Skip to content

Commit 599e978

Browse files
Merge branch '8.x' into mergify/bp/8.x/pr-5977
2 parents 36071dc + d6a30fd commit 599e978

File tree

2 files changed

+7
-3
lines changed

2 files changed

+7
-3
lines changed

docs/getting-started/configure-integration-policy.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -90,8 +90,8 @@ The quarantine folder location varies by operating system:
9090

9191
- macOS: `/System/Volumes/Data/.equarantine`
9292
- Linux: `.equarantine` at the root of the mount point of the file being quarantined
93-
- Windows - {elastic-defend} versions 8.5 and later: `[DriveLetter:]\.quarantine`, unless the files are from the `C:` drive. These files are moved to `C:\Program Files\Elastic\Endpoint\state\.equarantine`.
94-
- Windows - {elastic-defend} versions 8.4 and earlier: `[DriveLetter:]\.quarantine`, for any drive
93+
- Windows - {elastic-defend} versions 8.5 and later: `[DriveLetter:]\.equarantine`, unless the files are from the `C:` drive. These files are moved to `C:\Program Files\Elastic\Endpoint\state\.equarantine`.
94+
- Windows - {elastic-defend} versions 8.4 and earlier: `[DriveLetter:]\.equarantine`, for any drive
9595

9696
To restore a quarantined file to its original state and location, <<add-exceptions, add an exception>> to the rule that identified the file as malicious. If the exception would've stopped the rule from identifying the file as malicious, {elastic-defend} restores the file.
9797

docs/getting-started/defend-feature-privs.asciidoc

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,11 @@ To configure roles and privileges, find **Roles** in the navigation menu or by u
1212

1313
NOTE: {elastic-defend}'s feature privileges must be assigned to *All Spaces*. You can't assign them to an individual space.
1414

15-
To grant access, select *All* for the *Security* feature in the *{kib} privileges* configuration UI, then turn on the *Customize sub-feature privileges* switch. For each of the following sub-feature privileges, select the type of access you want to allow:
15+
To grant access, select *All* for the *Security* feature in the *Assign role to space* configuration UI, then turn on the *Customize sub-feature privileges* switch.
16+
17+
IMPORTANT: Selecting **All** for the overall **Security** feature does NOT enable any sub-features. You must also enable the **Customize sub-feature privileges** switch, and then enable each sub-feature privilege individually.
18+
19+
For each of the following sub-feature privileges, select the type of access you want to allow:
1620

1721
* *All*: Users have full access to the feature, which includes performing all available actions and managing configuration.
1822
* *Read*: Users can view the feature, but can't perform any actions or manage configuration (some features don't have this privilege).

0 commit comments

Comments
 (0)