Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Document what exceptions users should add to other AV products for Endpoint #3535

Closed
ferullo opened this issue Jul 6, 2023 · 3 comments · Fixed by #4439
Closed

Document what exceptions users should add to other AV products for Endpoint #3535

ferullo opened this issue Jul 6, 2023 · 3 comments · Fixed by #4439

Comments

@ferullo
Copy link
Collaborator

ferullo commented Jul 6, 2023

Description

Most AV products contain a feature like Endpoint's Trusted Applications. We document for users how to add entries to Endpoint for other AV products Endpoint shouldn't monitor. We should also document what values for Endpoint they should add to other AV product's "trusted apps". I don't mean how to add them, I just mean what Endpoint's paths and signatures are.

Notes

We recommend users using both the file path and digital signature in the third party AV product to identify Endpoint if possible. Spaces/formatting is important for the signature values.

Windows

  • File Paths
    • c:\Program Files\Elastic\Endpoint\elastic-endpoint.exe (executable)
      • This executable runs as elastic-endpoint.exe
    • c:\Windows\system32\drivers\elastic-endpoint-driver.sys (ELAM driver)
    • c:\Windows\system32\drivers\ElasticElam.sys (driver)
  • Digital signature
    • Elasticsearch, Inc.
    • Elasticsearch B.V. (a secondary signature that may not continue to be used)

More detailed notes for Windows are in the elastic/endpoint repo

macOS

  • File paths
    • /Library/Elastic/Endpoint/elastic-endpoint (executable)
      • This executable runs as elastic-endpoint
    • /Applications/ElasticEndpoint.app/ (system extension, recursive directory structure)
      • When running, the system extension name is co.elastic.systemextension
  • Digital signature
    • Elasticsearch, Inc (2BT3HPN62Z) (Authority/Developer ID Application)
    • 2BT3HPN62Z (Team ID)

Linux

  • File path
    • /opt/Elastic/Endpoint/elastic-endpoint (executable)
      • This runs as elastic-endpoint
@ferullo
Copy link
Collaborator Author

ferullo commented Jul 6, 2023

cc @roxana-gheorghe @caitlinbetz @nfritts for visibility

@MXMLN-sec
Copy link

Thank you for creating the Doc Issue.
Maybe you could also add process names since other AV Vendors allow also for the process names to be whitelisted which could improve the overall whitelisting.

@ferullo
Copy link
Collaborator Author

ferullo commented Jul 7, 2023

I updated the comment with them. But I don't think we should give advice to create trusted application entries in other products based solely on process name rather than full path and ideally digital signature on Windows and macOS as well.

@benironside benironside self-assigned this Nov 27, 2023
This was referenced Aug 2, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants