diff --git a/solutions/security/manage-elastic-defend/device-control.md b/solutions/security/manage-elastic-defend/device-control.md new file mode 100644 index 0000000000..64093547e0 --- /dev/null +++ b/solutions/security/manage-elastic-defend/device-control.md @@ -0,0 +1,45 @@ +--- +applies_to: + stack: ga 9.2 + serverless: + security: all +products: + - id: security + - id: cloud-serverless +--- + +# Device control + +Device control helps protect your organization from data loss, malware, and unauthorized access by managing which devices can connect to your computers. Specifically, it restricts which external USB storage devices can connect to endpoints that have {{elastic-defend}} installed. You can also create Trusted Devices to define exceptions to your policy for specific devices. + + +## Configure Device Control for your hosts using {{elastic-defend}} + +To configure Device Control for one or more hosts, edit the {{elastic-defend}} policy that affects those hosts. Your policy specifies which operations (read, write, or execute) these devices are allowed to take on a host. + +By default, new {{elastic-defend}} policies have Device Control enabled, with all operations set to **Block**. {{elastic-defend}} policies that existed before Device Control was supported have Device Control disabled by default. + + +## Add Trusted Devices to specify which devices are exempt from Device Control + +Trusted Devices are specific external devices that are allowed to connect to your protected hosts regardless of Device Control settings. Use Trusted Devices to avoid interfering with expected workflows that involve known hardware. Trusted Devices can apply to a specific policy, or globally to all policies. + +### Create a new Trusted Device + +1. Go to the **Trusted Devices** page using the navigation menu or the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md). +2. Click **+ Add trusted device**. The Add trusted device flyout opens. +3. Name your trusted device and give it a description. +4. In the **Conditions** section, specify the operating system and the `Device ID`. +5. Select either **Global** or **Per policy**. +6. Click **Add trusted device**. + +### Add a Trusted Device to a policy + +1. Navigate to the {{elastic-defend}} policy to which you want to add a Trusted Device. +2. Go to the **Trusted Devices** tab, and click **Assign trusted devices to policy**. +3. Next, select one or more existing trusted devices, then click **+ Assign trusted devices to policy**. + + +## View the Device Control dashboard + +By default, your {{kib}} instance includes a Device Control dashboard. When at least one of your {{elastic-defend}} policies has Device Control enabled, the dashboard displays data about attempted device connections and their outcomes. \ No newline at end of file diff --git a/solutions/toc.yml b/solutions/toc.yml index 7c3c9ad6af..5a05f305ac 100644 --- a/solutions/toc.yml +++ b/solutions/toc.yml @@ -620,6 +620,7 @@ toc: - file: security/manage-elastic-defend/endpoints.md - file: security/manage-elastic-defend/policies.md - file: security/manage-elastic-defend/trusted-applications.md + - file: security/manage-elastic-defend/device-control.md - file: security/manage-elastic-defend/event-filters.md - file: security/manage-elastic-defend/host-isolation-exceptions.md - file: security/manage-elastic-defend/blocklist.md