Skip to content

Commit eae9f0a

Browse files
mergify[bot]natasha-moore-elasticgithub-actions[bot]
authored
[8.7] Adds Allowlist Elastic Endpoint in third-party antivirus apps page to serverless docs (backport #5639) (#5648)
* Adds Allowlist Elastic Endpoint in third-party antivirus apps page to serverless docs (#5639) * Adds Allowlist Elastic Endpoint in third-party antivirus apps page to serverless docs * Adds page description * Apply suggestions from code review Co-authored-by: Joe Peeples <[email protected]> * Removes div id * Adds note to allowlist pages --------- Co-authored-by: Joe Peeples <[email protected]> (cherry picked from commit f8e7ca6) # Conflicts: # docs/serverless/edr-manage/trusted-apps-ov.mdx # docs/serverless/serverless-security.docnav.json * Delete docs/serverless directory and its contents --------- Co-authored-by: natasha-moore-elastic <[email protected]> Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
1 parent 71358f9 commit eae9f0a

File tree

2 files changed

+4
-0
lines changed

2 files changed

+4
-0
lines changed

docs/management/admin/allowlist-endpoint-3rd-party-av.asciidoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
11
[[allowlist-endpoint-3rd-party-av-apps]]
22
= Allowlist Elastic Endpoint in third-party antivirus apps
33

4+
NOTE: If you use other antivirus (AV) software along with {elastic-defend}, you may need to add the other system as a trusted application in the {security-app}. Refer to <<trusted-apps-ov>> for more information.
5+
46
Third-party antivirus (AV) applications may identify the expected behavior of {elastic-endpoint} as a potential threat. Add {elastic-endpoint}'s digital signatures and file paths to your AV software's allowlist to ensure {elastic-endpoint} continues to function as intended. We recommend you allowlist both the file paths and digital signatures, if applicable.
57

68
NOTE: Your AV software may refer to allowlisted processes as process exclusions, ignored processes, or trusted processes. It is important to note that file, folder, and path-based exclusions/exceptions are distinct from trusted applications and will not achieve the same result. This page explains how to ignore actions taken by processes, not how to ignore the files that spawned those processes.

docs/management/admin/trusted-apps.asciidoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,8 @@
22
[chapter, role="xpack"]
33
= Trusted applications
44

5+
NOTE: If you use {elastic-defend} along with other antivirus (AV) software, you might need to configure the other system to trust {elastic-endpoint}. Refer to <<allowlist-endpoint-3rd-party-av-apps>> for more information.
6+
57
You can add Windows, macOS, and Linux applications that should be trusted, such as other antivirus or endpoint security applications. Trusted applications are designed to help mitigate performance issues and incompatibilities with other endpoint software installed on your hosts. Trusted applications apply only to hosts running the {elastic-defend} integration.
68

79
.Requirements

0 commit comments

Comments
 (0)