You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/management/admin/response-actions-config.asciidoc
+8Lines changed: 8 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,8 +38,16 @@ Expand a section below for your endpoint security system:
38
38
. **Enable API access in CrowdStrike.** Create an API client in CrowdStrike to allow access to the system. Refer to CrowdStrike's docs for instructions.
39
39
+
40
40
- Give the API client the minimum privilege required to read CrowdStrike data and perform actions on enrolled hosts. Consider creating separate API clients for reading data and performing actions, to limit privileges allowed by each API client.
41
+
* To isolate and release hosts, the API client must have `Read` access for Alerts, and `Read` and `Write` access for Hosts.
42
+
41
43
- Take note of the client ID, client secret, and base URL; you'll need them in later steps when you configure {elastic-sec} components to access CrowdStrike.
42
44
45
+
- The base URL varies depending on your CrowdStrike account type:
Copy file name to clipboardExpand all lines: docs/release-notes/8.15.asciidoc
+18-4Lines changed: 18 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -157,7 +157,7 @@ On October 17, 2024, this issue was resolved.
157
157
==== Bug fixes
158
158
159
159
* Fixes an {elastic-defend} bug that affected CPU usage for Windows process events where the same executable is repeatedly launched, for example, during compilation workloads. With this fix, CPU usage is improved.
160
-
* Fixes an {elastic-defend} bug that sometimes caused malware scan response actions to crash when they attempted to scan an inaccessible directory.
160
+
* Fixes an {elastic-defend} bug that sometimes caused malware scan response actions to crash when they attempted to scan an inaccessible directory.
161
161
* Fixes an {elastic-defend} bug that sometimes caused {elastic-endpoint} to report an incorrect version if it used an independent {agent} release.
162
162
* Fixes an {elastic-defend} bug where the `process.thread.Ext.call_stack_final_user_module.protection_provenance_path` field might be populated with a non-path value. This fix is for Windows endpoints only.
163
163
* Fixes an {elastic-defend} bug that can lead to {elastic-endpoint} reporting `STATUS_ACCESS_DENIED` when attempting to open files for `GENERIC_READ`. {elastic-endpoint} almost always recovered from this issue, but with this fix, it succeeds on the first try. This fix is for Windows endpoints only.
@@ -196,7 +196,7 @@ On August 1, 2024, it was discovered that Elastic AI Assistant's responses when
196
196
[%collapsible]
197
197
====
198
198
*Details* +
199
-
On August 20, 2024, it was discovered that the bulk actions menu on the Rules page erroneously had the option to manually run multiple rules.
199
+
On August 20, 2024, it was discovered that the bulk actions menu on the Rules page erroneously had the option to manually run multiple rules.
200
200
201
201
*Workaround* +
202
202
Upgrade to 8.15.1.
@@ -224,6 +224,20 @@ On September 5, 2024, this issue was resolved.
@@ -267,7 +281,7 @@ On October 17, 2024, this issue was resolved.
267
281
* Adds an API that allows you to perform paginated KQL searches through asset criticality records ({kibana-pull}186568[#186568]).
268
282
* Adds public APIs for managing asset criticality ({kibana-pull}186169[#186169]).
269
283
* Allows you to edit the `max_signals`, `related_integrations`, and `required_fields` fields for custom rules ({kibana-pull}179680[#179680], {kibana-pull}178295[#178295], {kibana-pull}180682[#180682]).
270
-
* Provides help from AI Assistant when you're correcting rule query errors ({kibana-pull}179091[#179091]).
284
+
* Provides help from AI Assistant when you're correcting rule query errors ({kibana-pull}179091[#179091]).
271
285
* Allows you to bulk update custom highlighted fields for rules ({kibana-pull}179312[#179312]).
272
286
* Adds alert suppression for {ml} and {esql} rules ({kibana-pull}181926[#181926], {kibana-pull}180927[#180927]).
273
287
* Provides previews of hosts, users, and alerts that you're examining in the alert details flyout ({kibana-pull}186850[#186850], {kibana-pull}186857[#186857]).
@@ -293,7 +307,7 @@ On October 17, 2024, this issue was resolved.
293
307
* Updates the copy for bulk assigning asset criticality to multiple entities ({kibana-pull}181390[#181390]).
294
308
* Improves visual and logic issues in the Findings table ({kibana-pull}184185[#184185]).
295
309
* Enables the expandable alert details flyout by default and replaces the `securitySolution:enableExpandableFlyout` advanced setting with a feature flag that allows you to revert to the old flyout version ({kibana-pull}184169[#184169]).
296
-
* Improves the UI design and copy of various places in the alert details flyout ({kibana-pull}187430[#187430], {kibana-pull}187920[#187920]).
310
+
* Improves the UI design and copy of various places in the alert details flyout ({kibana-pull}187430[#187430], {kibana-pull}187920[#187920]).
297
311
* Updates the MITRE ATT&CK framework to version 15.1 ({kibana-pull}183463[#183463]).
298
312
* Improves the warning message about rule actions being unavailable after a rule ran ({kibana-pull}182741[#182741]).
299
313
* Enables the `xMatters` and `Server Log connectors` rule actions ({kibana-pull}172933[#172933]).
0 commit comments