Skip to content

Conversation

@joepeeples
Copy link
Contributor

@joepeeples joepeeples commented Aug 8, 2022

Resolves #2233.

Previews:

Questions for reviewers:

  • What's the preferred name? Is "self-healing rollback" OK or should it be just "self-healing" (or something else)?
  • Are registry changes included in the rollback?
  • When exactly does the 5-minute rollback start from? (Draft currently says 5 minutes from the prevention alert.)
  • Does this need any other disclaimers, such as "experimental" etc.?
  • Any specific suggestions we can give on avoiding false positives, tuning, etc.? (Trusted apps? Event filters?)

@joepeeples joepeeples added Team: Docs Team: Endpoint Endpoint related issues Feature: Policy Elastic Defend integration policy and configuration v8.4.0 labels Aug 8, 2022
@joepeeples joepeeples self-assigned this Aug 8, 2022
@joepeeples joepeeples marked this pull request as ready for review August 8, 2022 13:33
Copy link
Collaborator

@ferullo ferullo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@joe-desimone @nfritts do you have thoughts on this doc?

Copy link
Contributor

@nastasha-solomon nastasha-solomon left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Left one suggestion. LGTM overall!

Add more nuance about how rollback targets files, etc.
Copy link
Contributor

@jmikell821 jmikell821 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I had a few questions and just some slight suggestions. Curious to find out the answers -- thanks!

[[self-healing-rollback]]
= Configure self-healing rollback for Windows endpoints

{endpoint-cloud-sec}'s self-healing feature rolls back file changes and processes on Windows endpoints when a prevention alert is generated by enabled protection features. All activity on the host reverts to its state five minutes before the prevention alert.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Question about terminology: is this an Endpoint Security feature, an Endpoint and Cloud Security feature (which is basically the integration, right?) or a policy configuration? I want to make sure we aren't confusing the terms, so just checking for clarification, thanks! cc: @ferullo @joe-desimone

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think "Endpoint and Cloud Security feature" is appropriate here, because it's part of that integration and this sentence is talking about what the feature is and does, not how it's configured. After the rename of the integration, there isn't really anything called "Endpoint Security" anymore. @ferullo @joe-desimone thoughts?

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think Endpoint and Cloud Security is appropriate here.


{endpoint-cloud-sec}'s self-healing feature rolls back file changes and processes on Windows endpoints when a prevention alert is generated by enabled protection features. All activity on the host reverts to its state five minutes before the prevention alert.

This can help contain the impact of malicious activity, as {endpoint-cloud-sec} not only stops the activity but also erases any attack artifacts deployed prior to detection.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same question about terminology. Isn't Elastic Endpoint doing the stopping of malicious activity? 🤔

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"Elastic Endpoint" seems to me more like an internal piece of technology than something a customer directly experiences. I was using the integration name here to more generally say that the product or the integration stops and rolls back the attack. But @ferullo @joe-desimone etc please let us know what you think.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

the integration name seems correct here.

@joepeeples joepeeples added the readyforQA PRs that are ready for QA review. label Aug 18, 2022
Co-authored-by: Janeen Mikell-Straughn <57149392+jmikell821@users.noreply.github.com>
@muskangulati-qasource
Copy link

Hi @joepeeples,

We have validated the Kibana documentation with reference to this PR and found that the docs are correct

Hence, we are marking this PR as QA:Approved.

Thank you!

@muskangulati-qasource muskangulati-qasource added QA:Validated Issue has been Validated by QA Team and removed readyforQA PRs that are ready for QA review. labels Aug 22, 2022
@joepeeples joepeeples requested a review from bit-envoy August 22, 2022 20:25
@joepeeples joepeeples merged commit 946f6aa into main Aug 23, 2022
mergify bot pushed a commit that referenced this pull request Aug 23, 2022
* First draft

* Edits

* Apply suggestions from review

Add more nuance about how rollback targets files, etc.

* Apply suggestions from code review

Co-authored-by: Janeen Mikell-Straughn <57149392+jmikell821@users.noreply.github.com>

* Update docs/getting-started/self-healing-rollback.asciidoc

Co-authored-by: Janeen Mikell-Straughn <57149392+jmikell821@users.noreply.github.com>
(cherry picked from commit 946f6aa)
joepeeples added a commit that referenced this pull request Aug 24, 2022
* First draft

* Edits

* Apply suggestions from review

Add more nuance about how rollback targets files, etc.

* Apply suggestions from code review

Co-authored-by: Janeen Mikell-Straughn <57149392+jmikell821@users.noreply.github.com>

* Update docs/getting-started/self-healing-rollback.asciidoc

Co-authored-by: Janeen Mikell-Straughn <57149392+jmikell821@users.noreply.github.com>
(cherry picked from commit 946f6aa)

Co-authored-by: Joe Peeples <joe.peeples@elastic.co>
@joepeeples joepeeples deleted the issue-2233-self-healing-endpoint branch August 24, 2022 01:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Feature: Policy Elastic Defend integration policy and configuration QA:Validated Issue has been Validated by QA Team Team: Docs Team: Endpoint Endpoint related issues v8.4.0

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[DOCS] Endpoint self-healing rollback

10 participants