Loading

Elastic Defend advanced settings

Elastic Stack Serverless Security

When configuring an Elastic Defend integration policy, access the Advanced settings section to fine-tune how the integration behaves in your environment. Use these settings to customize detection, performance, and security options based on your specific requirements.

Important

Advanced settings are not recommended for most users. Use them only if you have specific configuration or security requirements. If configured incorrectly, these settings can cause unpredictable behavior.

[linux,mac,windows].advanced.agent.connection_delay

Added in 7.9.0.

How long to wait for agent connectivity before sending first policy reply, in seconds. Default: 60.

Elastic Endpoint applies a cached configuration from disk immediately on start up. However, before generating a policy response document, Elastic Endpoint waits to first establish a connection to Elastic Agent to see if there are configuration updates. Use this setting to specify how long that delay should be. Regardless of this setting, Elastic Endpoint will periodically attempt to (re)connect to Elastic Agent if it isn't connected.

[mac,windows].advanced.alerts.cloud_lookup

Added in 7.12.0.

A value of false disables cloud lookup for alerts. Default: true.

Before blocking or alerting on malware files, Elastic Endpoint reaches out to an Elastic cloud service (https://cloud.security.elastic.co) to see if the alert is a known false positive. Use this setting to disable this feature.

Note

Disabling cloud lookup for alerts may result in higher false positive rates.

[linux,mac,windows].advanced.alerts.hash.md5

Added in 8.16.0.

Controls whether or not to compute and include MD5 hashes in alerts. This will increase CPU usage and alert sizes. If any user exceptionlists, trustlists, or blocklists reference this hash type, Endpoint will ignore this setting and automatically enable this hash type. Default: false.

Elastic Endpoint doesn't generate MD5 hashes in alerts unless alert exceptions, trusted apps, or blocklisting requires them, in which case this setting is ignored. This setting was added in 8.16 to allow users to opt out of MD5 hashing; starting with 8.18, users are opted out by default.

[linux,mac,windows].advanced.alerts.hash.sha1

Added in 8.16.0.

Controls whether or not to compute and include SHA-1 hashes in alerts. This will increase CPU usage and alert sizes. If any user exceptionlists, trustlists, or blocklists reference this hash type, Endpoint will ignore this setting and automatically enable this hash type. Default: false.

Elastic Endpoint doesn't generate SHA-1 hashes in alerts unless alert exceptions, trusted apps, or blocklisting requires them, in which case this setting is ignored. This setting was added in 8.16 to allow users to opt out of SHA-1 hashing; starting with 8.18, users are opted out by default.

windows.advanced.alerts.rollback.self_healing.enabled

Added in 8.4.0.

Self-healing erases attack artifacts when prevention alerts are triggered. Warning: data loss can occur. Default: false.

When a prevention alert is generated, Elastic Endpoint can roll back recent filesystem changes likely associated with the attack. Use this setting to enable the self-healing rollback feature.

Warning

This feature can cause permanent data loss.

windows.advanced.alerts.rollback.self_healing.registry_enabled

Added in 8.8.0.

Enables self-healing of registry based malware artifacts. Requires rollback.self_healing.enabled to also be enabled. Default: true.

As an extension to the base-level self-healing rollback feature, Elastic Endpoint can roll back recent registry changes when an attack occurs. Use this setting to enable this feature.

Warning

This feature can cause permanent data loss.

windows.advanced.alerts.rollback.self_healing.process_enabled

Added in 8.8.0.

Enables automatic removal of malware processes when a related prevention alert fires, including processes which were not directly involved in the alert. Requires rollback.self_healing.enabled to also be enabled. Default: true.

As an extension to the base-level self-healing rollback feature, Elastic Endpoint can terminate recently spawned processes when an attack occurs. Use this setting to enable this feature.

Warning

This feature can cause permanent data loss.

[linux,mac,windows].advanced.alerts.sample_collection

Added in 8.13.0.

A value of false disables malicious sample collection for alerts. Default: true.

To improve the efficacy of malware and reputation protections, Elastic collects samples of unknown malware files. Use this setting to disable the sample collection.

[linux,mac,windows].advanced.allow_cloud_features

Added in 8.18.0.

Advanced option to selectively choose which external services are allowed, valid keywords are sample-collection, reputation-lookup, malware-lookup, artifacts-update, staged-artifacts-rollout. Everything is allowed by default, but if any comma-separated value(s) are provided, all other features are disabled. To disallow all, a special keyword none can be used. The option imposes severe limitations on Defend functionality, reducing protection efficacy and increasing false positive rates. It's meant only for telemetry extra-avoidant users.

Elastic Endpoint has various features that require use of cloud services. Each of those features has an individual advanced setting that allows users to disable it. This setting provides an alternative way to disable features that need cloud services in a way that inherently disables all future cloud service features by default.

[linux,mac,windows].advanced.artifacts.global.base_url

Added in 7.9.0.

Base URL from which to download global artifact manifests. Default: https://artifacts.security.elastic.co.

Specifies the base URL from which to download global protection artifact updates. Modify this setting when configuring air-gapped environments to receive protection updates.

[linux,mac,windows].advanced.artifacts.global.ca_cert

Added in 7.9.0.

PEM-encoded certificate for security artifacts server certificate authority.

Specifies the certificate used to verify the SSL/TLS connection when global protection artifacts are updated.

[linux,mac,windows].advanced.artifacts.global.channel

Added in 8.18.0.

The release channel to use for receiving global artifacts. The default is staged rollout. Set to rapid to receive candidate artifacts as soon as available. Set to stable to only receive stable artifacts. Default: staged rollout.

Global protection artifact updates are publicly released in stages to ensure stability across the Elastic Defend user base. Use this setting to opt specific endpoints in (such as test or lab machines) or out (such as mission-critical systems) of the staged rollout process.

[linux,mac,windows].advanced.artifacts.global.interval

Added in 7.9.0.

Interval between global artifact manifest download attempts, in seconds. Default: 3600.

By default, Elastic Endpoint checks for global protection artifact updates every hour. Use this setting to modify this interval.

[linux,mac,windows].advanced.artifacts.global.manifest_relative_url

Added in 7.9.0.

Relative URL from which to download global artifact manifests. Default: /downloads/endpoint/manifest/artifacts-<version>.zip.

Specifies the relative path appended to the base URL ([linux,mac,windows].advanced.artifacts.global.base_url) to form the full URL for downloading global protection artifact updates. When configuring global protection artifact updates in air-gapped environments, this setting typically doesn't need to be modified. If you do override it, Elastic Endpoint will use the exact path you provide, without replacing <version> with the current version number.

[linux,mac,windows].advanced.artifacts.global.proxy_disable

Added in 8.8.0.

If the proxy setting should be used when downloading global artifact manifests. Default: false.

By default, Elastic Endpoint doesn't attempt to use a proxy when downloading global protection artifact updates. Modify this setting to change this.

[linux,mac,windows].advanced.artifacts.global.proxy_url

Added in 8.8.0.

Proxy server to use when downloading global artifact manifests. Default: none.

Use this setting to configure a proxy server when downloading global protection artifacts.

[linux,mac,windows].advanced.artifacts.global.public_key

Added in 7.9.0.

PEM-encoded public key used to verify the global artifact manifest signature.

Specifies the public key used to verify the signature of global protection artifacts (not the SSL connection to the server that hosts them). It is not needed for air-gapped environments that re-host artifacts.

[linux,mac,windows].advanced.artifacts.user.ca_cert

Added in 7.9.0.

PEM-encoded certificate for Fleet Server certificate authority.

Specifies the certificate used to verify the SSL/TLS connection to the Fleet server. We typically recommend configuring this at the Fleet level, so it applies consistently across Elastic Agent and all integrations, rather than setting it specifically for Elastic Endpoint.

[linux,mac,windows].advanced.artifacts.user.proxy_disable

Added in 8.8.0.

If the proxy setting should be used when downloading user artifact manifests. Default: false.

Use this setting to enable the use of a proxy when communicating with the Fleet server.

[linux,mac,windows].advanced.artifacts.user.proxy_url

Added in 8.8.0.

Proxy server to use when downloading user artifact manifests. Default: none.

Use this setting to configure a proxy server when communicating with the Fleet server. We typically recommend configuring proxy settings at the Elastic Agent level to ensure consistent and centralized proxy handling.

[linux,mac,windows].advanced.capture_command_line

Added in 8.14.0.

Include process command line in all events that are related to this process. Default: false.

By default, Elastic Endpoint excludes command-line arguments from most process fieldsets to help reduce data volume. Use this setting to include them—for example, to allow Elastic Endpoint alerts or rule exceptions to be based on command-line content.

[linux,mac].advanced.capture_env_vars

Added in 8.6.0 (Linux), 8.7.0 (macOS).

The list of environment variables to capture (up to five), separated by commas.

Use this setting to include a limited number of environment variables in process create events.

[linux,mac,windows].advanced.diagnostic.enabled

Added in 7.11.0 (Windows), 7.12.0 (macOS and Linux).

A value of false disables running diagnostic features on Endpoint. Default: true.

Use this setting to disable diagnostic mode, which tests new protections and rules to ensure low false positive rates upon production release. The results of this testing are only collected if telemetry is enabled.

Note

We recommend keeping diagnostic mode enabled to help improve product quality and ensure new protections perform effectively in your environment before they’re released.

windows.advanced.diagnostic.rollback_telemetry_enabled

Added in 8.1.0.

Enable diagnostic rollback telemetry. Default: true.

Use this setting to disable the diagnostic (testing) self-healing features without affecting other diagnostic functionalities.

[linux,mac,windows].advanced.document_enrichment.fields

Added in 8.11.0.

A comma-delimited set of key=value pairs of values to add into all Endpoint documents. Each key must begin with Custom. An example is Custom.key=value1,Custom.key2=value2.

Use this setting to add custom key/value pairs into all Elastic Endpoint documents. It works similarly to the Custom fields Elastic Agent policy configuration, which Elastic Endpoint doesn't support.

[linux,mac,windows].advanced.elasticsearch.delay

Added in 7.9.0.

Delay for sending events to Elasticsearch, in seconds. Default: 120.

To improve compression, Elastic Endpoint pushes unsent documents to Elasticsearch at periodic intervals, rather than immediately after each new event is generated. Use this setting to modify that interval. Regardless of this setting, Elastic Endpoint will always flush all event data immediately when an alert is generated.

[linux,mac,windows].advanced.elasticsearch.tls.ca_cert

Added in 7.9.0.

PEM-encoded certificate for Elasticsearch certificate authority.

Use this setting to configure an additional root certificate for validating Elastic Endpoint's connection to Elasticsearch. We typically recommend configuring this at the Fleet level.

[linux,mac,windows].advanced.elasticsearch.tls.verify_hostname

Added in 7.9.0.

Whether to verify the hostname of the peer is what's in the certificate. Default: true.

Use this setting to disable TLS hostname verification for Elastic Endpoint's connection to Elasticsearch. We typically recommend configuring this at the Fleet level.

[linux,mac,windows].advanced.elasticsearch.tls.verify_peer

Added in 7.9.0.

Whether to verify the certificates presented by the peer. Default: true.

Use this setting to disable TLS peer verification for Elastic Endpoint's connection to Elasticsearch. We typically recommend configuring this at the Fleet level.

[linux,mac,windows].advanced.event_filter.default

Added in 8.3.0.

Download default event filter rules from Elastic. Default: true.

By default, Elastic Endpoint doesn't generate and stream events to Elasticsearch for system activity known to be noisy and of limited security value, based on dynamic rules Elastic maintains. Use this setting to disable that suppression.

[linux,mac,windows].advanced.events.aggregate_network

Added in 8.18.0.

Reduce event volume by merging related network events into fewer aggregate events. Default is true.

Elastic Endpoint merges rapid network connect and disconnect events into a single event document. Use this setting to disable that behavior.

[linux,mac,windows].advanced.events.aggregate_process

Added in 8.16.0.

Reduce event volume by merging related process events into fewer aggregate events. Default is true.

Elastic Endpoint merges rapid process create/fork/exec/end events into a single event document. Use this setting to disable that behavior. This setting was made available in 8.16; starting with 8.18, this behavior is enabled by default.

[linux,mac,windows].advanced.events.ancestry_in_all_events

Added in 8.15.0.

Include ancestor process entity IDs in all event types, by default it is only included in alerts and process events. Default: false.

Prior to 8.15, Elastic Endpoint included process.ancestry in all event documents. This field helps render the event analyzer more quickly and is primarily needed for process events. In 8.15, this was changed to limit data volume.

windows.advanced.events.api

Added in 8.8.0.

Controls whether ETW API events are enabled. Set to false to disable ETW event collection. Default: true.

Use this setting to disable API event collection, even if other Elastic Endpoint features require them.

Warning

Disabling API event collection may break other Elastic Endpoint features.

windows.advanced.events.api_disabled

Added in 8.11.0.

A comma-separated list of API names to selectively disable.

Use this setting to disable the collection of specific API events for performance or troubleshooting purposes. API names can be found at process.Ext.api.name with the corresponding API events.

windows.advanced.events.api_verbose

Added in 8.11.0.

Controls whether high volume API events are sent to Elasticsearch. Event filtering is recommended if enabled. Default: false.

windows.advanced.events.callstacks.emit_in_events

Added in 8.8.0.

If set, callstacks will be included in regular events where they are collected. Otherwise, they are only included in events that trigger behavioral protection rules. Note that setting this may significantly increase data volumes. Default: false.

windows.advanced.events.callstacks.exclude_hotpatch_extension_pages

Added in 8.15.2.

Exclude Windows 11 24H2 hotpatch extension pages, which resemble injected code, from callstack module stomp scanning. Default: true.

windows.advanced.events.callstacks.file

Added in 8.8.0.

Collect callstacks during file events? Default: true.

windows.advanced.events.callstacks.image_load

Added in 8.8.0.

Collect callstacks during image/library load events? Default: true.

windows.advanced.events.callstacks.include_network_images

Added in 8.9.0.

Should executables and DLLs on network shares be parsed for callstack symbols? This may cause Endpoint to hang on some networks. Default: true.

windows.advanced.events.callstacks.process

Added in 8.8.0.

Collect callstacks during process events? Default: true.

windows.advanced.events.callstacks.registry

Added in 8.8.0.

Collect callstacks during registry events? Default: true.

windows.advanced.events.callstacks.timeout_microseconds

Added in 8.12.0.

Maximum runtime of inline callstack collection/enrichment. Default: 100000.

windows.advanced.events.callstacks.use_hardware

Added in 8.16.0.

Use hardware callstacks (e.g. Intel CET) if supported by the OS and CPU. Default: true.

windows.advanced.events.check_debug_registers

Added in 8.11.0.

Check debug registers inline to detect the use of hardware breakpoints. Malware may use hardware breakpoints to forge benign-looking call stacks. Default: true.

[linux,mac,windows].advanced.events.deduplicate_network_events

Added in 8.15.0.

A value of false disables network events deduplication. Default: true.

To limit data volume, Elastic Endpoint doesn't emit network events for repeated connections based on the Src-IP/Dst-IP/Dst-Port/PID tuple grouping. Use this setting to disable that suppression.

[linux,mac,windows].advanced.events.deduplicate_network_events_below_bytes

Added in 8.15.0.

Deduplication transfer threshold in bytes. Events exceeding the transfer will not be deduplicated. A value 0 means disabled. Default: 1048576 (1MB).

Specify a transfer size threshold for events you want to deduplicate. Connections below the threshold are deduplicated, and connections above it are not deduplicated. This allows network event deduplication to be applied only to low data volume connections.

linux.advanced.events.disable_fd_kprobes

Added in 8.8.0.

When only process events are being collected, this option will disable file descriptor tracking probes. This can be used to reduce Endpoint processing at the expense of missing fchdir-based working directory changes. This only applies if the capture_mode is kprobe or if auto resolves tracefs (kprobe) probes. eBPF-based event collection ignores this setting. Default is false.

Use this setting to reduce Elastic Endpoint's CPU usage when using kprobes instead of eBPF. Enabling it causes many file paths in events to appear as relative rather than absolute.

windows.advanced.events.disable_image_load_suppression_cache

Added in 8.12.1.

The image load suppression cache improves system performance by enabling Endpoint to inform its kernel driver about DLLs to avoid eventing upon as they are not of interest. This feature improves system responsiveness and reduces Endpoint CPU usage. Use this setting only for troubleshooting if image load events are not being generated as expected. Default: false.

windows.advanced.events.disable_registry_write_suppression

Added in 8.12.1.

Registry write suppression improves system performance by enabling Endpoint to inform its driver that certain types of registry operations are uninteresting. Once deemed uninteresting, the driver can quickly drop these events, improving system responsiveness and reducing Endpoint CPU usage. Use this setting only for troubleshooting if registry events are not functioning as expected. Default: false.

linux.advanced.events.enable_caps

Added in 8.14.0.

This setting ensures thread capability arrays are not pruned from Linux process events before being sent to Elasticsearch. At the expense of higher Endpoint data volumes, a true value will ensure capability matching detection rules running within the Elastic Stack can match. Detection rules running within Elastic Defend are unaffected because capabilities are conditionally pruned after rule processing. Default is false.

Use this setting to enable reporting of process capabilities on Linux. Elastic Endpoint began reporting these capabilities in 8.11.0, but this was disabled by default in 8.14.0 due to data volume concerns.

windows.advanced.events.event_on_access.file_paths

Added in 8.15.0.

Comma-separated list of additional wildcard patterns that will be monitored for read access. Endpoint will report at most one match per pattern per process. Endpoint will attempt to convert drive letters to NT paths (e.g. \Device\HarddiskVolume4), but conversion will fail for per-user drives such as network drives. Put only commas (no spaces) between entries. Wildcard matching is case-insensitive. Check Microsoft FsRtlIsNameInExpression documentation for wildcard matching rules.

windows.advanced.events.event_on_access.registry_paths

Added in 8.15.0.

Comma-separated list of registry paths that will be monitored for read access. These must be NT paths (for example, \REGISTRY\MACHINE\SOFTWARE\Microsoft\...). Endpoint will report at most one match per pattern per process. Only commas (no spaces) should be used between entries. Wildcard matching is case-insensitive. See Microsoft FsRtlIsNameInExpression documentation for wildcard matching rules.

[linux,mac,windows].advanced.events.file.max_hash_size_mb

Added in 8.16.0.

Attempt to include file.hash.sha256 in file events. Hashing is asynchronous, best-effort, and is not guaranteed to succeed, especially on network drives. WARNING: File hashing is a very CPU- and I/O-intensive process. WARNING: This feature will increase Endpoint's CPU and I/O, and may adversely affect system responsiveness, especially during I/O-intensive activity such as directory copies and compilation. WARNING: Event processing will be delayed due to the time spent hashing, causing Endpoint's Behavioral and Ransomware protections to fire later than normal, potentially allowing threats to inflict additional damage. Set to off to disable this feature. Set to 0 to hash all files up to 1 GiB. Otherwise, this sets the maximum to-be-hashed file size in MiB. Default: off.

[linux,mac,windows].advanced.events.hash.md5

Added in 8.16.0.

Compute and include MD5 hashes for processes and libraries in events. This will increase CPU usage and event sizes. Default: false.

Elastic Endpoint doesn't generate MD5 hashes in events unless event filters or trusted apps require them, in which case this setting is ignored. This setting was added in 8.16 to allow users to opt out of MD5 hashing; starting with 8.18, users are opted out by default.

[linux,mac,windows].advanced.events.hash.sha1

Added in 8.16.0.

Compute and include SHA-1 hashes for processes and libraries in events? This will increase CPU usage and event sizes. Default: false.

Elastic Endpoint doesn't generate SHA-1 hashes in events unless event filters or trusted apps require them, in which case this setting is ignored. This setting was added in 8.16 to allow users to opt out of SHA-1 hashing; starting with 8.18, users are opted out by default.

[linux,mac,windows].advanced.events.hash.sha256

Added in 8.16.0.

Compute and include SHA-256 hashes for processes and libraries in events? This will increase CPU usage and event sizes. Default: true.

Elastic Endpoint doesn't generate SHA-256 hashes in events unless event filters or trusted apps require them, in which case this setting is ignored. This setting was added in 8.16 to allow users to opt out of SHA-256 hashing; starting with 8.18, users are opted out by default.

mac.advanced.events.image_load

Added in 8.11.0.

A value of false overrides other config settings that would enable kernel image load events. Default: true.

Use this setting to disable image load events, even if other Elastic Endpoint features require them.

Warning

Disabling image load events may break other Elastic Endpoint features.

windows.advanced.events.memory_scan

Added in: 8.14.0.

On behavior alerts, this feature enables an additional scan of identified memory regions against well-known malware signatures. Default: true.

Additional memory scanning of behavior alerts provides more context for responders analyzing alerts. Use this setting to disable this feature.

windows.advanced.events.process.creation_flags

Added in 8.13.0.

Enables an additional enrichment for process events. Use this setting only for troubleshooting if process events are not functioning as expected. Default: true.

Use this setting to control whether Elastic Endpoint captures process creation flags, such as CREATE_SUSPENDED, in process events.

[linux,mac,windows].advanced.events.process_ancestry_length

Added in 8.15.0.

Maximum number of process ancestry entries to include in process events. Default: 5.

Use this setting to control how many ancestor processes Elastic Endpoint includes in the process.ancestry field. Prior to 8.15, this field contained the last 20 ancestor processes; starting with 8.15, it was reduced to the last 5, to limit data volume.

windows.advanced.events.registry.enforce_registry_filters

Added in 8.15.0.

Reduce data volume by filtering out registry events which are not relevant to behavioral protections. Default: true.

linux.advanced.fanotify.ignore_unknown_filesystems

Added in 8.4.0.

Whether fanotify should ignore unknown filesystems. When true, only CI tested filesystems will be marked by default; additional filesystems can be added or removed with monitored_filesystems and ignored_filesystems, respectively. When false, only an internally curated list of filesystems will be ignored, all others will be marked; additional filesystems can be ignored via ignored_filesystems. monitored_filesystems is ignored when ignore_unknown_filesystems is false. Default: true.

Use this setting to control how Elastic Endpoint handles unknown filesystems when using fanotify to monitor for malware. Filesystems that aren't monitored won't generate malware alerts.

linux.advanced.fanotify.ignored_filesystems

Added in 8.4.0.

Additional filesystems for fanotify to ignore. The format is a comma-separated list of filesystem names as they appear in /proc/filesystems, for example ext4,tmpfs. When ignore_unknown_filesystems is false, parsed entries of this option supplement internally known bad filesystems to be ignored. When ignore_unknown_filesystems is true, parsed entries of this option override entries in monitored_filesystems and internally CI tested filesystems.

Use this setting to specify filesystems that fanotify should ignore when monitoring for malware. Filesystems that aren't monitored won't generate malware alerts.

linux.advanced.fanotify.monitored_filesystems

Added in 8.4.0.

Additional filesystems for fanotify to monitor. The format is a comma-separated list of filesystem names as they appear in /proc/filesystems, for example jfs,ufs,ramfs. It is recommended to avoid network-backed filesystems. When ignore_unknown_filesystems is false, this option is ignored. When ignore_unknown_filesystems is true, parsed entries of this option are monitored by fanotify unless overridden by entries in ignored_filesystems or internally known bad filesystems.

Use this setting to specify filesystems for fanotify to monitor for malware. Filesystems that aren't monitored won't generate malware alerts.

linux.advanced.fanotify.seccomp_restricted

Added in 8.13.1.

Prevent the Defend permission checking thread from calling the open/openat syscalls when running on kernels which require FAN_OPEN_PERM (older than 5.0). Will avoid potential deadlocks with other antivirus products at the cost of racy hash-based trusted application entries. Ignored when running on newer kernels. Default: false.

[linux,mac,windows].advanced.file_cache.file_object_cache_size

Added in 8.12.0.

Maximum size of the file cache. Larger values can improve performance but increase memory usage. Default: 5000.

Elastic caches information about recently read files in memory. Use this setting to control the number of recent file entries to cache.

[linux,mac,windows].advanced.flags

Added in 8.13.0 (Windows), 8.16.0 (macOS and Linux).

A comma-separated list of feature flags. Currently no feature flags are supported.

mac.advanced.harden.self_protect

Added in 7.11.0.

Enables self-protection on macOS. Default: true.

Use this setting to enable self-protection on macOS. This hardens Elastic Endpoint and Elastic Agent processes, files, and services against basic tampering attempts.

linux.advanced.host_isolation.allowed

Added in 8.6.1.

A value of false disallows host isolation activity on Linux endpoints, regardless of whether host isolation is supported. Note that if a host is currently not isolated, it will refuse to isolate, and likewise, a host will refuse to release if it is currently isolated. A value of true will allow Linux endpoints to isolate if supported. Default:true.

Use this setting to control whether host isolation activity on Linux is allowed. If disabled, the host remains unisolated even when isolation is requested.

mac.advanced.image_load.capture

Added in 8.11.0.

Collect and send image load events to Elasticsearch. Take caution, this can lead to very high data volumes. Adding an event filter to drop unwanted events is strongly recommended. Default: false.

If malicious behavior protection is enabled, Elastic Endpoint by default monitors for image load events, but doesn't emit them to Elasticsearch due to high data volume. Use this setting to allow those events to be emitted to Elasticsearch, regardless of whether malicious behavior protection is enabled.

windows.advanced.kernel.asyncimageload

Added in 7.9.0.

A value of false overrides other config settings that would enable kernel asynchronous image load events. Default: true.

Use this setting to disable the monitoring of asynchronous image load events, even if other Elastic Endpoint features require them.

Important

Disabling the monitoring of asynchronous image load events may negatively impact the functionality of other Elastic Endpoint features.

linux.advanced.kernel.capture_mode

Added in 8.2.0.

Allows users to control whether kprobes or ebpf are used to gather data. Options are kprobe, ebpf, or auto. Auto uses ebpf if possible, otherwise uses kprobe. Default: auto.

On Linux, Elastic Endpoint can monitor system events using kprobes or eBPF. By default, Elastic Endpoint automatically chooses the best option, but you can use this setting to override that behavior.

[mac,windows].advanced.kernel.connect

Added in 7.9.0.

Whether to connect to the kernel driver. Default: true.

On macOS, Elastic Endpoint uses a system extension, and on Windows, a kernel driver. Use this setting to disable Elastic Endpoint's attempt to connect to those subsystems.

Warning

Disabling the connection will break many Elastic Endpoint features.

windows.advanced.kernel.dev_drives.harden

Added in 8.16.0.

Controls whether malware protection is applied to dev drives. Default: false.

mac.advanced.kernel.fileaccess

Added in 8.11.0.

A value of false overrides other config settings that would enable kernel file access events. Default: true.

Use this setting to disable file access events, even if other Elastic Endpoint features require them.

Warning

Disabling file access events may break other Elastic Endpoint features.

windows.advanced.kernel.fileopen

Added in 7.9.0.

A value of false overrides other config settings that would enable kernel file open events. Default: true.

Use this setting to disable kernel file open events, even if other Elastic Endpoint features require them.

Warning

Disabling file open events may break other Elastic Endpoint features.

[mac,windows].advanced.kernel.filewrite

Added in 7.9.0.

A value of false overrides other config settings that would enable kernel file write events. Default: true.

Use this setting to disable kernel file write events, even if other Elastic Endpoint features require them.

Warning

Disabling file write events may break other Elastic Endpoint features.

windows.advanced.kernel.filewrite_sync

Added in 8.14.0.

Send file kernel driver write notifications synchronously where possible. May improve the reliability of file write and malware-on-write enrichments at the cost of system responsiveness. Default: false.

windows.advanced.kernel.image_and_process_file_timestamp

Added in 8.4.0.

Collect executable/dll timestamps for process and asynchronous image load events. Default: true.

[mac,windows].advanced.kernel.network

Added in 7.9.0.

A value of false overrides other config settings that would enable kernel network events. Default: true.

Use this setting to disable kernel network events, even if other Elastic Endpoint features require them.

Warning

Disabling network events may break other Elastic Endpoint features.

mac.advanced.kernel.network_extension.enable_content_filtering

Added in 8.1.0.

Enable or disable the network content filter, this will enable/disable network eventing. Host isolation fails if this option is disabled. Default: true.

Use this setting to enable or disable the macOS network content filter.

Warning

Disabling the network content filter will break other Elastic Endpoint features.

mac.advanced.kernel.network_extension.enable_packet_filtering

Added in 8.1.0.

Enable or disable the network packet filter. Host isolation fails if this option is disabled. Default: true.

Use this setting to enable or disable the macOS network packet filter.

Warning

Disabling the network packet filter will break other Elastic Endpoint features.

windows.advanced.kernel.network_report_loopback

Added in 8.15.0.

Controls whether the kernel reports loopback network events. Default: true.

Use this setting to control whether Elastic Endpoint reports localhost and loopback network events through its kernel component.

Warning

Disabling localhost and loopback network events will reduce some system visibility, such as inter-process communication.

windows.advanced.kernel.ppl.harden_am_images

Added in 8.9.0.

Apply the windows.advanced.kernel.ppl.harden_images mitigation to Anti-Malware PPL as well. Disable this if third-party Anti-Malware is blocked from loading DLLs over the network. If this happens, there will be Event ID 8 events in the Microsoft-Windows-Security-Mitigations/Kernel Mode event log. Default: true.

windows.advanced.kernel.ppl.harden_images

Added in 8.9.0.

Mitigate attacks like PPLFault by preventing Protected Process Light (PPL) processes from loading DLLs over the network. Default: true.

[mac,windows].advanced.kernel.process

Added in 7.9.0.

A value of false overrides other config settings that would enable kernel process events. Default: true.

Use this setting to disable kernel process events, even if other Elastic Endpoint features require them.

Warning

Disabling process events may break other Elastic Endpoint features.

windows.advanced.kernel.process_handle

Added in 8.1.0.

Capture process and thread handle events. Default: true.

Use this setting to disable process and thread handle events, even if other Elastic Endpoint features require them.

Warning

Disabling process and thread handle events may break other Elastic Endpoint features.

windows.advanced.kernel.registry

Added in 7.9.0.

A value of false overrides other config settings that would enable kernel registry events. Default: true.

Use this setting to disable registry modification events, even if other Elastic Endpoint features require them.

Warning

Disabling registry modification events may break other Elastic Endpoint features.

windows.advanced.kernel.registryaccess

Added in 7.15.0.

Report limited registry access (queryvalue, savekey) events. Users can add additional monitored paths via windows.advanced.events.event_on_access.registry_paths. Default value is true.

windows.advanced.kernel.syncimageload

Added in 7.9.0.

A value of false overrides other config settings that would enable kernel sync image load events. Default: true.

Use this setting to disable synchronous image load events, even if other Elastic Endpoint features require them.

Warning

Disabling synchronous image load events may break other Elastic Endpoint features.

windows.advanced.logging.debugview

Added in 7.11.0.

A supplied value will configure logging to the DebugView Sysinternals tool. Allowed values are error, warning, info, debug, and trace.

Use this setting to send Elastic Endpoint logs to DebugView alongside other logging targets, such as the default file-based logging.

[linux,mac,windows].advanced.logging.file

Added in 7.11.0.

A supplied value will override the log level configured for logs that are saved to disk and streamed to Elasticsearch. Elastic recommends using Fleet to change this logging setting in most circumstances. Allowed values are error, warning, info, debug, and trace.

Use this setting to override the Fleet-controlled file-based log level log level.

[linux,mac].advanced.logging.syslog

Added in 7.11.0.

A supplied value will configure logging to syslog. Allowed values are error, warning, info, debug, and trace.

Use this setting to send Elastic Endpoint logs to syslog alongside other logging targets, such as the default file-based logging.

[linux,mac,windows].advanced.malware.max_file_size_bytes

Added in 8.16.4.

The maximum file size in bytes that should be used for evaluating malware. Default: 78643200.

At the cost of performance overhead, increase the maximum file size Elastic Endpoint will scan for malware.

windows.advanced.malware.networkshare

Added in 8.9.0.

Controls whether malware protection is applied to network drives. Default: true.

[linux,mac,windows].advanced.malware.quarantine

Added in 7.9.0 (macOS and Windows), 7.14.0. (Linux).

Whether quarantine should be enabled when malware prevention is enabled. Default: true.

Disabling quarantine will prevent malicious files from running but allow further user access to the files.

[mac,windows].advanced.malware.threshold

Added in 7.11.0.

The threshold that should be used for evaluating malware. Allowed values are normal, conservative, and aggressive. Default: normal.

Malware protection includes a machine learning model. Use this setting to modify the aggressiveness of that model.

Changing the threshold will affect detection efficacy and result in true and false positive and negative rates outside of the model's optimized range.

linux.advanced.memory_protection.enable_fork_scan

Added in 8.14.0.

Enable memory scanning on process fork events. This will have the effect of more memory regions being scanned. Default: true.

linux.advanced.memory_protection.enable_shared_dirty_scan

Added in 8.14.0.

Instead of ignoring regions with just no Private_Dirty bytes, ignore regions with the combination of no Private_Dirty bytes, no Shared_Dirty bytes and is file-backed. This has the effect of scanning more memory regions because of the loosened restrictions. Default: true.

[linux,mac,windows].advanced.memory_protection.memory_scan

Added in 7.15.0 (Windows), 7.16.0 (macOS and Linux).

Enable scanning for malicious memory regions as a part of memory protection. Default: true.

Use this setting to disable memory scanning using YARA rules, even if Memory Threat protection is enabled. On Windows, Memory Threat protection will remain effective even without this scan. On macOS and Linux, disabling this scan will effectively disable Memory Threat protection.

[linux,mac,windows].advanced.memory_protection.memory_scan_collect_sample

Added in 7.15.0 (Windows), 7.16.0 (macOS and Linux).

Collect 4MB of memory surrounding detected malicious memory regions. Default: false. Enabling this value may significantly increase the amount of data stored in Elasticsearch.

Use this setting to collect memory surrounding detected malicious regions when Memory Threat alerts are triggered by YARA rule scanning.

windows.advanced.memory_protection.shellcode

Added in 7.15.0.

Enable shellcode injection detection as a part of memory protection. Default: true.

Use this setting to disable scanning memory for shellcode, even if Memory Threat protection is enabled. Memory Threat protection remains effective even without this scan.

windows.advanced.memory_protection.shellcode_collect_sample

Added in 7.15.0.

Collect 4MB of memory surrounding detected shellcode regions. Default: false. Enabling this value may significantly increase the amount of data stored in Elasticsearch.

Use this setting to collect memory surrounding detected shellcode regions when Memory Threat alerts are triggered by shellcode scanning.

windows.advanced.memory_protection.shellcode_enhanced_pe_parsing

Added in 7.15.0.

Attempt to identify and extract PE metadata from injected shellcode, including Authenticode signatures and version resource information. Default: true.

windows.advanced.memory_protection.shellcode_trampoline_detection

Added in 8.1.0.

Enable trampoline-based shellcode injection detection as a part of memory protection. Default: true.

Use this setting to disable scanning memory for trampolines, even if Memory Threat protection is enabled. Memory Threat protection will remain effective even without this scan.

[linux,mac,windows].advanced.network_events_exclude_local

Added in 8.10.1.

Exclude local connections from network events. Default: false.

windows.advanced.ransomware.canary

Added in 7.14.0.

A value of false disables Ransomware canary protection. Default: true.

Use this setting to disable ransomware detection based on canary files, even if ransomware protection is enabled. Ransomware protection will remain effective even when this ransomware detection is disabled.

windows.advanced.ransomware.mbr

Added in 7.12.0.

A value of false disables Ransomware MBR protection. Default: true.

Use this setting to disable ransomware detection using Master Boot Record monitoring, even if ransomware protection is enabled. Ransomware protection will remain effective even when this ransomware detection is disabled.

[linux,mac,windows].advanced.set_extended_host_information

Added in 8.16.0.

Include more details about hosts in events? Set to false to receive only id, name, and os. Setting to true will increase event size. Default: false.

Elastic Endpoint only includes minimal information in the host fieldset in each event. Use this setting to also include extended information from the alerts and metrics-* documents. This setting was made available in 8.16; starting with 8.18, this behavior is disabled by default.

linux.advanced.tty_io.max_event_interval_seconds

Added in 8.5.0.

The maximum amount of time (seconds) to batch terminal output in a single event. Default: 30.

linux.advanced.tty_io.max_kilobytes_per_event

Added in 8.5.0.

The maximum kilobytes of terminal output to record in a single event. Default: 512.

linux.advanced.tty_io.max_kilobytes_per_process

Added in 8.5.0.

The maximum kilobytes of terminal output to record for a single process. Default: 512.

linux.advanced.utilization_limits.cpu

Added in 8.3.0.

The percentage of the aggregate system CPU to which Endpoint is restricted. The range is 20-100%. Values under 20 are ignored and trigger a policy warning. Default: 50.

Important

Setting the limit too low will impact system performance, since Elastic Endpoint pauses application loads during malware scans.

windows.advanced.utilization_limits.resident_memory_target_mb

Added in 8.12.0.

How much memory (in MB) should Endpoint aim to keep resident in RAM? This setting affects Private Working Set on Windows. It does not affect the amount of virtual memory that Endpoint requests from the OS (Private Bytes aka Commit Charge). If plenty of unused RAM is available, Windows may give Endpoint more RAM than requested to reduce unnecessary paging and improve performance. If the current Defend configuration requires regularly touching more than the requested amount of memory, then the Private Working Set will be higher than requested here. This value cannot be decreased below 50. Default: 200.

windows.advanced.events.image_load.origin_info_collection

Added in 8.19.0.

If set to true, image load events include dll.origin_url, dll.origin_referrer_url, and dll.Ext.windows.zone_identifier. These fields normally show where the loaded DLL was downloaded from, using information taken from the file's Mark of the Web. Default: false.

windows.advanced.events.process.origin_info_collection

Added in 8.19.0.

If set to true, process events include process.origin_url, process.origin_referrer_url, and process.Ext.windows.zone_identifier. These fields normally show where the process's executable file was downloaded from, using information taken from the file's Mark of the Web. Default: false.

windows.advanced.events.file.origin_info_collection

Added in 8.19.0.

If set to true, file events include file origin details: file.origin_url, file.origin_referrer_url, and file.Ext.windows.zone_identifier. These fields show the details of file's Mark of the Web. Default: true

windows.advanced.events.security.provider_etw

Added in 8.19.0.

Controls whether Microsoft-Windows-Security-Auditing ETW provider is enabled for security events collection. Set to false to disable the provider. Default: true.