Skip to content

Commit 383d9c4

Browse files
[Security] [Serverless: Oct 7] Automatic troubleshooting updates (#3318)
Resolves #2968. * Updates applies_to tags to reflect that automatic troubleshooting is going GA. * Adds new functionality (policy issues troubleshooting) to the automatic troubleshooting feature. The existing page (**Identify antivirus software on your hosts**) has been renamed to **Automatic troubleshooting** and expanded to include the new functionality (new sections: **Automatic troubleshooting** and **Troubleshoot policy issues**) Previews: * [Automatic troubleshooting](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/3318/solutions/security/manage-elastic-defend/automatic-troubleshooting) * [AI use cases > Other AI-powered tools](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/3318/solutions/security/ai/use-cases#other-ai-powered-tools) --------- Co-authored-by: florent-leborgne <[email protected]>
1 parent 17858c5 commit 383d9c4

File tree

6 files changed

+83
-54
lines changed

6 files changed

+83
-54
lines changed

redirects.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -503,6 +503,8 @@ redirects:
503503
'explore-analyze/query-filter/languages/sql-client-apps-tableau-desktop.md': 'elasticsearch://reference/query-languages/sql/sql-client-apps-tableau-desktop.md'
504504
'explore-analyze/query-filter/languages/sql-client-apps-tableau-server.md': 'elasticsearch://reference/query-languages/sql/sql-client-apps-tableau-server.md'
505505

506+
# Related to https://github.com/elastic/docs-content/pull/3318
507+
'solutions/security/manage-elastic-defend/identify-antivirus-software-on-hosts.md': 'solutions/security/manage-elastic-defend/automatic-troubleshooting.md'
506508

507509

508510

solutions/security/ai/use-cases.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,8 @@ In addition to AI Assistant and Attack Discovery, {{elastic-sec}} provides sever
2727

2828
* [Automatic Import](/solutions/security/get-started/automatic-import.md): Helps you quickly parse, ingest, and create [ECS mappings](https://www.elastic.co/elasticsearch/common-schema) for data from sources that don’t yet have prebuilt Elastic integrations. This can accelerate your migration to {{elastic-sec}}, and help you quickly add new data sources to an existing SIEM solution in {{elastic-sec}}.
2929
* [Automatic Migration](/solutions/security/get-started/automatic-migration.md): Helps you quickly convert SIEM rules from the Splunk Processing Language (SPL) to the Elasticsearch Query Language ({{esql}}). If comparable Elastic-authored rules exist, it simplifies onboarding by mapping your rules to them. Otherwise, it creates custom rules on the fly so you can verify and edit them instead of writing them from scratch.
30-
* [Automatic Troubleshooting](/solutions/security/manage-elastic-defend/identify-antivirus-software-on-hosts.md): Helps you quickly check whether your endpoints have third-party AV software installed by analyzing file event logs from your hosts to determine whether antivirus software is present. From there, you can address any incompatibilities to make sure your endpoints are protected.
30+
* [Automatic Troubleshooting](/solutions/security/manage-elastic-defend/automatic-troubleshooting.md): Helps you quickly check whether your endpoints have third-party AV software installed by analyzing file event logs from your hosts to determine whether antivirus software is present. From there, you can address any incompatibilities to make sure your endpoints are protected.
31+
32+
{applies_to}`stack: ga 9.2` {applies_to}`serverless: ga` Helps you detect any issues in {{elastic-defend}} integration policies and suggests remediation steps.
3133

3234

solutions/security/configure-elastic-defend/elastic-defend-feature-privileges.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ For each of the following sub-feature privileges, select the type of access you
3838
| | |
3939
| --- | --- |
4040
| **Endpoint List** | Access the [Endpoints](/solutions/security/manage-elastic-defend/endpoints.md) page, which lists all hosts running {{elastic-defend}}, and associated integration details. |
41-
| **Automatic Troubleshooting** |Access [Automatic Troubleshooting](/solutions/security/manage-elastic-defend/identify-antivirus-software-on-hosts.md) to check if your hosts have third-party AV software installed.<br><br>**Note:** In {{stack}} 9.0.0, this privilege is called **Endpoint Insights**. |
41+
| **Automatic Troubleshooting** |Access [Automatic Troubleshooting](/solutions/security/manage-elastic-defend/automatic-troubleshooting.md) to check if your hosts have third-party AV software installed.<br><br>**Note:** In {{stack}} 9.0.0, this privilege is called **Endpoint Insights**. |
4242
| **Global Artifact Management** {applies_to}`stack: ga 9.1` | Manage global assignment of endpoint artifacts (e.g., trusted applications, event filters) across all spaces and policies. This privilege controls global assignment rights only; privileges for each artifact type are required for full artifact management. |
4343
| **Trusted Applications** | Access the [Trusted applications](/solutions/security/manage-elastic-defend/trusted-applications.md) page to remediate conflicts with other software, such as antivirus or endpoint security applications. |
4444
| **Host Isolation Exceptions** | Access the [Host isolation exceptions](/solutions/security/manage-elastic-defend/host-isolation-exceptions.md) page to add specific IP addresses that isolated hosts can still communicate with. |
Lines changed: 76 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,76 @@
1+
---
2+
mapped_pages:
3+
- https://www.elastic.co/guide/en/serverless/current/identify-third-party-av-products.html
4+
applies_to:
5+
stack: ga 9.2, preview 9.0
6+
serverless:
7+
security: ga
8+
products:
9+
- id: security
10+
- id: cloud-serverless
11+
---
12+
13+
# Automatic troubleshooting
14+
15+
Automatic troubleshooting helps you identify and resolve issues that could prevent {{elastic-defend}} from working as intended. This feature provides actionable insights into the following common problem areas:
16+
17+
* {applies_to}`stack: ga 9.2` {applies_to}`serverless: ga` **Policy responses**: Detect warnings or failures in {{elastic-defend}}’s integration policies.
18+
* **Third-party antivirus (AV) software**: Identify installed third-party antivirus (AV) products that may conflict with {{elastic-defend}}.
19+
20+
With these checks, you can resolve configuration errors, address incompatibilities, and ensure that your hosts remain protected.
21+
22+
::::{admonition} Requirements
23+
To use this feature, you need:
24+
25+
* In serverless, a project with the Security Analytics Complete [feature tier](https://www.elastic.co/pricing/serverless-security).
26+
* The **Automatic Troubleshooting: Read** or **Automatic Troubleshooting: All** security [sub-feature privilege](/solutions/security/configure-elastic-defend/elastic-defend-feature-privileges.md).
27+
:::{note}
28+
In {{stack}} 9.0.0, this privilege is called **Endpoint Insights**.
29+
:::
30+
* A working [LLM connector](../ai/set-up-connectors-for-large-language-models-llm.md) for AI Assistant.
31+
::::
32+
33+
## Troubleshoot policy issues
34+
```yaml {applies_to}
35+
stack: ga 9.2
36+
serverless: ga
37+
```
38+
39+
{{elastic-defend}}'s integration policy statuses indicate whether protections are applied successfully to your hosts. Warnings or failures in these policies can weaken your security posture. Automatic troubleshooting helps you detect any issues and suggests remediation steps.
40+
41+
::::{admonition} Requirements
42+
To use this functionality, you need to enable [AI Assistant Knowledge Base](/solutions/security/ai/ai-assistant-knowledge-base.md).
43+
::::
44+
45+
### Scan your hosts for policy issues
46+
47+
1. Find **Endpoints** in the navigation menu or use the global search field.
48+
2. Click on an endpoint to open its details flyout.
49+
3. Under **Automatic Troubleshooting**, select an LLM connector, or [add](../ai/set-up-connectors-for-large-language-models-llm.md) a new one.
50+
4. If you don't already have AI Assistant Knowledge Base enabled, click **Setup Knowledge Base**.
51+
5. Once Knowledge Base is enabled, click **Scan**. After a brief processing period, any detected warnings or failures in policy responses will appear under **Insights**.
52+
53+
### Resolve policy issues
54+
55+
After a scan has completed, automatic troubleshooting suggests recommended next steps for each policy issue. These may include adjusting specific {{elastic-defend}} policy settings or reviewing conflicting host configurations. Where available, click **Learn more** to the right of a result to open Elastic documentation, which provides more context and guidance for resolving the issue.
56+
57+
## Identify antivirus software on your hosts [identify-third-party-av-products]
58+
59+
Third-party antivirus software installed on your hosts can interfere with {{elastic-defend}}. To mitigate issues with running third-party AV alongside {{elastic-defend}}, you first have to identify which AV is present.
60+
61+
After you’ve installed {{elastic-defend}} on one or more hosts, you can use automatic troubleshooting to check whether your endpoints have third-party AV software installed. Using the same kinds of large language model (LLM) connectors as Elastic AI Assistant, automatic troubleshooting can analyze file event logs from your hosts to determine whether antivirus software is present. From there, you can address any incompatibilities to make sure your endpoints are protected.
62+
63+
### Scan your hosts for AV software [_scan_your_hosts_for_av_software]
64+
65+
1. Find **Endpoints** in the navigation menu or use the global search field.
66+
2. Click on an endpoint to open its details flyout.
67+
3. Under **Automatic Troubleshooting**, select an LLM connector, or [add](../ai/set-up-connectors-for-large-language-models-llm.md) a new one.
68+
4. Click **Scan**. After a brief processing period, any detected AV products will appear under **Insights**.
69+
70+
### Resolve incompatibilities [_resolve_incompatibilities]
71+
72+
After a scan has completed, you can click the **Create trusted app** button to the right of a result to quickly add the associated AV program to {{elastic-defend}}'s trusted applications list. If the button is not clickable, you don’t have the [required privilege](trusted-applications.md).
73+
74+
::::{important}
75+
If you plan to use {{elastic-defend}} alongside third-party AV software, we recommend you that you both [allowlist {{elastic-endpoint}} in your AV](allowlist-elastic-endpoint-in-third-party-antivirus-apps.md) and [make the AV a trusted application](trusted-applications.md).
76+
::::

solutions/security/manage-elastic-defend/identify-antivirus-software-on-hosts.md

Lines changed: 0 additions & 51 deletions
This file was deleted.

solutions/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -627,7 +627,7 @@ toc:
627627
- file: security/manage-elastic-defend/optimize-elastic-defend.md
628628
- file: security/manage-elastic-defend/event-capture-elastic-defend.md
629629
- file: security/manage-elastic-defend/endpoint-protection-rules.md
630-
- file: security/manage-elastic-defend/identify-antivirus-software-on-hosts.md
630+
- file: security/manage-elastic-defend/automatic-troubleshooting.md
631631
- file: security/manage-elastic-defend/allowlist-elastic-endpoint-in-third-party-antivirus-apps.md
632632
- file: security/manage-elastic-defend/elastic-endpoint-self-protection-features.md
633633
- file: security/endpoint-response-actions.md

0 commit comments

Comments
 (0)