You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Introduces a Security risk scoring AI Assistant tool [#233647]({{kib-pull}}233647).
37
+
* Uses {{esql}} for calculating entity risk scores [#237871]({{kib-pull}}237871).
38
+
* Updates the entity source saved object schema to support integrations sync markers and index [#236457]({{kib-pull}}236457).
39
+
* Enables privileged user monitoring advanced setting by default [#237436]({{kib-pull}}237436).
40
+
* Enables discovering privileged users from the Entity Analytics Okta integration [#237129]({{kib-pull}}237129).
41
+
* Adds the data view picker to the **Privileged user monitoring** dashboard page [#233264]({{kib-pull}}233264).
42
+
* Implements minor UI changes on **Privileged user monitoring** dashboard page [#231921]({{kib-pull}}231921).
43
+
* Populates the `entity.attributes.Privileged` field in the entity store for users [#237038]({{kib-pull}}237038).
44
+
* Adds public APIs for attack discovery and attack discovery schedules [#236736]({{kib-pull}}236736).
45
+
* Introduces total execution time for automatic migrations [#236147]({{kib-pull}}236147).
46
+
* Adds the **Update missing index pattern** functionality to the automatic migrations **Translated rules** page [#233258]({{kib-pull}}233258).
47
+
* Introduces new API endpoints for dashboard automatic migration [#229112]({{kib-pull}}229112).
48
+
* Adds support for creating new cloud connectors and reusing cloud connector between integrations. Supported integrations: CSPM and Asset Inventory [#235442]({{kib-pull}}235442).
49
+
* Adds saved object infrastructure for cloud connectors and implements end-to-end persistence flow for creating integrations with cloud connector support [#230137]({{kib-pull}}230137).
50
+
* Automatic troubleshooting is now generally available [#234853]({{kib-pull}}234853).
51
+
* Updates the automatic troubleshooting feature to detect warnings and failures in {{elastic-defend}} policy responses and suggest possible remediations [#231908]({{kib-pull}}231908).
52
+
* Adds an advanced setting to keep the alert suppression window active after closing an alert, preventing new alerts during that period [#231079]({{kib-pull}}231079).
53
+
* Adds `DOES NOT MATCH` capability to indicator match rules [#227084]({{kib-pull}}227084).
54
+
* Adds the `customized_fields` and `has_base_version` fields to the `rule_source` object schema [#234793]({{kib-pull}}234793).
55
+
* Enables the auto-extract observables toggle in the alerts table for both row and bulk actions when adding alerts to a case [#235433]({{kib-pull}}235433).
56
+
* Enables the new data view picker [#234101]({{kib-pull}}234101).
57
+
* Adds a `managed` property to data views, marking Kibana-managed data views with a **Managed** tag [#223451]({{kib-pull}}223451).
58
+
* Adds support for specifying a reason when closing an alert [#226590]({{kib-pull}}226590).
59
+
* Adds a source event ID link to the alert flyout's **Highlighted fields** section, allowing you to quickly preview the event that triggered the alert [#224451]({{kib-pull}}224451).
60
+
* Updates the indicator details flyout's UI to be more consistent with the alert details flyout [#230593]({{kib-pull}}230593).
61
+
* Restricts **Value report** page access to `admin` and `soc_manager` roles in the Security Analytics Complete {{serverless-short}} feature tier [#234377]({{kib-pull}}234377).
62
+
* Implements the **Value report** page for the Elastic AI SOC Engine (EASE) {{serverless-short}} project type [#228877]({{kib-pull}}228877).
63
+
* Adds conversation sharing functionality to the Security AI Assistant, allowing you to share conversations with team members [#230614]({{kib-pull}}230614).
64
+
* Adds a non-CVE reference link list to the vulnerability details flyout [#225601]({{kib-pull}}225601).
65
+
* Adds support for using the `runscript` response action on SentinelOne-enrolled hosts [#234492]({{kib-pull}}234492).
66
+
* Adds support for using the `cancel` response action on MDE-enrolled hosts [#230399]({{kib-pull}}230399).
67
+
* Adds support for trusted applications advanced mode [#230111]({{kib-pull}}230111).
68
+
* Introduces the {{elastic-defend}} **Endpoint Exceptions** sub-feature privilege [#233433]({{kib-pull}}233433).
69
+
* Adds an {{elastic-defend}} advanced policy setting that allows you to disable the firewall anti-tamper plugin or move it into detect-only mode [#236431]({{kib-pull}}236431).
70
+
* Adds two new {{elastic-defend}} advanced policy settings that allow you to opt out of collecting ransomware diagnostics on macOS [#235193]({{kib-pull}}235193).
34
71
* Adds an {{elastic-defend}} option to remediate orphaned state by attempting to start {{agent}} service.
35
72
* Updates the `endpoint-package` submodule.
36
73
* Adds more {{elastic-defend}} options to the {{ls}} output, allowing for finer control by the end user.
@@ -44,7 +81,7 @@ To check for security updates, go to [Security announcements for the Elastic sta
44
81
* Includes `origin_url`, `origin_referrer_url`, and `Ext.windows.zone_identifier` fields by default to Windows image load and process events, if the information can be retrieved.
45
82
* Improves {{elastic-defend}} by integrating a new Event Tracing for Windows (ETW) provider (Microsoft-Windows-Ldap-Client) to create new event types that prebuilt endpoint rules can use to detect malicious LDAP activity.
46
83
* Adds more Linux diagnostic process `ptrace` events.
47
-
* Improves reporting reliability and accuracy of the {{elastic-defend}}'s {{es}} connection.
84
+
* Improves reporting reliability and accuracy of {{elastic-defend}}'s {{es}} connection.
48
85
* Enriches {{elastic-defend}} macOS network connect events with `network.direction`. Possible values are `ingress` and `egress`.
49
86
* Improves {{elastic-defend}} malware scan queue efficiency by not blocking scan requests when an oplock for the file being scanned cannot be acquired.
50
87
* Adds an {{elastic-defend}} advanced policy setting `windows.advanced.events.security.event_disabled` that lets users disable security event collection per event ID.
@@ -55,6 +92,21 @@ To check for security updates, go to [Security announcements for the Elastic sta
55
92
* Adds {{elastic-defend}} support for diagnostic DNS events on Linux.
56
93
57
94
### Fixes [elastic-security-9.2.0-fixes]
95
+
96
+
* Fixes an issue where the names of the `Security solution default` and `Security solution alerts` data views were displayed incorrectly [#238354]({{kib-pull}}238354).
97
+
* Fixes an issue where the navigation manu overlapped expandable flyouts [#236655]({{kib-pull}}236655).
98
+
* Ensures the data view picker icon is always vertically centered [#236379]({{kib-pull}}236379).
99
+
* Integrates data view logic into host KPIs charts [#236084]({{kib-pull}}236084).
100
+
* Fixes integrations RAG in automatic migration rule translations [#234211]({{kib-pull}}234211).
101
+
* Removes the feature flag for privileged user monitoring [#233960]({{kib-pull}}233960).
102
+
* Returns a 500 response code if there is an error during privileged user monitoring engine initialization [#234368]({{kib-pull}}234368).
103
+
* Ensures that privileged user `@timestamp` and `event.ingested` fields are updated when a privileged user is updated [#233735]({{kib-pull}}233735).
104
+
* Fixes a bug in privileged user monitoring index synchronization where stale users weren't removed after index pattern changes [#229789]({{kib-pull}}229789).
105
+
* Updates the privileged user monitoring UI to replace hard-coded CSS values with the EUI theme [#225307]({{kib-pull}}225307).
106
+
* Fixes incorrect threat enrichment for partially matched `AND` condition in indicator match rules [#230773]({{kib-pull}}230773).
107
+
* Adds a validation error to prevent users from setting a custom action interval shorter than the rule's check interval [#229976]({{kib-pull}}229976).
108
+
* Fixes accessibility issues on the **Benchmarks** page [#229521]({{kib-pull}}229521).
109
+
* Simplifies the Cloud Security Posture Misconfigurations data view by removing redundancy in the index pattern definition [#227995]({{kib-pull}}227995).
58
110
* Fixes an {{elastic-defend}} issue on Linux by preventing unnecessary locking within Malware Protections to avoid invalid watchdog firings.
59
111
* Fixes issues that could sometimes cause crashes of the {{elastic-defend}} user-mode process on very busy Windows systems.
60
112
* Addresses CVE-2025-##### in {{elastic-defend}} on Windows, which could allow a low-privilege attacker to delete arbitrary files on the system. On Windows versions before 25H2, this could result in local privilege escalation.
0 commit comments