You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/management/admin/blocklist.asciidoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ The blocklist is not intended to broadly block benign applications for non-secur
16
16
17
17
By default, a blocklist entry is recognized globally across all hosts running {elastic-defend}. If you have a https://www.elastic.co/pricing[Platinum or Enterprise subscription], you can also assign a blocklist entry to specific {elastic-defend} integration policies, which blocks the process only on hosts assigned to that policy.
18
18
19
-
. Go to **Manage** -> **Blocklist**.
19
+
. Find **Blocklist** in the main menu or use the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
20
20
21
21
. Click **Add blocklist entry**. The **Add blocklist** flyout appears.
22
22
@@ -49,7 +49,7 @@ NOTE: You can also select the `Per Policy` option without immediately assigning
49
49
. Click **Add blocklist**. The new entry is added to the **Blocklist** page.
50
50
51
51
. When you're done adding entries to the blocklist, ensure that the blocklist is enabled for the {elastic-defend} integration policies that you just assigned:
52
-
.. Go to **Manage** -> **Policies**, then click on an integration policy.
52
+
.. Go to the **Policies** page, then click on an integration policy.
53
53
.. On the **Policy settings** tab, ensure that the **Malware protections** and **Blocklist** toggles are switched on. Both settings are enabled by default.
Copy file name to clipboardExpand all lines: docs/serverless/edr-manage/blocklist.asciidoc
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@
5
5
6
6
preview:[]
7
7
8
-
The blocklist (**Assets** → **Blocklist**) allows you to prevent specified applications from running on hosts, extending the list of processes that {elastic-defend} considers malicious. This helps ensure that known malicious processes aren't accidentally executed by end users.
8
+
The blocklist allows you to prevent specified applications from running on hosts, extending the list of processes that {elastic-defend} considers malicious. This helps ensure that known malicious processes aren't accidentally executed by end users.
9
9
10
10
The blocklist is not intended to broadly block benign applications for non-security reasons; only use it to block potentially harmful applications. To compare the blocklist with other endpoint artifacts, refer to <<security-optimize-edr>>.
11
11
@@ -22,7 +22,7 @@ The blocklist is not intended to broadly block benign applications for non-secur
22
22
23
23
By default, a blocklist entry is recognized globally across all hosts running {elastic-defend}. You can also assign a blocklist entry to specific {elastic-defend} integration policies, which blocks the process only on hosts assigned to that policy.
24
24
25
-
. Go to **Assets** → **Blocklist**.
25
+
. Find **Blocklist** in the main menu or use the global search field.
26
26
. Click **Add blocklist entry**. The **Add blocklist** flyout appears.
27
27
. Fill in these fields in the **Details** section:
28
28
+
@@ -60,14 +60,14 @@ You can also select the `Per Policy` option without immediately assigning a poli
60
60
. Click **Add blocklist**. The new entry is added to the **Blocklist** page.
61
61
. When you're done adding entries to the blocklist, ensure that the blocklist is enabled for the {elastic-defend} integration policies that you just assigned:
62
62
+
63
-
.. Go to **Assets** → **Policies**, then click on an integration policy.
63
+
.. Go to the **Policies** page, then click on an integration policy.
64
64
.. On the **Policy settings** tab, ensure that the **Malware protections** and **Blocklist** toggles are switched on. Both settings are enabled by default.
65
65
66
66
[discrete]
67
67
[[manage-blocklist]]
68
68
== View and manage the blocklist
69
69
70
-
The **Blocklist** page (**Assets** → **Blocklist**) displays all the blocklist entries that have been added to the {security-app}. To refine the list, use the search bar to search by name, description, or field value.
70
+
The **Blocklist** page displays all the blocklist entries that have been added to the {security-app}. To refine the list, use the search bar to search by name, description, or field value.
0 commit comments