Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
9 changes: 6 additions & 3 deletions docs/getting-started/configure-integration-policy.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -178,13 +178,16 @@ image::images/register-as-antivirus.png[Detail of Register as antivirus option.]
[[adv-policy-settings]]
== Advanced policy settings (optional)

Users with unique configuration and security requirements can select **Show Advanced Settings**
Users with unique configuration and security requirements can select **Show advanced settings**
to configure the policy to support advanced use cases. Hover over each setting to view its description.

In this section, you can <<endpoint-diagnostic-data, turn off {endpoint-cloud-sec} diagnostic data>>.

NOTE: Advanced settings are not recommended for most users.

This section includes:

* <<endpoint-diagnostic-data>>
* <<self-healing-rollback>>

[discrete]
[[save-policy]]
== Save the general policy settings
Expand Down
1 change: 1 addition & 0 deletions docs/getting-started/index.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ include::install-endpoint.asciidoc[leveloffset=+1]
include::install-elastic-endpoint.asciidoc[leveloffset=+1]
include::configure-integration-policy.asciidoc[leveloffset=+1]
include::endpoint-diagnostic-data.asciidoc[leveloffset=+2]
include::self-healing-rollback.asciidoc[leveloffset=+2]
include::threat-intel-integrations.asciidoc[leveloffset=+1]
include::advanced-setting.asciidoc[leveloffset=+1]
include::uninstall-endpoint.asciidoc[leveloffset=+1]
20 changes: 20 additions & 0 deletions docs/getting-started/self-healing-rollback.asciidoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
[[self-healing-rollback]]
= Configure self-healing rollback for Windows endpoints

{endpoint-cloud-sec}'s self-healing feature rolls back file changes on Windows endpoints when a prevention alert is generated by enabled protection features. File changes that occurred on the host within five minutes before the prevention alert will revert to their previous state (which may be up to two hours before the alert).

This can help contain the impact of malicious activity, as {endpoint-cloud-sec} not only stops the activity but also erases any attack artifacts deployed prior to detection.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same question about terminology. Isn't Elastic Endpoint doing the stopping of malicious activity? 🤔

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"Elastic Endpoint" seems to me more like an internal piece of technology than something a customer directly experiences. I was using the integration name here to more generally say that the product or the integration stops and rolls back the attack. But @ferullo @joe-desimone etc please let us know what you think.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

the integration name seems correct here.


Self-healing rollback is a https://www.elastic.co/pricing[Platinum or Enterprise subscription] feature and is only supported for Windows endpoints.

[CAUTION]
====
This feature can cause permanent data loss since it overwrites recent changes and deletes recently added files on the host. Self-healing rollback targets the changes related to a detected threat, but may also include incidental actions that aren't directly related to the threat.

Also, rollback is triggered by _every_ {endpoint-cloud-sec} prevention alert, so you should tune your system to eliminate false positives before enabling this feature.
====

. In the {security-app}, go to *Manage* -> *Policies*, then select the integration policy you want to configure.
. Scroll down to the bottom of the policy and click *Show advanced settings*.
. Enter `true` for the setting `windows.advanced.alerts.rollback.self_healing.enabled`.
. Click *Save*.
2 changes: 1 addition & 1 deletion docs/management/admin/admin-pg-ov.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,7 @@ NOTE: Users must have permission to read/write to {fleet} APIs to make changes t
[role="screenshot"]
image::images/integration-pg.png[Integration page]

Users who have unique configuration and security requirements can select **Show Advanced Settings** to configure the policy to support advanced use cases. Hover over each setting to view its description.
Users who have unique configuration and security requirements can select **Show advanced settings** to configure the policy to support advanced use cases. Hover over each setting to view its description.

NOTE: Advanced settings are not recommended for most users.

Expand Down