You are viewing docs on Elastic's new documentation system, currently in technical preview. For all other Elastic docs, visit elastic.co/guide.

Configure updates for protection artifacts

Configure updates for protection artifacts.

On the Protection updates tab of the Elastic Defend integration policy, you can configure how Elastic Defend receives updates from Elastic with the latest threat detections, global exceptions, malware models, rule packages, and other protection artifacts. By default, these artifacts are automatically updated regularly, ensuring your environment is up to date with the latest protections.

You can disable automatic updates and freeze your protection artifacts to a specific date, allowing you to control when to receive and install the updates. For example, you might want to temporarily disable updates to ensure resource availability during a high-volume period, test updates in a controlled staging environment before rolling out to production, or roll back to a previous version of protections.

Protection artifacts will expire after 18 months, and you'll no longer be able to select them as a deployed version. If you're already using a specific version when it expires, you'll keep using it until you either select a later non-expired version or re-enable automatic updates.

Caution

It is strongly advised to keep automatic updates enabled to ensure the highest level of security for your environment. Proceed with caution if you decide to disable automatic updates.

To configure the protection artifacts version deployed in your environment:

  1. Go to ManagePolicies, select an Elastic Defend integration policy, then select the Protection updates tab.
  2. Turn off the Enable automatic updates toggle.
  3. Use the Version to deploy date picker to select the date of the protection artifacts you want to use in your environment.
  4. (Optional) Enter a Note to explain the reason for selecting a particular version of protection artifacts.
  5. Select Save.

On this page