﻿---
title: Trusted applications
description: You can add Windows, macOS, and Linux applications that should be trusted, such as other antivirus or endpoint security applications. Trusted applications...
url: https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/security/manage-elastic-defend/trusted-applications
products:
  - Elastic Cloud Serverless
  - Elastic Security
applies_to:
  - Serverless Security projects: Generally available
  - Elastic Stack: Generally available
---

# Trusted applications
<note>
  If you use Elastic Defend along with other antivirus (AV) software, you might need to configure the other system to trust Elastic Endpoint. Refer to [Allowlist Elastic Endpoint in third-party antivirus apps](https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/security/manage-elastic-defend/allowlist-elastic-endpoint-in-third-party-antivirus-apps) for more information.
</note>

You can add Windows, macOS, and Linux applications that should be trusted, such as other antivirus or endpoint security applications. Trusted applications are designed to help mitigate performance issues and incompatibilities with other endpoint software installed on your hosts. Trusted applications apply only to hosts running the Elastic Defend integration.
<tip>
  To ensure you're using the right feature for your use case, we recommend reviewing [Optimize Elastic Defend](https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/security/manage-elastic-defend/optimize-elastic-defend) to understand the differences between trusted applications and alert exceptions.
</tip>

<admonition title="Requirements">
  You must have the **Trusted Applications** [privilege](https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/security/configure-elastic-defend/elastic-defend-feature-privileges) or the appropriate user role to access this feature.
</admonition>

Trusted applications are blindspots for Elastic Defend, because they are not monitored for threats. One avenue attackers use to exploit these blindspots is by DLL (Dynamic Link Library) side-loading, where they leverage processes signed by trusted vendors — such as antivirus software — to execute malicious DLLs. Such activity appears to originate from the trusted application’s process.
<applies-switch>
  <applies-item title="{ stack: ga 9.0-9.1}" applies-to="Elastic Stack: Generally available from 9.0 to 9.1">
    Trusted applications can still generate alerts if the application’s process events indicate malicious behavior. To reduce false positive alerts, add an [Endpoint alert exception](/elastic/docs-builder/docs/3028/solutions/security/detect-and-alert/add-manage-exceptions#endpoint-rule-exceptions), which prevents Elastic Defend from generating alerts. To compare trusted applications with other endpoint artifacts, refer to [Optimize Elastic Defend](https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/security/manage-elastic-defend/optimize-elastic-defend).
  </applies-item>

  <applies-item title="{ stack: ga 9.2.5+, serverless: ga }" applies-to="Elastic Cloud Serverless: Generally available, Elastic Stack: Generally available since 9.2">
    Trusted applications are not monitored for malicious behavior, which improves performance.
  </applies-item>
</applies-switch>

Additionally, trusted applications still generate process events for visualizations and other internal use by the Elastic Stack. To prevent process events from being written to Elasticsearch, use an [event filter](https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/security/manage-elastic-defend/event-filters) to filter out the specific events that you don’t want stored in Elasticsearch, but be aware that features that depend on these process events may not function correctly.
By default, a trusted application is recognized globally across all hosts running Elastic Defend. You can also assign a trusted application to a specific Elastic Defend integration policy, enabling the application to be trusted by only the hosts assigned to that policy.
To add a trusted application:
1. Find **Trusted applications** in the navigation menu or use the [global search field](https://www.elastic.co/elastic/docs-builder/docs/3028/explore-analyze/find-and-organize/find-apps-and-objects).
2. Click **Add trusted application**.
3. Fill in these fields in the **Details** section:
   1. `Name`: Enter a name for the trusted application.
2. `Description` (Optional): Enter a description for the trusted application.
4. Select an option in the **Conditions** section:
   <tab-set>
   <tab-item title="Basic">
   Define conditions based on the application's hash, executable path, or signer.
   1. `Select operating system`: Select the appropriate operating system from the drop-down.
   2. `Field`: Select a field to identify the trusted application:
   - `Hash`: The MD5, SHA-1, or SHA-256 hash value of the application’s executable.
   - `Path`: The full file path of the application’s executable.
   - `Signature`: (Windows and macOS only) The name of the application’s digital signer.
   <tip>
   To find the signer’s name for an application, go to **Discover** and query the process name of the application’s executable (for example, `process.name : "mctray.exe"` for a McAfee security binary). Then, search the results for the `process.code_signature.subject_name` field, which contains the signer’s name (for example, `McAfee, Inc.`).
   </tip>
   <note>
   If you use only a hash to identify a trusted application, the entry may stop working when the application is updated, since updates often change the hash. For a more reliable match, combine `Path` and `Signature` conditions instead.
   </note>
   3. `Operator`: Select an operator to define the condition:
   - `is`: Must be *exactly* equal to `Value`; wildcards are not supported. This operator is required for the `Hash` and `Signature` field types.
   - `matches`: Can include wildcards in `Value`, such as `C:\path\*\app.exe`. This option is only available for the `Path` field type. Available wildcards are `?` (match one character) and `*` (match zero or more characters).
   <note>
   Unlike detection rule exceptions, trusted applications do not require escaping special characters.
   </note>
   4. `Value`: Enter the hash value, file path, or signer name. To add an additional value, click **AND**.
   <note>
   You can only add a single field type value per trusted application. For example, if you try to add two `Path` values, you’ll get an error message. Also, an application’s hash value must be valid to add it as a trusted application. In addition, to minimize visibility gaps in the Elastic Security app, be as specific as possible in your entries. For example, combine `Signature` information with a known `Path`.
   </note>
   </tab-item>

   <tab-item title="Advanced">
   <applies-to>Elastic Stack: Generally available since 9.2</applies-to>Define more complex conditions, such as trusting specific file paths or remote IP addresses.
   1. `Select operating system`: Select the appropriate operating system from the drop-down.
   2. <applies-to>Elastic Stack: Generally available since 9.3</applies-to><applies-to>Elastic Cloud Serverless: Generally available</applies-to>(Optional) Turn on the **Process Descendants** toggle to make your exception apply to processes that are descendants of your new trusted application.
   3. `Field`: Select a field to identify the trusted application.
   4. `Operator`: Select an operator to define the condition:
   - `is`
   - `is not`
   - `is one of`
   - `is not one of`
   - `matches` | `does not match`:  Allows you to use wildcards in `Value`, such as `C:\path\*\app.exe`.  Available wildcards are `?` (match one character) and `*` (match zero or more characters).
   <note>
   Unlike detection rule exceptions, trusted applications do not require escaping special characters.
   </note>
   <important>
   Using wildcards can impact performance. To create a more efficient trusted application using wildcards, use multiple conditions and make them as specific as possible. For example, adding conditions using `process.name` or `file.name` can help limit the scope of wildcard matching.
   </important>
   5. `Value`: Enter the value associated with the `Field`. To enter multiple values (when using `is one of` or `is not one of`), enter each value, then press **Return**.
   6. To define multiple conditions, click `AND` and configure a new condition. You can also add nested conditions by selecting `Add nested condition`.
   </tab-item>
   </tab-set>
5. Select an option in the **Assignment** section to assign the trusted application to a specific integration policy:
   - `Global`: Assign the trusted application to all integration policies for Elastic Defend.
- `Per Policy`: Assign the trusted application to one or more specific Elastic Defend integration policies. Select each policy in which you want the application to be trusted.
  <note>
  You can also select the `Per Policy` option without immediately assigning a policy to the trusted application. For example, you could do this to create and review your trusted application configurations before putting them into action with a policy.
  </note>
6. Click **Add trusted application**. The application is added to the **Trusted applications** list.


## View and manage trusted applications

The **Trusted applications** page displays all the trusted applications that have been added to the Elastic Security app. To refine the list, use the search bar to search by name, description, or field value.
![trusted apps list](https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/images/security-trusted-apps-list.png)


### Edit a trusted application

You can individually modify each trusted application. You can also change the policies that a trusted application is assigned to.
To edit a trusted application:
1. Click the actions menu (**…**) on the trusted application you want to edit, then select **Edit trusted application**.
2. Modify details as needed.
3. Click **Save**.


### Delete a trusted application

You can delete a trusted application, which removes it entirely from all Elastic Defend integration policies.
To delete a trusted application:
1. Click the actions menu (**…**) on the trusted application you want to delete, then select **Delete trusted application**.
2. On the dialog that opens, verify that you are removing the correct application, then click **Delete**. A confirmation message appears.