Skip to content

Commit 82db7da

Browse files
joepeeplesmergify[bot]
authored andcommitted
Nav changes for "Manage Elastic Defend" and "Endpoint response actions" sections (#6073)
* Update "Trusted applications" * Update "Event filters" * Update "Host isolation exceptions" * Update "Blocklist" * Update "Isolate a host" * Update "Response actions history" * Update "Configure third-party response actions" * Fix "Configure third-party response actions" * Apply suggestions from Nastasha's review Co-authored-by: Nastasha Solomon <[email protected]> * Revise to "navigation menu" --------- Co-authored-by: Nastasha Solomon <[email protected]> (cherry picked from commit 5f71cc1) # Conflicts: # docs/serverless/edr-manage/blocklist.asciidoc # docs/serverless/edr-manage/event-filters.asciidoc # docs/serverless/edr-manage/host-isolation-exceptions.asciidoc # docs/serverless/edr-manage/trusted-apps-ov.asciidoc # docs/serverless/endpoint-response-actions/host-isolation-ov.asciidoc # docs/serverless/endpoint-response-actions/response-actions-config.asciidoc # docs/serverless/endpoint-response-actions/response-actions-history.asciidoc
1 parent f1cdd4f commit 82db7da

14 files changed

+779
-15
lines changed

docs/management/admin/blocklist.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ The blocklist is not intended to broadly block benign applications for non-secur
1616

1717
By default, a blocklist entry is recognized globally across all hosts running {elastic-defend}. If you have a https://www.elastic.co/pricing[Platinum or Enterprise subscription], you can also assign a blocklist entry to specific {elastic-defend} integration policies, which blocks the process only on hosts assigned to that policy.
1818

19-
. Go to **Manage** -> **Blocklist**.
19+
. Find **Blocklist** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
2020

2121
. Click **Add blocklist entry**. The **Add blocklist** flyout appears.
2222

@@ -49,7 +49,7 @@ NOTE: You can also select the `Per Policy` option without immediately assigning
4949
. Click **Add blocklist**. The new entry is added to the **Blocklist** page.
5050

5151
. When you're done adding entries to the blocklist, ensure that the blocklist is enabled for the {elastic-defend} integration policies that you just assigned:
52-
.. Go to **Manage** -> **Policies**, then click on an integration policy.
52+
.. Go to the **Policies** page, then click on an integration policy.
5353
.. On the **Policy settings** tab, ensure that the **Malware protections** and **Blocklist** toggles are switched on. Both settings are enabled by default.
5454

5555
[discrete]

docs/management/admin/event-filters.asciidoc

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,6 @@ Create event filters from the Hosts page or the Event filters page.
2222
+
2323
--
2424
* To create an event filter from the Hosts page:
25-
.. Go to *Explore* -> *Hosts*.
2625
.. Select the *Events* tab to view the Events table.
2726
+
2827
.. Find the event to filter, click the *More actions* menu (*...*), then select *Add Endpoint event filter*.
@@ -31,8 +30,7 @@ TIP: Since you can only create filters for endpoint events, be sure to filter th
3130
For example, in the KQL search bar, enter the following query to find endpoint network events: `event.dataset : endpoint.events.network`.
3231

3332
* To create an event filter from the Event filters page:
34-
.. Go to *Manage* -> *Event filters*.
35-
.. Click *Add event filter*. The *Add event filter* flyout opens.
33+
.. Cick *Add event filter*, which opens a flyout.
3634
--
3735
+
3836
[role="screenshot"]

docs/management/admin/host-isolation-exceptions.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ You must have the *Host Isolation Exceptions* <<endpoint-management-req,privileg
2121

2222
Host isolation is a https://www.elastic.co/pricing[Platinum or Enterprise subscription] feature. By default, a host isolation exception is recognized globally across all hosts running {elastic-defend}. You can also assign a host isolation exception to a specific {elastic-defend} integration policy, affecting only the hosts assigned to that policy.
2323

24-
. Go to **Manage** -> **Host isolation exceptions**.
24+
. Find **Host isolation exceptions** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
2525
. Click **Add Host isolation exception**.
2626
. Fill in these fields in the **Add Host isolation exception** flyout:
2727
.. `Name your host isolation exceptions`: Enter a name to identify the host isolation exception.

docs/management/admin/host-isolation-ov.asciidoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ All actions executed on a host are tracked in the host’s response actions hist
5555
.Isolate a host from an endpoint
5656
[%collapsible]
5757
====
58-
. Go to *Manage -> Endpoints*, then either:
58+
. Find **Endpoints** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then either:
5959
* Select the appropriate endpoint in the *Endpoint* column, and click *Take action -> Isolate host* in the endpoint details flyout.
6060
* Click the *Actions* menu (*...*) on the appropriate endpoint, then select *Isolate host*.
6161
. Enter a comment describing why you’re isolating the host (optional).
@@ -112,7 +112,7 @@ image::images/host-isolated-notif.png[Host isolated notification message,350]
112112
.Release a host from an endpoint
113113
[%collapsible]
114114
====
115-
. Go to *Manage -> Endpoints*, then either:
115+
. Find **Endpoints** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then either:
116116
* Select the appropriate endpoint in the *Endpoint* column, and click *Take action -> Release host* in the endpoint details flyout.
117117
* Click the *Actions* menu (*...*) on the appropriate endpoint, then select *Release host*.
118118
. Enter a comment describing why you're releasing the host (optional).
@@ -142,7 +142,7 @@ image::images/host-released-notif.png[Host released notification message,350]
142142

143143
To confirm if a host has been successfully isolated or released, check the response actions history, which logs the response actions performed on a host.
144144

145-
Go to *Manage* -> *Endpoints*, click an endpoint's name, then click the *Response action history* tab. You can filter the information displayed in this view. Refer to <<response-actions-history>> for more details.
145+
Go to the *Endpoints* page, click an endpoint's name, then click the *Response action history* tab. You can filter the information displayed in this view. Refer to <<response-actions-history>> for more details.
146146

147147
[role="screenshot"]
148148
image::images/response-actions-history-endpoint-details.png[Response actions history page UI,75%]

docs/management/admin/response-actions-config.asciidoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Expand a section below for your endpoint security system:
4343
. **Install the CrowdStrike integration and {agent}.** Elastic's {integrations-docs}/crowdstrike[CrowdStrike integration]
4444
collects and ingests logs into {elastic-sec}.
4545
+
46-
.. Go to **Integrations**, search for and select **CrowdStrike**, then select **Add CrowdStrike**.
46+
.. Find **Integrations** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], search for and select **CrowdStrike**, then select **Add CrowdStrike**.
4747
.. Configure the integration with an **Integration name** and optional **Description**.
4848
.. Select **Collect CrowdStrike logs via API**, and enter the required **Settings**:
4949
- **Client ID**: Client ID for the API client used to read CrowdStrike data.
@@ -58,7 +58,7 @@ Expand a section below for your endpoint security system:
5858
+
5959
IMPORTANT: Do not create more than one CrowdStrike connector.
6060
+
61-
.. Go to **Stack Management** → **Connectors**, then select **Create connector**.
61+
.. Find **Connectors** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then select **Create connector**.
6262
.. Select the CrowdStrike connector.
6363
.. Enter the configuration information:
6464
- **Connector name**: A name to identify the connector.
@@ -92,7 +92,7 @@ Refer to the {integrations-docs}/sentinel_one[SentinelOne integration docs] or S
9292
9393
. **Install the SentinelOne integration and {agent}.** Elastic's {integrations-docs}/sentinel_one[SentinelOne integration] collects and ingests logs into {elastic-sec}.
9494
+
95-
.. Go to **Integrations**, search for and select **SentinelOne**, then select **Add SentinelOne**.
95+
.. Find **Integrations** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], search for and select **SentinelOne**, then select **Add SentinelOne**.
9696
.. Configure the integration with an **Integration name** and optional **Description**.
9797
.. Ensure that **Collect SentinelOne logs via API** is selected, and enter the required **Settings**:
9898
- **URL**: The SentinelOne console URL.
@@ -105,7 +105,7 @@ Refer to the {integrations-docs}/sentinel_one[SentinelOne integration docs] or S
105105
+
106106
IMPORTANT: Do not create more than one SentinelOne connector.
107107
108-
.. Go to **Stack Management** → **Connectors**, then select **Create connector**.
108+
.. Find **Connectors** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field], then select **Create connector**.
109109
.. Select the **SentinelOne** connector.
110110
.. Enter the configuration information:
111111
- **Connector name**: A name to identify the connector.

docs/management/admin/response-actions-history.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
You must have the *Response Actions History* <<endpoint-management-req,privilege>> to access this feature.
1515
--
1616

17-
To access the response actions history for all endpoints, go to *Manage* -> *Response actions history*. You can also access the response actions history for an individual endpoint from these areas:
17+
To access the response actions history for all endpoints, find **Response actions history** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field]. You can also access the response actions history for an individual endpoint from these areas:
1818

1919
* *Endpoints* page: Click an endpoint's name to open the details flyout, then click the *Response actions history* tab.
2020
* *Response console* page: Click the *Response actions history* button.

docs/management/admin/trusted-apps.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ By default, a trusted application is recognized globally across all hosts runnin
2222

2323
To add a trusted application:
2424

25-
. Go to *Manage* -> *Trusted applications*.
25+
. Find **Trusted applications** in the navigation menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
2626

2727
. Click *Add trusted application*.
2828

Lines changed: 96 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,96 @@
1+
[[security-blocklist]]
2+
= Blocklist
3+
4+
// :keywords: serverless, security, how-to
5+
6+
preview:[]
7+
8+
The blocklist allows you to prevent specified applications from running on hosts, extending the list of processes that {elastic-defend} considers malicious. This helps ensure that known malicious processes aren't accidentally executed by end users.
9+
10+
The blocklist is not intended to broadly block benign applications for non-security reasons; only use it to block potentially harmful applications. To compare the blocklist with other endpoint artifacts, refer to <<security-optimize-edr>>.
11+
12+
.Requirements
13+
[NOTE]
14+
====
15+
* In addition to configuring specific entries on the **Blocklist** page, you must also ensure that the blocklist is enabled on the {elastic-defend} integration policy in the <<malware-protection,Malware protection settings>>. This setting is enabled by default.
16+
* You must have the appropriate user role to use this feature.
17+
18+
// Placeholder statement until we know which specific roles are required. Classic statement below for reference.
19+
20+
// * You must have the **Blocklist** <DocLink slug="/serverless/security/endpoint-management-req">privilege</DocLink> to access this feature.
21+
====
22+
23+
By default, a blocklist entry is recognized globally across all hosts running {elastic-defend}. You can also assign a blocklist entry to specific {elastic-defend} integration policies, which blocks the process only on hosts assigned to that policy.
24+
25+
. Find **Blocklist** in the navigation menu or use the global search field.
26+
. Click **Add blocklist entry**. The **Add blocklist** flyout appears.
27+
. Fill in these fields in the **Details** section:
28+
+
29+
.. `Name`: Enter a name to identify the application in the blocklist.
30+
.. `Description`: Enter a description to provide more information on the blocklist entry (optional).
31+
. In the **Conditions** section, enter the following information about the application you want to block:
32+
+
33+
.. `Select operating system`: Select the appropriate operating system from the drop-down.
34+
.. `Field`: Select a field to identify the application being blocked:
35+
+
36+
*** `Hash`: The MD5, SHA-1, or SHA-256 hash value of the application's executable.
37+
*** `Path`: The full file path of the application's executable.
38+
*** `Signature`: (Windows only) The name of the application's digital signer.
39+
+
40+
[TIP]
41+
====
42+
To find the signer's name for an application, go to **Discover** and query the process name of the application's executable (for example, `process.name : "mctray.exe"` for a McAfee security binary). Then, search the results for the `process.code_signature.subject_name` field, which contains the signer's name (for example, `McAfee, Inc.`).
43+
====
44+
.. `Operator`: For hash and path conditions, the operator is `is one of` and can't be modified. For signature conditions, choose `is one of` to enter multiple values or `is` for one value.
45+
.. `Value`: Enter the hash value, file path, or signer name. To enter multiple values (such as a list of known malicious hash values), you can enter each value individually or paste a comma-delimited list, then press **Return**.
46+
+
47+
[NOTE]
48+
====
49+
Hash values must be valid to add them to the blocklist.
50+
====
51+
. Select an option in the **Assignment** section to assign the blocklist entry to a specific integration policy:
52+
+
53+
** `Global`: Assign the blocklist entry to all {elastic-defend} integration policies.
54+
** `Per Policy`: Assign the blocklist entry to one or more specific {elastic-defend} integration policies. Select each policy where you want the blocklist entry to apply.
55+
+
56+
[NOTE]
57+
====
58+
You can also select the `Per Policy` option without immediately assigning a policy to the blocklist entry. For example, you could do this to create and review your blocklist configurations before putting them into action with a policy.
59+
====
60+
. Click **Add blocklist**. The new entry is added to the **Blocklist** page.
61+
. When you're done adding entries to the blocklist, ensure that the blocklist is enabled for the {elastic-defend} integration policies that you just assigned:
62+
+
63+
.. Go to the **Policies** page, then click on an integration policy.
64+
.. On the **Policy settings** tab, ensure that the **Malware protections** and **Blocklist** toggles are switched on. Both settings are enabled by default.
65+
66+
[discrete]
67+
[[manage-blocklist]]
68+
== View and manage the blocklist
69+
70+
The **Blocklist** page displays all the blocklist entries that have been added to the {security-app}. To refine the list, use the search bar to search by name, description, or field value.
71+
72+
[role="screenshot"]
73+
image::images/blocklist/-management-admin-blocklist.png[]
74+
75+
[discrete]
76+
[[edit-blocklist-entry]]
77+
=== Edit a blocklist entry
78+
79+
You can individually modify each blocklist entry. You can also change the policies that a blocklist entry is assigned to.
80+
81+
To edit a blocklist entry:
82+
83+
. Click the actions menu (image:images/icons/boxesHorizontal.svg[Actions menu icon]) for the blocklist entry you want to edit, then select **Edit blocklist**.
84+
. Modify details as needed.
85+
. Click **Save**.
86+
87+
[discrete]
88+
[[delete-blocklist-entry]]
89+
=== Delete a blocklist entry
90+
91+
You can delete a blocklist entry, which removes it entirely from all {elastic-defend} policies. This allows end users to access the application that was previously blocked.
92+
93+
To delete a blocklist entry:
94+
95+
. Click the actions menu (image:images/icons/boxesHorizontal.svg[Actions menu icon]) for the blocklist entry you want to delete, then select **Delete blocklist**.
96+
. On the dialog that opens, verify that you are removing the correct blocklist entry, then click **Delete**. A confirmation message displays.

0 commit comments

Comments
 (0)