You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Allows `xpack.spaces.defaultSolution` to be configured via docker [#236570]({{kib-pull}}236570)
282
+
* Allows `xpack.spaces.defaultSolution` to be configured using docker [#236570]({{kib-pull}}236570)
283
283
* Fixes the Job details fly-out on the Analytics Map page [#236131]({{kib-pull}}236131)
284
284
* Limits `msearch` usage for log rate analysis [#235611]({{kib-pull}}235611)
285
285
* Fixes display of alerts from anomaly detection rules in [#236289]({{kib-pull}}236289)
@@ -590,7 +590,7 @@ Review the changes, fixes, and more to {{serverless-full}}.
590
590
* Displays function license availability in Discover inline docs [#229961]({{kib-pull}}229961)
591
591
* Fixes incorrect filtering logic when removing a comment field in Discover [#230116]({{kib-pull}}230116)
592
592
* Modifies title generation to be scope-aware in Elastic Observability Serverless [#227434]({{kib-pull}}227434)
593
-
* Prevents destructive actions via the Elasticsearch tool in Elastic Observability Serverless [#229497]({{kib-pull}}229497)
593
+
* Prevents destructive actions using the Elasticsearch tool in Elastic Observability Serverless [#229497]({{kib-pull}}229497)
594
594
* Replaces `EuiErrorBoundary` with `KibanaErrorBoundary` in Elastic Observability Serverless [#229710]({{kib-pull}}229710)
595
595
* Fixes keyboard accessibility for the Waterfall flyout in Elastic Observability Serverless [#229926]({{kib-pull}}229926)
596
596
* Allows knowledge base UI to work offline in Elastic Observability Serverless [#229874]({{kib-pull}}229874)
@@ -925,7 +925,7 @@ Review the changes, fixes, and more to {{serverless-full}}.
925
925
* Updates time based charts to use the multi-layer time axis by default, providing a better time window context and improved label positioning. [#210579]({{kib-pull}}210579).
926
926
* Adds an integration flyout to Agent policy details in {{fleet}} [#220229]({{kib-pull}}220229).
927
927
* Enables the `enableSyncIntegrationsOnRemote` feature flag in {{fleet}} [#220215]({{kib-pull}}220215).
928
-
* Enables migration of a single agent to another cluster via the actions menu in {{fleet}}. [#222111]({{kib-pull}}222111).
928
+
* Enables migration of a single agent to another cluster using the actions menu in {{fleet}}. [#222111]({{kib-pull}}222111).
929
929
* Adds a button allowing users to skip to the next section in the fields list in **Discover**[#221792]({{kib-pull}}221792).
930
930
* Adds the **SLO Management** page to {{obs-serverless}}, allowing users to view definitions, delete SLOs, and purge SLI data without having to consider instances [#222238]({{kib-pull}}222238).
931
931
* Adds a new APM dashboard for the Golang OpenTelemetry runtime metrics in {{obs-serverless}} [#220242]({{kib-pull}}220242).
@@ -1040,7 +1040,7 @@ Review the changes, fixes, and more to {{serverless-full}}.
1040
1040
* Allows specifying an embedding model during onboarding for the Elastic Observability Serverless Knowledge Base [#218448]({{kib-pull}}218448)
1041
1041
* Enables click actions for **Stacktrace** and **Degraded Fields** in **Discover** for Elastic Observability Serverless [#214413]({{kib-pull}}214413)
1042
1042
* Shows **ELSER** in **EIS** only when available in Elastic Observability Serverless [#220096]({{kib-pull}}220096)
1043
-
* Adds the ability to create alert rules from **ES|QL** dashboard visualizations via context menu or right-clicking a data point [#217719]({{kib-pull}}217719)
1043
+
* Adds the ability to create alert rules from **ES|QL** dashboard visualizations through context menu or right-clicking a data point [#217719]({{kib-pull}}217719)
1044
1044
* Enables the `enableAutomaticAgentUpgrades` feature flag for Fleet [#219932]({{kib-pull}}219932)
1045
1045
* Adds Cloud Connectors support to Fleet for **CSPM**[#212200]({{kib-pull}}212200)
1046
1046
* Ensures alerts created within **Maintenance Windows** trigger actions after the window expires [#219797]({{kib-pull}}219797)
@@ -1369,7 +1369,7 @@ Review the changes, fixes, and more to {{serverless-full}}.
1369
1369
* Adds context-aware logic to Logs view in Discover [#211176]({{kib-pull}}211176)
1370
1370
* Replaces the Alerts status filter with filter controls [#198495]({{kib-pull}}198495)
1371
1371
* Adds SSL fields to agent binary source settings [#213211]({{kib-pull}}213211)
1372
-
* Allows users to create a snooze schedule for rules via API [#210584]({{kib-pull}}210584)
1372
+
* Allows users to create a snooze schedule for rules using API [#210584]({{kib-pull}}210584)
1373
1373
* Splits up the top dependencies API for improved speed and response size [#211441]({{kib-pull}}211441)
1374
1374
* Adds working default metrics dashboard for Python OTel [#213599]({{kib-pull}}213599)
1375
1375
* Includes spaceID in SLI documents [#214278]({{kib-pull}}214278)
Copy file name to clipboardExpand all lines: release-notes/elastic-observability/known-issues.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -91,7 +91,7 @@ The migration script does not handle this scenario and will indefinitely update
91
91
92
92
Because the document update involves semantic_text an ML node is kept warm further increasing the costs.
93
93
94
-
The issue involves semantic_text field type (and thus the semantic_text migration which is causing this issue), introduced in the knowledge base feature in 8.17.
94
+
The issue involves semantic_text field type (and the semantic_text migration which is causing this issue), introduced in the knowledge base feature in 8.17.
Copy file name to clipboardExpand all lines: release-notes/elastic-security/index.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -94,7 +94,7 @@ To check for security updates, go to [Security announcements for the Elastic sta
94
94
* Adds architecture of PE file in Windows malware alerts to {{elastic-defend}}.
95
95
* Adds the `Endpoint.state.orphaned` indicator to {{elastic-defend}} policy response.
96
96
* Adds {{elastic-defend}} support for cluster migration.
97
-
* Adds firewall anti-tamper plug-in to protect {{elastic-endpoint}} processes against network blocking via Windows Firewall.
97
+
* Adds firewall anti-tamper plug-in to protect {{elastic-endpoint}} processes against network blocking through Windows Firewall.
98
98
* Includes `origin_url`, `origin_referrer_url`, and `Ext.windows.zone_identifier` fields to {{elastic-defend}} by default to Windows image load and process events, if the information can be retrieved.
99
99
* Improves {{elastic-defend}} by integrating a new Event Tracing for Windows (ETW) provider (Microsoft-Windows-Ldap-Client) to create new event types that prebuilt endpoint rules can use to detect malicious LDAP activity.
100
100
* Improves reporting reliability and accuracy of {{elastic-defend}}'s {{es}} connection.
@@ -124,7 +124,7 @@ To check for security updates, go to [Security announcements for the Elastic sta
124
124
* Simplifies the Cloud Security Posture Misconfigurations data view by removing redundancy in the index pattern definition [#227995]({{kib-pull}}227995).
125
125
* Fixes an issue causing "missing authentication credentials" warnings in `TelemetryConfigWatcher` and `PolicyWatcher`, reducing unnecessary warning log entries in the `securitySolution` plugin.
126
126
* Fixes an {{elastic-defend}} issue on Linux by preventing unnecessary locking within Malware Protections to avoid invalid watchdog firings.
127
-
* Fixes issues that could sometimes cause crashes of the {{elastic-defend}} user-mode process on very busy Windows systems.
127
+
* Fixes issues that could sometimes cause crashes of the {{elastic-defend}} user-mode process on busy Windows systems.
128
128
* Adds support in {{elastic-defend}} for installing eBPF event probes on Linux endpoints when cgroup2 is mounted in a non-standard location or not mounted at all.
129
129
* Adds support in {{elastic-defend}} for installing eBPF probes on Linux endpoints when taskstats is compiled out of the kernel.
130
130
* Fixes an issue in {{elastic-defend}} where Linux network events could have source and destination bytes swapped.
@@ -156,7 +156,7 @@ To check for security updates, go to [Security announcements for the Elastic sta
156
156
* Fixes multiple issues searching installed rules by allowing partial matches on rule name and improving special character support [#237496]({{kib-pull}}237496).
157
157
* Fixes an issue where rule exception operators could not be cleared when editing a rule exception [#236051]({{kib-pull}}236051).
158
158
* Fixes an {{elastic-defend}} issue on Linux by preventing unnecessary locking within malware protection to avoid invalid watchdog firings.
159
-
* Fixes issues that could sometimes cause crashes of the {{elastic-defend}} user-mode process on very busy Windows systems.
159
+
* Fixes issues that could sometimes cause crashes of the {{elastic-defend}} user-mode process on busy Windows systems.
160
160
* Fixes multiple {{elastic-defend}} issues in malware protection for Linux where a deadlock could sometimes occur when containers and autofs were both active.
161
161
* Fixes CVE-2025-37735 ([ESA-2025-23](https://discuss.elastic.co/t/elastic-defend-8-19-6-9-1-6-and-9-2-0-security-update-esa-2025-23/383272)) in {{elastic-defend}} on Windows which could allow a low-privilege attacker to delete arbitrary files on the system and potentially escalate privileges to SYSTEM. Windows 11 24H2 includes changes which make this issue harder to exploit.
162
162
* Fixes an {{elastic-defend}} bug in Linux event collection where some long-running processes were not enriched.
@@ -184,7 +184,7 @@ To check for security updates, go to [Security announcements for the Elastic sta
184
184
### Fixes [elastic-security-9.1.5-fixes]
185
185
* Fixes browser fields caching to use the `dataView` ID instead of the index pattern [#234381]({{kib-pull}}234381).
186
186
* Removes `null` in confirmation dialog when bulk editing index patterns for rules [#236572]({{kib-pull}}236572).
187
-
* Fixes the URL passed to detection rule actions via the `{{context.results_link}}` placeholder [#236067]({{kib-pull}}236067).
187
+
* Fixes the URL passed to detection rule actions using the `{{context.results_link}}` placeholder [#236067]({{kib-pull}}236067).
188
188
* Fixes system prompt updates from the Conversations tab in AI Assistant [#234812]({{kib-pull}}234812).
189
189
* Fixes an issue in the Highlighted fields table in the alert details flyout [#234222]({{kib-pull}}234222).
190
190
* Fixes an issue in rule exceptions to include the `matches` operator only for supported fields [#233127]({{kib-pull}}233127).
@@ -276,7 +276,7 @@ To check for security updates, go to [Security announcements for the Elastic sta
276
276
* Updates the asset criticality status color map to match the new design [#222024]({{kib-pull}}222024).
277
277
* Updates the highlighted fields button styling in the alert details flyout [#221862]({{kib-pull}}221862).
278
278
* Adds support for content connectors in {{elastic-sec}} and {{observability}} [#221856]({{kib-pull}}221856).
279
-
* Expands CVE ID search to all search parameters, not just names [#221099]({{kib-pull}}221099).
279
+
* Expands CVE ID search to all search parameters, not only names [#221099]({{kib-pull}}221099).
280
280
* Improves alert searching and filtering by including additional ECS data stream fields [#220447]({{kib-pull}}220447).
281
281
* Updates default model IDs for Amazon Bedrock and OpenAI connectors [#220146]({{kib-pull}}220146).
282
282
* Adds support for PKI (certificate-based) authentication for the OpenAI **Other** connector providers [#219984]({{kib-pull}}219984).
@@ -345,7 +345,7 @@ To check for security updates, go to [Security announcements for the Elastic sta
345
345
346
346
### Fixes [elastic-security-9.0.8-fixes]
347
347
* Removes `null` in confirmation dialog when bulk editing index patterns for rules [#236572]({{kib-pull}}236572).
348
-
* Fixes the URL passed to detection rule actions via the `{{context.results_link}}` placeholder [#236067]({{kib-pull}}236067).
348
+
* Fixes the URL passed to detection rule actions using the `{{context.results_link}}` placeholder [#236067]({{kib-pull}}236067).
349
349
* Adds support in {{elastic-defend}} for installing eBPF probes on Linux endpoints when taskstats is compiled out of the kernel.
350
350
* Fixes an issue in {{elastic-defend}} where Linux network events could have source and destination bytes swapped.
351
351
* Removes `.process.thread.capabilities.permitted` and `.process.thread.capabilities.effective` from Linux network events in {{elastic-defend}}.
Copy file name to clipboardExpand all lines: release-notes/elastic-security/known-issues.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -269,7 +269,7 @@ Resolved in {{elastic-defend}} 9.0.1
269
269
270
270
Applies to: {{elastic-defend}} 9.0.0
271
271
272
-
An unbounded kernel non-paged memory growth issue in {{elastic-defend}}'s kernel driver occurs during extremely high event load situations on Windows. Systems affected by this issue will slow down or become unresponsive until the triggering event load (for example, network activity) subsides. We are only aware of this issue occurring on very busy Windows Server systems running {{elastic-defend}} versions 8.16.0-8.16.6, 8.17.0-8.17.5, 8.18.0, and 9.0.0
272
+
An unbounded kernel non-paged memory growth issue in {{elastic-defend}}'s kernel driver occurs during extremely high event load situations on Windows. Systems affected by this issue will slow down or become unresponsive until the triggering event load (for example, network activity) subsides. We are only aware of this issue occurring on busy Windows Server systems running {{elastic-defend}} versions 8.16.0-8.16.6, 8.17.0-8.17.5, 8.18.0, and 9.0.0
273
273
274
274
**Workaround**<br>
275
275
@@ -278,7 +278,7 @@ If you can't upgrade, turn off the relevant event source at the kernel level usi
278
278
* Network Events - Set the `windows.advanced.kernel.network` advanced setting to `false`.
279
279
* Registry Events - Set the `windows.advanced.kernel.registry` advanced setting to `false`.
280
280
281
-
Note that clearing the corresponding checkbox under [event collection](/solutions/security/configure-elastic-defend/configure-an-integration-policy-for-elastic-defend.md#event-collection) is insufficient, as {{elastic-defend}} may still process these event sources internally to support other features.
281
+
Clearing the corresponding checkbox under [event collection](/solutions/security/configure-elastic-defend/configure-an-integration-policy-for-elastic-defend.md#event-collection) is insufficient, as {{elastic-defend}} may still process these event sources internally to support other features.
Copy file name to clipboardExpand all lines: release-notes/intro/index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ Release notes cover all the latest Elastic product changes, including the follow
16
16
* {{stack}} {{version.stack.base}} and later, including the most recent {{version.stack}} release
17
17
* {{serverless-full}}, including updates to {{es}}, and {{observability}} and {{elastic-sec}} solutions
18
18
19
-
## What's new in the latest Elastic release?
19
+
## What's new in the latest Elastic release
20
20
21
21
Elastic Stack {{version.stack}} includes new features, enhancements, and critical fixes across {{es}}, {{observability}}, {{elastic-sec}}, {{kib}}, and more. To view detailed release notes, select a product.
0 commit comments