-
Notifications
You must be signed in to change notification settings - Fork 201
New endpoint rules #6100
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New endpoint rules #6100
Changes from all commits
03bdfc8
2063a1e
bac7f22
bc47e7a
1155e67
ba4373a
067e4f2
55483ea
537e060
9459aa9
29e9b3d
82fe237
14a3e19
5804eea
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,43 @@ | ||
[[endpoint-protection-rules]] | ||
= Endpoint protection rules | ||
|
||
Endpoint protection rules are <<prebuilt-rules-management, prebuilt rules>> designed to help you manage and respond to alerts generated by {elastic-endpoint}, the installed component that performs {elastic-defend}'s threat monitoring and prevention. These rules include the <<endpoint-security>> rule as well as additional detection and prevention rules for different {elastic-defend} protection features. | ||
|
||
IMPORTANT: To receive {elastic-endpoint} alerts, you must install {agent} and the {elastic-defend} integration on your hosts (refer to <<install-endpoint>>). | ||
|
||
When endpoint protection rules are triggered, {elastic-endpoint} alerts are displayed as detection alerts in the {security-app}. The detection alert name is taken from the {elastic-endpoint} alert message and overwrites the prebuilt rule name in the Alerts table. For example, for malware protection, the following {elastic-endpoint} alerts are displayed as detection alerts: | ||
|
||
** Malware Prevention Alert | ||
** Malware Detection Alert | ||
|
||
[discrete] | ||
[[endpoint-sec-rule]] | ||
== Endpoint Security rule | ||
|
||
The Endpoint Security rule automatically creates an alert from all incoming {elastic-endpoint} alerts. | ||
|
||
NOTE: When you install Elastic prebuilt rules, the {elastic-defend} is enabled by default. | ||
|
||
[discrete] | ||
[[feature-protection-rules]] | ||
== Feature-specific protection rules | ||
|
||
The following endpoint protection rules give you more granular control over how you handle the generated alerts. These rules are tailored for each of {elastic-defend}'s endpoint protection features—malware, ransomware, memory threats, and malicious behavior. Enabling these rules allows you to configure more specific actions based on the protection feature and whether the malicious activity was prevented or detected. | ||
|
||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Do the following rules need to reference prebuilt rule docs, similar to how to provide a link to the Elastic Defend rule docs? (Same question for this section in the Serverless docs.) There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Probably eventually, though we might be able to publish an MVP of this page without linking to prebuilt rule docs for now. Getting those prebuilt rule docs might be out of scope for this, and something that TRADE team handles? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Let's add the links after the rules are published. The docs creation for prebuilt rules is managed by TRADE and those will be added automatically during the rules release process. I think linking them would be helpful. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 👍 Created an enhancement request to add those links once the prebuilt rule docs are published. |
||
* Behavior - Detected - Elastic Defend | ||
* Behavior - Prevented - Endpoint Defend | ||
* Malicious File - Detected - Elastic Defend | ||
* Malicious File - Prevented - Elastic Defend | ||
* Memory Signature - Detected - Elastic Defend | ||
* Memory Signature - Prevented - Elastic Defend | ||
* Ransomware - Detected - Elastic Defend | ||
* Ransomware - Prevented - Elastic Defend | ||
|
||
NOTE: If you choose to use the feature-specific protection rules, we recommend that you disable the Endpoint Security rule, as using both will result in duplicate alerts. | ||
|
||
To use these rules, you need to manually enable them from the **Rules** page in the {security-app}. Follow the instructions for <<load-prebuilt-rules,installing and enabling Elastic prebuilt rules>>. | ||
|
||
[discrete] | ||
== Endpoint security exception handling | ||
|
||
All endpoint protection rules share a common exception list called the Endpoint Security Exception List. This ensures that if you switch between using the Endpoint Security rule and the feature-specific protection rules, your existing <<endpoint-rule-exceptions, {elastic-endpoint} exceptions>> continue to apply. |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,43 @@ | ||
[[endpoint-protection-rules]] | ||
= Endpoint protection rules | ||
|
||
Endpoint protection rules are <<security-prebuilt-rules-management, prebuilt rules>> designed to help you manage and respond to alerts generated by {elastic-endpoint}, the installed component that performs {elastic-defend}'s threat monitoring and prevention. These rules include the Endpoint Security rule as well as additional detection and prevention rules for different {elastic-defend} protection features. | ||
|
||
IMPORTANT: To receive {elastic-endpoint} alerts, you must install {agent} and the {elastic-defend} integration on your hosts (refer to <<security-install-edr>>). | ||
|
||
When endpoint protection rules are triggered, {elastic-endpoint} alerts are displayed as detection alerts in the {security-app}. The detection alert name is taken from the {elastic-endpoint} alert message and overwrites the prebuilt rule name in the Alerts table. For example, for malware protection, the following {elastic-endpoint} alerts are displayed as detection alerts: | ||
|
||
** Malware Prevention Alert | ||
** Malware Detection Alert | ||
|
||
[discrete] | ||
[[endpoint-sec-rule]] | ||
== Endpoint Security rule | ||
|
||
The Endpoint Security rule automatically creates an alert from all incoming {elastic-endpoint} alerts. | ||
|
||
NOTE: When you install Elastic prebuilt rules, the Endpoint Security rule that is enabled by default. | ||
|
||
[discrete] | ||
[[feature-protection-rules]] | ||
== Feature-specific protection rules | ||
|
||
The following endpoint protection rules give you more granular control over how you handle the generated alerts. These rules are tailored for each of {elastic-defend}'s endpoint protection features—malware, ransomware, memory threats, and malicious behavior. Enabling these rules allows you to configure more specific actions based on the protection feature and whether the malicious activity was prevented or detected. | ||
|
||
* Behavior - Detected - Elastic Defend | ||
* Behavior - Prevented - Endpoint Defend | ||
* Malicious File - Detected - Elastic Defend | ||
* Malicious File - Prevented - Elastic Defend | ||
* Memory Signature - Detected - Elastic Defend | ||
* Memory Signature - Prevented - Elastic Defend | ||
* Ransomware - Detected - Elastic Defend | ||
* Ransomware - Prevented - Elastic Defend | ||
|
||
NOTE: If you choose to use the feature-specific protection rules, we recommend that you disable the Endpoint Security rule, as using both will result in duplicate alerts. | ||
|
||
To use these rules, you need to manually enable them from the **Rules** page in the {security-app}. Follow the instructions for <<load-prebuilt-rules,installing and enabling Elastic prebuilt rules>>. | ||
|
||
[discrete] | ||
== Endpoint security exception handling | ||
|
||
All endpoint protection rules share a common exception list called the Endpoint Security Exception List. This ensures that if you switch between using the Endpoint Security rule and the feature-specific protection rules, your existing <<endpoint-rule-exceptions, {elastic-endpoint} exceptions>> continue to apply. |
Uh oh!
There was an error while loading. Please reload this page.