Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ After the {agent} is installed with the {endpoint-sec} integration, several prot
preventions against malware, ransomware, memory threats, and malicious behavior — are automatically enabled
on protected hosts (some features require a Platinum or Enterprise license). If needed, you can update the
integration policy to configure protection settings, event collection, antivirus settings, trusted applications,
event filters, and host isolation exceptions to meet your organization's security needs.
event filters, host isolation exceptions, and blocked applications to meet your organization's security needs.

NOTE: You must have the {kib} `superuser` role to configure an integration policy in the {security-app}.

Expand Down
2 changes: 0 additions & 2 deletions docs/management/admin/blocklist.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,6 @@
[chapter]
= Blocklist

coming[8.2.0]

The blocklist allows you to prevent specified applications from running on hosts, extending the list of processes that {endpoint-sec} considers malicious. This is especially useful for ensuring that known malicious processes aren't accidentally executed by end users.

[NOTE]
Expand Down