Skip to content

Commit 5302829

Browse files
joepeeplesmergify[bot]
authored andcommitted
[BUG] All Kibana privileges don't grant Security / Elastic Defend features by default (#6134)
* Align with ESS on nav steps * Add admonition for emphasis (cherry picked from commit 122bea2) # Conflicts: # docs/serverless/edr-install-config/defend-feature-privs.asciidoc
1 parent d4cfba2 commit 5302829

File tree

2 files changed

+76
-1
lines changed

2 files changed

+76
-1
lines changed

docs/getting-started/defend-feature-privs.asciidoc

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,11 @@ To configure roles and privileges, find **Roles** in the navigation menu or by u
1212

1313
NOTE: {elastic-defend}'s feature privileges must be assigned to *All Spaces*. You can't assign them to an individual space.
1414

15-
To grant access, select *All* for the *Security* feature in the *{kib} privileges* configuration UI, then turn on the *Customize sub-feature privileges* switch. For each of the following sub-feature privileges, select the type of access you want to allow:
15+
To grant access, select *All* for the *Security* feature in the *Assign role to space* configuration UI, then turn on the *Customize sub-feature privileges* switch.
16+
17+
IMPORTANT: Selecting **All** for the overall **Security** feature does NOT enable any sub-features. You must also enable the **Customize sub-feature privileges** switch, and then enable each sub-feature privilege individually.
18+
19+
For each of the following sub-feature privileges, select the type of access you want to allow:
1620

1721
* *All*: Users have full access to the feature, which includes performing all available actions and managing configuration.
1822
* *Read*: Users can view the feature, but can't perform any actions or manage configuration (some features don't have this privilege).
Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
[[security-endpoint-management-req]]
2+
= {elastic-defend} feature privileges
3+
4+
// :description: Manage user roles and privileges to grant access to {elastic-defend} features.
5+
// :keywords: security, defend, reference, manage
6+
7+
preview:[]
8+
9+
You can create user roles and define privileges to manage feature access in {elastic-sec}. This allows you to use the principle of least privilege while managing access to {elastic-defend}'s features.
10+
11+
To configure roles and privileges, find **Roles** in the navigation menu or by using the global search field. For more details on using this UI, refer to <<custom-roles>>.
12+
13+
[NOTE]
14+
====
15+
{elastic-defend}'s feature privileges must be assigned to **All Spaces**. You can't assign them to an individual space.
16+
====
17+
18+
To grant access, select **All** for the **Security** feature in the **Assign role to space** configuration UI, then turn on the **Customize sub-feature privileges** switch.
19+
20+
IMPORTANT: Selecting **All** for the overall **Security** feature does NOT enable any sub-features. You must also enable the **Customize sub-feature privileges** switch, and then enable each sub-feature privilege individually.
21+
22+
For each of the following sub-feature privileges, select the type of access you want to allow:
23+
24+
* **All**: Users have full access to the feature, which includes performing all available actions and managing configuration.
25+
* **Read**: Users can view the feature, but can't perform any actions or manage configuration (some features don't have this privilege).
26+
* **None**: Users can't access or view the feature.
27+
28+
|===
29+
| |
30+
31+
| **Endpoint List**
32+
| Access the <<security-endpoints-page,Endpoints>> page, which lists all hosts running {elastic-defend}, and associated integration details.
33+
34+
| **Trusted Applications**
35+
| Access the <<security-trusted-applications,Trusted applications>> page to remediate conflicts with other software, such as antivirus or endpoint security applications
36+
37+
| **Host Isolation Exceptions**
38+
| Access the <<security-host-isolation-exceptions,Host isolation exceptions>> page to add specific IP addresses that isolated hosts can still communicate with.
39+
40+
| **Blocklist**
41+
| Access the <<security-blocklist,Blocklist>> page to prevent specified applications from running on hosts, extending the list of processes that {elastic-defend} considers malicious.
42+
43+
| **Event Filters**
44+
| Access the <<security-event-filters,Event Filters>> page to filter out endpoint events that you don't want stored in {es}.
45+
46+
| **{elastic-defend} Policy Management**
47+
| Access the <<security-policies-page,Policies>> page and {elastic-defend} integration policies to configure protections, event collection, and advanced policy features.
48+
49+
| **Response Actions History**
50+
| Access the <<security-response-actions-history,response actions history>> for endpoints.
51+
52+
| **Host Isolation**
53+
| Allow users to <<security-isolate-host,isolate and release hosts>>.
54+
55+
| **Process Operations**
56+
| Perform host process-related <<security-response-actions,response actions>>, including `processes`, `kill-process`, and `suspend-process`.
57+
58+
| **File Operations**
59+
| Perform file-related <<security-response-actions,response actions>> in the response console.
60+
61+
| **Execute Operations**
62+
a| Perform shell commands and script-related <<security-response-actions,response actions>> in the response console.
63+
64+
[WARNING]
65+
====
66+
The commands are run on the host using the same user account running the {elastic-defend} integration, which normally has full control over the system. Only grant this feature privilege to {elastic-sec} users who require this level of access.
67+
====
68+
69+
| **Scan Operations**
70+
| Perform folder scan <<security-response-actions,response actions>> in the response console.
71+
|===

0 commit comments

Comments
 (0)