|
| 1 | +[[security-endpoint-management-req]] |
| 2 | += {elastic-defend} feature privileges |
| 3 | + |
| 4 | +// :description: Manage user roles and privileges to grant access to {elastic-defend} features. |
| 5 | +// :keywords: security, defend, reference, manage |
| 6 | + |
| 7 | +preview:[] |
| 8 | + |
| 9 | +You can create user roles and define privileges to manage feature access in {elastic-sec}. This allows you to use the principle of least privilege while managing access to {elastic-defend}'s features. |
| 10 | + |
| 11 | +To configure roles and privileges, find **Roles** in the navigation menu or by using the global search field. For more details on using this UI, refer to <<custom-roles>>. |
| 12 | + |
| 13 | +[NOTE] |
| 14 | +==== |
| 15 | +{elastic-defend}'s feature privileges must be assigned to **All Spaces**. You can't assign them to an individual space. |
| 16 | +==== |
| 17 | + |
| 18 | +To grant access, select **All** for the **Security** feature in the **Assign role to space** configuration UI, then turn on the **Customize sub-feature privileges** switch. |
| 19 | + |
| 20 | +IMPORTANT: Selecting **All** for the overall **Security** feature does NOT enable any sub-features. You must also enable the **Customize sub-feature privileges** switch, and then enable each sub-feature privilege individually. |
| 21 | + |
| 22 | +For each of the following sub-feature privileges, select the type of access you want to allow: |
| 23 | + |
| 24 | +* **All**: Users have full access to the feature, which includes performing all available actions and managing configuration. |
| 25 | +* **Read**: Users can view the feature, but can't perform any actions or manage configuration (some features don't have this privilege). |
| 26 | +* **None**: Users can't access or view the feature. |
| 27 | + |
| 28 | +|=== |
| 29 | +| | |
| 30 | + |
| 31 | +| **Endpoint List** |
| 32 | +| Access the <<security-endpoints-page,Endpoints>> page, which lists all hosts running {elastic-defend}, and associated integration details. |
| 33 | + |
| 34 | +| **Trusted Applications** |
| 35 | +| Access the <<security-trusted-applications,Trusted applications>> page to remediate conflicts with other software, such as antivirus or endpoint security applications |
| 36 | + |
| 37 | +| **Host Isolation Exceptions** |
| 38 | +| Access the <<security-host-isolation-exceptions,Host isolation exceptions>> page to add specific IP addresses that isolated hosts can still communicate with. |
| 39 | + |
| 40 | +| **Blocklist** |
| 41 | +| Access the <<security-blocklist,Blocklist>> page to prevent specified applications from running on hosts, extending the list of processes that {elastic-defend} considers malicious. |
| 42 | + |
| 43 | +| **Event Filters** |
| 44 | +| Access the <<security-event-filters,Event Filters>> page to filter out endpoint events that you don't want stored in {es}. |
| 45 | + |
| 46 | +| **{elastic-defend} Policy Management** |
| 47 | +| Access the <<security-policies-page,Policies>> page and {elastic-defend} integration policies to configure protections, event collection, and advanced policy features. |
| 48 | + |
| 49 | +| **Response Actions History** |
| 50 | +| Access the <<security-response-actions-history,response actions history>> for endpoints. |
| 51 | + |
| 52 | +| **Host Isolation** |
| 53 | +| Allow users to <<security-isolate-host,isolate and release hosts>>. |
| 54 | + |
| 55 | +| **Process Operations** |
| 56 | +| Perform host process-related <<security-response-actions,response actions>>, including `processes`, `kill-process`, and `suspend-process`. |
| 57 | + |
| 58 | +| **File Operations** |
| 59 | +| Perform file-related <<security-response-actions,response actions>> in the response console. |
| 60 | + |
| 61 | +| **Execute Operations** |
| 62 | +a| Perform shell commands and script-related <<security-response-actions,response actions>> in the response console. |
| 63 | + |
| 64 | +[WARNING] |
| 65 | +==== |
| 66 | +The commands are run on the host using the same user account running the {elastic-defend} integration, which normally has full control over the system. Only grant this feature privilege to {elastic-sec} users who require this level of access. |
| 67 | +==== |
| 68 | + |
| 69 | +| **Scan Operations** |
| 70 | +| Perform folder scan <<security-response-actions,response actions>> in the response console. |
| 71 | +|=== |
0 commit comments