From cd5f0e630238486efb9e49f6d211fa2a38fef27c Mon Sep 17 00:00:00 2001 From: Gabriel Landau <42078554+gabriellandau@users.noreply.github.com> Date: Thu, 12 Sep 2024 14:49:47 -0400 Subject: [PATCH] [8.15] [Defend] Identify and exclude 24H2+ hotpatch extension pages from stomp detection (#192490) (#192638) # Backport This will backport the following commits from `main` to `8.15`: - [[Defend] Identify and exclude 24H2+ hotpatch extension pages from stomp detection (#192490)](https://github.com/elastic/kibana/pull/192490) ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sqren/backport) --- .../pages/policy/models/advanced_policy_schema.ts | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/x-pack/plugins/security_solution/public/management/pages/policy/models/advanced_policy_schema.ts b/x-pack/plugins/security_solution/public/management/pages/policy/models/advanced_policy_schema.ts index b6333f949c761..88dab5202a151 100644 --- a/x-pack/plugins/security_solution/public/management/pages/policy/models/advanced_policy_schema.ts +++ b/x-pack/plugins/security_solution/public/management/pages/policy/models/advanced_policy_schema.ts @@ -1285,6 +1285,17 @@ export const AdvancedPolicySchema: AdvancedPolicySchemaType[] = [ } ), }, + { + key: 'windows.advanced.events.callstacks.exclude_hotpatch_extension_pages', + first_supported_version: '8.15.2', + documentation: i18n.translate( + 'xpack.securitySolution.endpoint.policy.advanced.windows.advanced.events.callstacks.exclude_hotpatch_extension_pages', + { + defaultMessage: + 'Exclude Windows 11 24H2 hotpatch extension pages, which resemble injected code, from callstack module stomp scanning. Default: true', + } + ), + }, { key: 'windows.advanced.events.process_ancestry_length', first_supported_version: '8.15',