You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If an agent with the EDR integration is re-enrolled into a policy that does not include the EDR integration, the elastic-endpoint service continues running independently with the last applied configuration.
As a result:
When the agent is removed, the EDR integration is not uninstalled and continues to run with its last configuration.
Switching the agent to another policy that does not include EDR has no effect - the EDR service continues running with its pre-re-enrollment settings.
If the agent is uninstalled after such a re-enrollment and then reinstalled, the EDR service remains and continues working with the previous settings.
In all these cases, until control over elastic-endpoint is restored, there are CPU usage spikes caused by the elastic-endpoint service.
It is impossible to determine which settings are causing the CPU spike since the agent itself no longer has the EDR integration.
Steps to Reproduce:
Create a policy Policy-install-without-edr without any integrations.
Create a policy Policy-test-with-edr with the EDR integration.
Install an agent using the API key of Policy-install-without-edr.
Assign the agent to Policy-test-with-edr.
Re-enroll the agent using the API key of Policy-install-without-edr.
At this point, the agent and EDR service are running independently on the host.
After reassigning the agent to Policy-test-with-edr again, control over elastic-endpoint is restored, and its behavior returns to normal.
The text was updated successfully, but these errors were encountered:
This should functionally be the same as a policy reassignment, but something could be going wrong with tamper protection specifically during re-assignment. Defend continuing to run like this is what I would expect if agent were trying to remove it without the correct uninstall token / correctly signed Fleet action.
Bug Description:
If an agent with the EDR integration is re-enrolled into a policy that does not include the EDR integration, the elastic-endpoint service continues running independently with the last applied configuration.
As a result:
In all these cases, until control over elastic-endpoint is restored, there are CPU usage spikes caused by the elastic-endpoint service.
It is impossible to determine which settings are causing the CPU spike since the agent itself no longer has the EDR integration.
Steps to Reproduce:
At this point, the agent and EDR service are running independently on the host.
After reassigning the agent to Policy-test-with-edr again, control over elastic-endpoint is restored, and its behavior returns to normal.
The text was updated successfully, but these errors were encountered: