You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/management/admin/blocklist.asciidoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ The blocklist is not intended to broadly block benign applications for non-secur
16
16
17
17
By default, a blocklist entry is recognized globally across all hosts running {elastic-defend}. If you have a https://www.elastic.co/pricing[Platinum or Enterprise subscription], you can also assign a blocklist entry to specific {elastic-defend} integration policies, which blocks the process only on hosts assigned to that policy.
18
18
19
-
. Go to **Manage** -> **Blocklist**.
19
+
. Find **Blocklist** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
20
20
21
21
. Click **Add blocklist entry**. The **Add blocklist** flyout appears.
22
22
@@ -49,7 +49,7 @@ NOTE: You can also select the `Per Policy` option without immediately assigning
49
49
. Click **Add blocklist**. The new entry is added to the **Blocklist** page.
50
50
51
51
. When you're done adding entries to the blocklist, ensure that the blocklist is enabled for the {elastic-defend} integration policies that you just assigned:
52
-
.. Go to **Manage** -> **Policies**, then click on an integration policy.
52
+
.. Go to the **Policies** page, then click on an integration policy.
53
53
.. On the **Policy settings** tab, ensure that the **Malware protections** and **Blocklist** toggles are switched on. Both settings are enabled by default.
Copy file name to clipboardExpand all lines: docs/management/admin/host-isolation-exceptions.asciidoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ You must have the *Host Isolation Exceptions* <<endpoint-management-req,privileg
21
21
22
22
Host isolation is a https://www.elastic.co/pricing[Platinum or Enterprise subscription] feature. By default, a host isolation exception is recognized globally across all hosts running {elastic-defend}. You can also assign a host isolation exception to a specific {elastic-defend} integration policy, affecting only the hosts assigned to that policy.
23
23
24
-
. Go to **Manage** -> **Host isolation exceptions**.
24
+
. Find **Host isolation exceptions** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
25
25
. Click **Add Host isolation exception**.
26
26
. Fill in these fields in the **Add Host isolation exception** flyout:
27
27
.. `Name your host isolation exceptions`: Enter a name to identify the host isolation exception.
. Find **Endpoints** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then either:
116
116
* Select the appropriate endpoint in the *Endpoint* column, and click *Take action -> Release host* in the endpoint details flyout.
117
117
* Click the *Actions* menu (*...*) on the appropriate endpoint, then select *Release host*.
118
118
. Enter a comment describing why you're releasing the host (optional).
@@ -142,7 +142,7 @@ image::images/host-released-notif.png[Host released notification message,350]
142
142
143
143
To confirm if a host has been successfully isolated or released, check the response actions history, which logs the response actions performed on a host.
144
144
145
-
Go to *Manage* -> *Endpoints*, click an endpoint's name, then click the *Response action history* tab. You can filter the information displayed in this view. Refer to <<response-actions-history>> for more details.
145
+
Go to the *Endpoints* page, click an endpoint's name, then click the *Response action history* tab. You can filter the information displayed in this view. Refer to <<response-actions-history>> for more details.
146
146
147
147
[role="screenshot"]
148
148
image::images/response-actions-history-endpoint-details.png[Response actions history page UI,75%]
Copy file name to clipboardExpand all lines: docs/management/admin/response-actions-config.asciidoc
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,7 +51,7 @@ Expand a section below for your endpoint security system:
51
51
. **Install the CrowdStrike integration and {agent}.** Elastic's {integrations-docs}/crowdstrike[CrowdStrike integration]
52
52
collects and ingests logs into {elastic-sec}.
53
53
+
54
-
.. Go to **Integrations**, search for and select **CrowdStrike**, then select **Add CrowdStrike**.
54
+
.. Find **Integrations** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], search for and select **CrowdStrike**, then select **Add CrowdStrike**.
55
55
.. Configure the integration with an **Integration name** and optional **Description**.
56
56
.. Select **Collect CrowdStrike logs via API**, and enter the required **Settings**:
57
57
- **Client ID**: Client ID for the API client used to read CrowdStrike data.
@@ -66,7 +66,7 @@ Expand a section below for your endpoint security system:
66
66
+
67
67
IMPORTANT: Do not create more than one CrowdStrike connector.
68
68
+
69
-
.. Go to **Stack Management** → **Connectors**, then select **Create connector**.
69
+
.. Find **Connectors** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then select **Create connector**.
70
70
.. Select the CrowdStrike connector.
71
71
.. Enter the configuration information:
72
72
- **Connector name**: A name to identify the connector.
@@ -100,7 +100,7 @@ Refer to the {integrations-docs}/sentinel_one[SentinelOne integration docs] or S
100
100
101
101
. **Install the SentinelOne integration and {agent}.** Elastic's {integrations-docs}/sentinel_one[SentinelOne integration] collects and ingests logs into {elastic-sec}.
102
102
+
103
-
.. Go to **Integrations**, search for and select **SentinelOne**, then select **Add SentinelOne**.
103
+
.. Find **Integrations** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], search for and select **SentinelOne**, then select **Add SentinelOne**.
104
104
.. Configure the integration with an **Integration name** and optional **Description**.
105
105
.. Ensure that **Collect SentinelOne logs via API** is selected, and enter the required **Settings**:
106
106
- **URL**: The SentinelOne console URL.
@@ -113,7 +113,7 @@ Refer to the {integrations-docs}/sentinel_one[SentinelOne integration docs] or S
113
113
+
114
114
IMPORTANT: Do not create more than one SentinelOne connector.
115
115
116
-
.. Go to **Stack Management** → **Connectors**, then select **Create connector**.
116
+
.. Find **Connectors** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then select **Create connector**.
117
117
.. Select the **SentinelOne** connector.
118
118
.. Enter the configuration information:
119
119
- **Connector name**: A name to identify the connector.
Copy file name to clipboardExpand all lines: docs/management/admin/response-actions-history.asciidoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@
14
14
You must have the *Response Actions History* <<endpoint-management-req,privilege>> to access this feature.
15
15
--
16
16
17
-
To access the response actions history for all endpoints, go to *Manage* -> *Response actions history*. You can also access the response actions history for an individual endpoint from these areas:
17
+
To access the response actions history for all endpoints, find **Response actions history** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. You can also access the response actions history for an individual endpoint from these areas:
18
18
19
19
* *Endpoints* page: Click an endpoint's name to open the details flyout, then click the *Response actions history* tab.
20
20
* *Response console* page: Click the *Response actions history* button.
Copy file name to clipboardExpand all lines: docs/serverless/edr-manage/blocklist.asciidoc
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@
5
5
6
6
preview:[]
7
7
8
-
The blocklist (**Assets** → **Blocklist**) allows you to prevent specified applications from running on hosts, extending the list of processes that {elastic-defend} considers malicious. This helps ensure that known malicious processes aren't accidentally executed by end users.
8
+
The blocklist allows you to prevent specified applications from running on hosts, extending the list of processes that {elastic-defend} considers malicious. This helps ensure that known malicious processes aren't accidentally executed by end users.
9
9
10
10
The blocklist is not intended to broadly block benign applications for non-security reasons; only use it to block potentially harmful applications. To compare the blocklist with other endpoint artifacts, refer to <<security-optimize-edr>>.
11
11
@@ -22,7 +22,7 @@ The blocklist is not intended to broadly block benign applications for non-secur
22
22
23
23
By default, a blocklist entry is recognized globally across all hosts running {elastic-defend}. You can also assign a blocklist entry to specific {elastic-defend} integration policies, which blocks the process only on hosts assigned to that policy.
24
24
25
-
. Go to **Assets** → **Blocklist**.
25
+
. Find **Blocklist** in the navigation menu or use the global search field.
26
26
. Click **Add blocklist entry**. The **Add blocklist** flyout appears.
27
27
. Fill in these fields in the **Details** section:
28
28
+
@@ -60,14 +60,14 @@ You can also select the `Per Policy` option without immediately assigning a poli
60
60
. Click **Add blocklist**. The new entry is added to the **Blocklist** page.
61
61
. When you're done adding entries to the blocklist, ensure that the blocklist is enabled for the {elastic-defend} integration policies that you just assigned:
62
62
+
63
-
.. Go to **Assets** → **Policies**, then click on an integration policy.
63
+
.. Go to the **Policies** page, then click on an integration policy.
64
64
.. On the **Policy settings** tab, ensure that the **Malware protections** and **Blocklist** toggles are switched on. Both settings are enabled by default.
65
65
66
66
[discrete]
67
67
[[manage-blocklist]]
68
68
== View and manage the blocklist
69
69
70
-
The **Blocklist** page (**Assets** → **Blocklist**) displays all the blocklist entries that have been added to the {security-app}. To refine the list, use the search bar to search by name, description, or field value.
70
+
The **Blocklist** page displays all the blocklist entries that have been added to the {security-app}. To refine the list, use the search bar to search by name, description, or field value.
Copy file name to clipboardExpand all lines: docs/serverless/edr-manage/event-filters.asciidoc
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@
5
5
6
6
preview:[]
7
7
8
-
Event filters (**Assets** → **Event filters**) allow you to filter out endpoint events that you don't want stored in {es} — for example, high-volume events. By creating event filters, you can optimize your storage in {es}.
8
+
Event filters allow you to filter out endpoint events that you don't want stored in {es} — for example, high-volume events. By creating event filters, you can optimize your storage in {es}.
9
9
10
10
Event filters do not lower CPU usage on hosts; {elastic-endpoint} still monitors events to detect and prevent possible threats, but without writing event data to {es}. To compare event filters with other endpoint artifacts, refer to <<security-optimize-edr>>.
11
11
@@ -32,7 +32,6 @@ Create event filters from the Hosts page or the Event filters page.
32
32
+
33
33
** To create an event filter from the Hosts page:
34
34
+
35
-
... Go to **Explore** → **Hosts**.
36
35
... Select the **Events** tab to view the Events table.
37
36
... Find the event to filter, click the **More actions** menu (image:images/icons/boxesHorizontal.svg[More actions menu icon]), then select **Add Endpoint event filter**.
38
37
+
@@ -43,8 +42,7 @@ For example, in the KQL search bar, enter the following query to find endpoint n
43
42
====
44
43
** To create an event filter from the Event filters page:
Copy file name to clipboardExpand all lines: docs/serverless/edr-manage/host-isolation-exceptions.asciidoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@
5
5
6
6
preview:[]
7
7
8
-
You can configure host isolation exceptions (**Assets** → **Host isolation exceptions**) for specific IP addresses that <<security-isolate-host,isolated hosts>> are still allowed to communicate with, even when blocked from the rest of your network. Isolated hosts can still send data to {elastic-sec}, so you don't need to set up host isolation exceptions for them.
8
+
You can configure host isolation exceptions for specific IP addresses that <<security-isolate-host,isolated hosts>> are still allowed to communicate with, even when blocked from the rest of your network. Isolated hosts can still send data to {elastic-sec}, so you don't need to set up host isolation exceptions for them.
9
9
10
10
Host isolation exceptions support IPv4 addresses, with optional classless inter-domain routing (CIDR) notation.
11
11
@@ -27,7 +27,7 @@ You must have the appropriate user role to use this feature.
27
27
28
28
Host isolation requires the Endpoint Protection Complete <<elasticsearch-manage-project,project feature>>. By default, a host isolation exception is recognized globally across all hosts running {elastic-defend}. You can also assign a host isolation exception to a specific {elastic-defend} integration policy, affecting only the hosts assigned to that policy.
29
29
30
-
. Go to **Assets** → **Host isolation exceptions**.
30
+
. Find **Host isolation exceptions** in the navigation menu or use the global search field.
31
31
. Click **Add Host isolation exception**.
32
32
. Fill in these fields in the **Add Host isolation exception** flyout:
0 commit comments