored" for threats still generate a "malicious behavior alert"? This lack of clarity made it difficult for users to understand the feature's true behavior and configure it with confidence.

Solution

This change rewrites the description to be technically precise and to remove the ambiguity. The new text now clearly differentiates between two distinct layers of protection:

  1. File-based Threat Analysis: It clarifies that "trusting" an application disables the direct scanning of the application's binary file (its code and signature). This is the "blind spot" created for performance and compatibility reasons.
  2. Behavioral Analysis: It explains that a separate detection engine continuously monitors system-wide patterns of activity. The actions of a trusted application are still part of this monitoring, and an alert will be generated if its behavior matches a malicious pattern (e.g., ransomware-like file encryption).

By explicitly defining these two concepts, the documentation now accurately explains how a trusted application can be exempt from direct scanning while still being subject to behavioral monitoring. This resolves the contradiction and provides a much clearer picture for our users.

…fend.md

The previous description for Trusted Applications was ambiguous. It contained these two statements:

* `Doesn’t monitor the application for threats, nor does it generate alerts, even if it behaves like malware, ransomware, etc.`
* `Might still generate malicious behavior alerts, if the application’s process events indicate malicious behavior.`

For users unfamiliar with the underlying mechanics of Elastic Defend, this created a logical conflict: How can an application that "isn't monitored" for threats still generate a "malicious behavior alert"? This lack of clarity made it difficult for users to understand the feature's true behavior and configure it with confidence.

### Solution

This change rewrites the description to be technically precise and to remove the ambiguity. The new text now clearly differentiates between two distinct layers of protection:

1.  **File-based Threat Analysis:** It clarifies that "trusting" an application disables the direct scanning of the application's binary file (its code and signature). This is the "blind spot" created for performance and compatibility reasons.
2.  **Behavioral Analysis:** It explains that a separate detection engine continuously monitors system-wide *patterns of activity*. The actions of a trusted application are still part of this monitoring, and an alert will be generated if its behavior matches a malicious pattern (e.g., ransomware-like file encryption).

By explicitly defining these two concepts, the documentation now accurately explains how a trusted application can be exempt from direct scanning while still being subject to behavioral monitoring. This resolves the contradiction and provides a much clearer picture for our users.
@jalogisch jalogisch requested a review from a team as a code owner September 5, 2025 07:20
Copy link

github-actions bot commented Sep 5, 2025

🔍 Preview links for changed docs

Copy link
Contributor

@natasha-moore-elastic natasha-moore-elastic left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for your contribution, @jalogisch – LGTM!

@natasha-moore-elastic natasha-moore-elastic merged commit 7d5e95d into main Sep 17, 2025
7 checks passed
@natasha-moore-elastic natasha-moore-elastic deleted the jd_elastic_defend_clarification_trusted_apps branch September 17, 2025 11:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants