Skip to content

Commit cd67cde

Browse files
joepeeplesbenironsidenastasha-solomonjmikell821kevinlog
authored andcommitted
[DOCS] Blocklist (#1811)
* Create new Blocklist page * Add Blocklist page to TOC * Add new Blocklist section on UI overview page for * Correction * Align description on UI overview page * Update config integration policy page, image * Add info about int policy to blocklist page * Add Blocklist to UI list * Adds prelim "coming" tag, some corrections * Correction * Add info about multiple values, lists * another. correction. * Apply first round of feedback Co-authored-by: benironside <91905639+benironside@users.noreply.github.com> Co-authored-by: nastasha-solomon <79124755+nastasha-solomon@users.noreply.github.com> * Apply a few more feedback edits Co-authored-by: benironside <91905639+benironside@users.noreply.github.com> * Update docs/management/admin/blocklist.asciidoc * Update docs/management/admin/blocklist.asciidoc Co-authored-by: benironside <91905639+benironside@users.noreply.github.com> * Apply suggestions from Janeen's review Co-authored-by: Janeen Mikell-Straughn <57149392+jmikell821@users.noreply.github.com> * Rename actions menu (prev button) * Update docs/management/admin/blocklist.asciidoc * Update docs/getting-started/configure-integration-policy.asciidoc Co-authored-by: Kevin Logan <56395104+kevinlog@users.noreply.github.com> Co-authored-by: benironside <91905639+benironside@users.noreply.github.com> Co-authored-by: nastasha-solomon <79124755+nastasha-solomon@users.noreply.github.com> Co-authored-by: Janeen Mikell-Straughn <57149392+jmikell821@users.noreply.github.com> Co-authored-by: Kevin Logan <56395104+kevinlog@users.noreply.github.com> (cherry picked from commit 89b1455)
1 parent 0f5306c commit cd67cde

File tree

6 files changed

+98
-3
lines changed

6 files changed

+98
-3
lines changed

docs/getting-started/configure-integration-policy.asciidoc

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,10 +19,10 @@ To configure the integration policy:
1919
* <<adv-policy-settings>>
2020
* <<save-policy>>
2121

22-
4. Click the **Trusted applications**, **Event filters**, and **Host isolation exceptions** tabs to review the endpoint policy artifacts assigned to this integration policy (for more information, refer to <<trusted-apps-ov>>, <<event-filters>>, and <<host-isolation-exceptions>>). On these tabs, you can:
22+
4. Click the **Trusted applications**, **Event filters**, **Host isolation exceptions**, and **Blocklist** tabs to review the endpoint policy artifacts assigned to this integration policy (for more information, refer to <<trusted-apps-ov>>, <<event-filters>>, <<host-isolation-exceptions>>, and <<blocklist>>). On these tabs, you can:
2323
* Expand and view an artifact — Click the arrow next to its name.
24-
* View an artifact's details — Click the actions button (**...**), then select **View full details**.
25-
* Unassign an artifact (Platinum or Enterprise subscription) — Click the actions button (**...**), then select **Remove from policy**. This does not delete the artifact; this just unassigns it from the current policy.
24+
* View an artifact's details — Click the actions menu (**...**), then select **View full details**.
25+
* Unassign an artifact (Platinum or Enterprise subscription) — Click the actions menu (**...**), then select **Remove from policy**. This does not delete the artifact; this just unassigns it from the current policy.
2626
* Assign an existing artifact (Platinum or Enterprise subscription) — Click **Assign _x_ to policy**, then select an item from the flyout. This view lists any existing artifacts that aren't already assigned to the current policy.
2727

2828
NOTE: You can't create a new endpoint policy artifact while configuring an integration policy. To create a new artifact, go to its main page in the {security-app} (for example, to create a new trusted application, go to **Manage** -> **Trusted applications**).
@@ -42,6 +42,8 @@ Malware protection levels are:
4242
+
4343
TIP: Platinum and Enterprise customers can customize these notifications using the `Elastic Security {action} {filename}` syntax.
4444

45+
Malware protection also allows you to manage a blocklist to prevent specified applications from running on hosts, extending the list of processes that {endpoint-sec} considers malicious. Use the **Blocklist enabled** toggle to enable or disable this feature for all hosts associated with the integration policy. To configure the blocklist, refer to <<blocklist>>.
46+
4547
[role="screenshot"]
4648
image::images/install-endpoint/malware-protection.png[Detail of malware protection section.]
4749

2.6 KB
Loading

docs/getting-started/security-ui.asciidoc

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,7 @@ The {security-app} contains the following pages that enable analysts to view, an
3333
* Trusted applications
3434
* Event filters
3535
* Host isolation exceptions
36+
* Blocklist
3637

3738
Pages are grouped into four main sections within the navigation pane -- Detect, Explore, Investigate, and Manage. Each section supports a different part of your workflow and describes actions you can perform in the {security-app}.
3839

@@ -191,6 +192,15 @@ The Host isolation exceptions page allows you to specify IP addresses that allow
191192
[role="screenshot"]
192193
image::management/admin/images/host-isolation-exceptions-ui.png[Shows the Host isolation exceptions page]
193194

195+
[float]
196+
[[blocklist-page]]
197+
=== Blocklist page
198+
199+
The Blocklist page allows you to prevent specified applications from running on hosts, extending the list of processes that {endpoint-sec} considers malicious. Refer to <<blocklist, Blocklist>> for more information.
200+
201+
[role="screenshot"]
202+
image::management/admin/images/blocklist.png[Blocklist page]
203+
194204
[discrete]
195205
[[timeline-accessibility-features]]
196206
== Accessibility features
Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
[[blocklist]]
2+
[chapter]
3+
= Blocklist
4+
5+
coming[8.2.0]
6+
7+
The blocklist allows you to prevent specified applications from running on hosts, extending the list of processes that {endpoint-sec} considers malicious. This is especially useful for ensuring that known malicious processes aren't accidentally executed by end users.
8+
9+
[NOTE]
10+
=====
11+
In addition to configuring specific entries on the **Blocklist** page, you must also ensure that the blocklist is enabled on the {endpoint-sec} integration policy in the <<malware-protection, Malware protection settings>>. This setting is enabled by default.
12+
13+
You must have the built-in `superuser` role to access the blocklist. For more information, refer to {ref}/built-in-users.html[Built-in users].
14+
=====
15+
16+
By default, a blocklist entry is recognized globally across all hosts running {endpoint-sec}. If you have a https://www.elastic.co/pricing[Platinum or Enterprise subscription], you can also assign a blocklist entry to specific {endpoint-sec} integration policies, which blocks the process only on hosts assigned to that policy.
17+
18+
. Go to **Manage** -> **Blocklist**.
19+
20+
. Click **Add blocklist entry**. The **Add blocklist** flyout appears.
21+
22+
. Fill in these fields in the **Details** section:
23+
.. `Name`: Enter a name to identify the application in the blocklist.
24+
.. `Description`: Enter a description to provide more information on the blocklist entry (optional).
25+
26+
. In the **Conditions** section, enter the following information about the application you want to block:
27+
.. `Select operating system`: Select the appropriate operating system from the drop-down.
28+
.. `Field`: Select a field to identify the application being blocked:
29+
* `Hash`: The MD5, SHA-1, or SHA-256 hash value of the application's executable.
30+
* `Path`: The full file path of the application's executable.
31+
* `Signature`: (Windows only) The name of the application's digital signer.
32+
+
33+
TIP: To find the signer's name for an application, go to *Kibana* -> *Discover* and query the process name of the application's executable (for example, `process.name : "mctray.exe"` for a McAfee security binary). Then, search the results for the `process.code_signature.subject_name` field, which contains the signer's name (for example, `McAfee, Inc.`).
34+
35+
.. `Operator`: The operator is `is one of` and cannot be modified.
36+
37+
.. `Value`: Enter the hash value, file path, or signer name. To enter multiple values (such as a list of known malicious hash values), you can enter each value individually or paste a comma-delimited list, then press **Return**.
38+
+
39+
NOTE: Hash values must be valid to add them to the blocklist.
40+
41+
. Select an option in the *Assignment* section to assign the blocklist entry to a specific integration policy:
42+
+
43+
* `Global`: Assign the blocklist entry to all {endpoint-sec} integration policies.
44+
* `Per Policy`: Assign the blocklist entry to one or more specific {endpoint-sec} integration policies. Select each policy where you want the blocklist entry to apply.
45+
+
46+
NOTE: You can also select the `Per Policy` option without immediately assigning a policy to the blocklist entry. For example, you could do this to create and review your blocklist configurations before putting them into action with a policy.
47+
48+
. Click **Add blocklist**. The new entry is added to the **Blocklist** page.
49+
50+
. When you're done adding entries to the blocklist, ensure that the blocklist is enabled for the {endpoint-sec} integration policies that you just assigned:
51+
.. Go to **Manage** -> **Policies**, then click on an integration policy.
52+
.. On the **Policy settings** tab, ensure that the **Malware protections enabled** and **Blocklist enabled** toggles are switched on. Both settings are enabled by default.
53+
54+
[discrete]
55+
[[manage-blocklist]]
56+
== View and manage the blocklist
57+
58+
The *Blocklist* page displays all the blocklist entries that have been added to the {security-app}. To refine the list, use the search bar to search by name, description, or field value.
59+
60+
[role="screenshot"]
61+
image::images/blocklist.png[]
62+
63+
[discrete]
64+
[[edit-blocklist-entry]]
65+
=== Edit a blocklist entry
66+
You can individually modify each blocklist entry. With a Platinum or Enterprise subscription, you can also change the policies that a blocklist entry is assigned to.
67+
68+
To edit a blocklist entry:
69+
70+
. Click the actions menu (*...*​) for the blocklist entry you want to edit, then select *Edit blocklist*.
71+
. Modify details as needed.
72+
. Click *Save*.
73+
74+
[discrete]
75+
[[delete-blocklist-entry]]
76+
=== Delete a blocklist entry
77+
You can delete a blocklist entry, which removes it entirely from all {endpoint-sec} policies. This allows end users to access the application that was previously blocked.
78+
79+
To delete a blocklist entry:
80+
81+
. Click the actions menu (*...*) for the blocklist entry you want to delete, then select *Delete blocklist*.
82+
. On the dialog that opens, verify that you are removing the correct blocklist entry, then click *Delete*. A confirmation message displays.
364 KB
Loading

docs/management/manage-intro.asciidoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,3 +9,4 @@ include::{security-docs-root}/docs/management/admin/host-isolation-ov.asciidoc[l
99
include::{security-docs-root}/docs/management/admin/trusted-apps.asciidoc[leveloffset=+1]
1010
include::{security-docs-root}/docs/management/admin/event-filters.asciidoc[leveloffset=+1]
1111
include::{security-docs-root}/docs/management/admin/host-isolation-exceptions.asciidoc[leveloffset=+1]
12+
include::{security-docs-root}/docs/management/admin/blocklist.asciidoc[leveloffset=+1]

0 commit comments

Comments
 (0)