-
Notifications
You must be signed in to change notification settings - Fork 208
[DOCS] Endpoint self-healing rollback #2267
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 2 commits
9361f36
6786c9d
9a46890
3d1a08f
4bb8ea0
3376e6e
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,20 @@ | ||
| [[self-healing-rollback]] | ||
| = Configure self-healing rollback for Windows endpoints | ||
|
|
||
| {endpoint-cloud-sec}'s self-healing feature rolls back file changes and processes on Windows endpoints when a prevention alert is generated by enabled protection features. All activity on the host reverts to its state five minutes before the prevention alert. | ||
|
||
|
|
||
| This can help contain the impact of malicious activity, as {endpoint-cloud-sec} not only stops the activity but also erases any attack artifacts deployed prior to detection. | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Same question about terminology. Isn't Elastic Endpoint doing the stopping of malicious activity? 🤔
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. "Elastic Endpoint" seems to me more like an internal piece of technology than something a customer directly experiences. I was using the integration name here to more generally say that the product or the integration stops and rolls back the attack. But @ferullo @joe-desimone etc please let us know what you think.
Collaborator
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. the integration name seems correct here. |
||
|
|
||
| Self-healing rollback is a https://www.elastic.co/pricing[Platinum or Enterprise subscription] feature, and it's only supported for Windows endpoints. | ||
joepeeples marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| [CAUTION] | ||
| ==== | ||
| This feature can cause data loss, since it reverts _all_ recent changes on the host, not just changes directly related to a threat. | ||
joepeeples marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| Also, rollback is triggered by _every_ {endpoint-cloud-sec} prevention alert, so you should tune your system to eliminate false positives before enabling this feature. | ||
| ==== | ||
|
|
||
| . In the {security-app}, go to *Manage* -> *Policies*, then select the integration policy you want to configure. | ||
| . Scroll down to the bottom of the policy and click *Show advanced settings*. | ||
| . Enter `true` for the setting `windows.advanced.alerts.rollback.self_healing.enabled`. | ||
| . Click *Save*. | ||
Uh oh!
There was an error while loading. Please reload this page.