Loading

Configure third-party response actions

You can direct third-party endpoint protection systems to perform response actions on enrolled hosts, such as isolating a suspicious endpoint from your network, without leaving the Elastic Security UI. This page explains the configuration steps needed to enable response actions for these third-party systems:

  • CrowdStrike
  • Microsoft Defender for Endpoint
  • SentinelOne

Check out Third-party response actions to learn which response actions are supported for each system.

Prerequisites
  • This feature requires the appropriate subscription in Elastic Stack or project feature in Serverless.
  • Kibana feature privilege: Under Actions and Connectors, turn on Customize sub-feature privileges and enable Endpoint Security.
  • Elastic Security feature privileges: All for the response action features, such as Host Isolation, that you want to perform.
  • (In Serverless) User roles: SOC manager or Endpoint operations analyst
  • Endpoints must have actively running third-party agents installed.

Expand a section below for your endpoint security system: