diff --git a/solutions/security/manage-elastic-defend/optimize-elastic-defend.md b/solutions/security/manage-elastic-defend/optimize-elastic-defend.md index e4bd122b9c..0f486cda1d 100644 --- a/solutions/security/manage-elastic-defend/optimize-elastic-defend.md +++ b/solutions/security/manage-elastic-defend/optimize-elastic-defend.md @@ -21,7 +21,7 @@ The following table explains the differences between several Endpoint artifacts | | | | --- | --- | -| [Trusted application](trusted-applications.md) | **Prevents {{elastic-endpoint}} from monitoring a process.** Use to avoid conflicts with other software, usually other antivirus or endpoint security applications.

- Creates intentional blind spots in your security environment — use sparingly!
- Doesn’t monitor the application for threats, nor does it generate alerts, even if it behaves like malware, ransomware, etc.
- Doesn’t generate events for the application except process events for visualizations and other internal use by the {{stack}}.
- Might improve performance, since {{elastic-endpoint}} monitors fewer processes.
- Might still generate malicious behavior alerts, if the application’s process events indicate malicious behavior. To suppress alerts, create [Endpoint alert exceptions](../detect-and-alert/add-manage-exceptions.md#endpoint-rule-exceptions).
| +| [Trusted application](trusted-applications.md) | **Prevents {{elastic-endpoint}} from monitoring a process.** Use to avoid conflicts with other software, usually other antivirus or endpoint security applications.

- Creates intentional blind spots in your security environment — use sparingly!
- Stops direct threat analysis on the application's file, meaning its signature and code will not be scanned for known malware threats upon execution.
- Doesn’t generate events for the application except process events for visualizations and other internal use by the {{stack}}.
- Might improve performance, since {{elastic-endpoint}} monitors fewer processes.
- While the application file itself is not scanned, its actions are still monitored as part of the overall system activity. Our separate behavioral detection engine will still generate an alert if the trusted application performs a sequence of actions that matches a malicious pattern, such as ransomware-like file encryption. To suppress alerts, create [Endpoint alert exceptions](../detect-and-alert/add-manage-exceptions.md#endpoint-rule-exceptions).
| | [Event filter](event-filters.md) | **Prevents event documents from being written to {{es}}.** Use to reduce storage usage in {{es}}.

Does NOT lower CPU usage for {{elastic-endpoint}}. It still monitors event data for possible threats, but without writing event data to {{es}}.
| | [Blocklist](blocklist.md) | **Prevents known malware from running.** Use to extend {{elastic-defend}}'s protection against malicious processes.

NOT intended to broadly block benign applications for non-security reasons.
| | [Endpoint alert exception](../detect-and-alert/add-manage-exceptions.md#endpoint-rule-exceptions) | **Prevents {{elastic-endpoint}} from generating alerts or stopping processes.** Use to reduce false positive alerts, and to keep {{elastic-endpoint}} from preventing processes you want to allow.

Might also improve performance: {{elastic-endpoint}} checks for exceptions *before* most other processing, and stops monitoring a process if an exception allows it.
|