Loading

Configure third-party response actions

You can direct third-party endpoint protection systems to perform response actions on enrolled hosts, such as isolating a suspicious endpoint from your network, without leaving the Elastic Security UI. This page explains the configuration steps needed to enable response actions for these third-party systems:

  • CrowdStrike
  • Microsoft Defender for Endpoint
  • SentinelOne

Check out Third-party response actions to learn which response actions are supported for each system.

Prerequisites

Expand a section below for your endpoint security system: