Skip to content

Commit 89be16f

Browse files
[Security] 9.0.1 release notes (#1309)
### Description Makes several changes: - Adds release notes for 9.0.1 (elastic/security-docs#6798). - Updates the known issue description for the bug that forces prebuilt rules to update if the user creates a new Defend integration policy (#1094). - Adds known issue descriptions for Endpoint bugs that were discovered in 9.0.0 and fixed in 9.0.1. - Makes minor adjustments to the template to ensure the version numbers in anchors are formatted correctly. ### Preview [Elastic Security release notes](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/1309/release-notes/elastic-security/) --------- Co-authored-by: Gabriel Landau <[email protected]>
1 parent b089f2c commit 89be16f

File tree

2 files changed

+68
-12
lines changed

2 files changed

+68
-12
lines changed

release-notes/elastic-security/index.md

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,22 +4,32 @@ mapped_pages:
44
- https://www.elastic.co/guide/en/security/current/release-notes.html
55
- https://www.elastic.co/guide/en/security/current/whats-new.html
66
---
7-
# {{elastic-sec}} release notes [elastic-security-X.X.X-release-notes]
7+
# {{elastic-sec}} release notes
88

99
Review the changes, fixes, and more in each version of {{elastic-sec}}.
1010

1111
To check for security updates, go to [Security announcements for the Elastic stack](https://discuss.elastic.co/c/announcements/security-announcements/31).
1212

1313
% Release notes include only features, enhancements, and fixes. Add breaking changes, deprecations, and known issues to the applicable release notes sections.
1414

15-
% ## version.next [elastic-security-next-release-notes]
15+
% ## version.next [elastic-security-X.X.X-notes]
1616

17-
% ### Features and enhancements [elastic-security-next-features-enhancements]
17+
% ### Features and enhancements [elastic-security-X.X.X-features-enhancements]
1818
% *
1919

20-
% ### Fixes [elastic-security-next-fixes]
20+
% ### Fixes [elastic-security-X.X.X-fixes]
2121
% *
2222

23+
## 9.0.1 [elastic-security-9.0.1-release-notes]
24+
25+
### Features and enhancements [elastic-security-9.0.1-features-enhancements]
26+
There are no new features or enhancements.
27+
28+
### Fixes [elastic-security-9.0.1-fixes]
29+
* Fixes a bug that caused installed prebuilt detection rules to upgrade to their latest available versions when you installed a new {{elastic-defend}} integration or {{agent}} policy [#217959]({{kib-pull}}217959)
30+
* Prevents {{esql}} rules from timing out if the rule query takes longer than five minutes to complete [#216667]({{kib-pull}}216667)
31+
* Fixes a bug that prevented you form scrolling in modals [#218697]({{kib-pull}}218697)
32+
2333
## 9.0.0 [elastic-security-900-release-notes]
2434

2535
::::{NOTE}

release-notes/elastic-security/known-issues.md

Lines changed: 54 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,31 +8,77 @@ Known issues are significant defects or limitations that may impact your impleme
88
% Use the following template to add entries to this page.
99

1010
% :::{dropdown} Title of known issue
11-
% **Applicable versions for the known issue and the version for when the known issue was fixed**
12-
% On [Month Day, Year], a known issue was discovered that [description of known issue].
11+
% Applies to: Applicable versions for the known issue
12+
% Description of the known issue.
1313
% For more information, check [Issue #](Issue link).
14+
% **Impact**<br> Impact of the known issue.
15+
% **Workaround**<br> Steps for a workaround until the known issue is fixed.
1416

15-
% **Workaround**
16-
% Workaround description.
17-
18-
:::
17+
% :::
1918

2019
:::{dropdown} Installing an {{elastic-defend}} integration or a new agent policy upgrades installed prebuilt rules, reverting user customizations and overwriting user-added actions and exceptions
2120

22-
**{{stack}} versions: 9.0.0**
21+
Applies to: {{stack}} 9.0.0
2322

2423
On April 10, 2025, it was discovered that when you install a new {{elastic-defend}} integration or agent policy, the installed prebuilt detection rules upgrade to their latest versions (if any new versions are available). The upgraded rules lose any user-added rule actions, exceptions, and customizations.
2524

2625
**Workaround**
2726

2827
To resolve this issue, before you add an {{elastic-defend}} integration to a policy in {{fleet}}, apply any pending prebuilt rule updates. This will prevent rule actions, exceptions, and customizations from being overwritten.
2928

29+
**Resolved**<br>
30+
31+
Resolved in {{stack}} 9.0.1
32+
3033
:::
3134

3235
:::{dropdown} The technical preview badge incorrectly displays on the alert suppression fields for event correlation rules
3336

34-
**{{stack}} versions: 9.0.0**
37+
Applies to: {{stack}} 9.0.0 and 9.0.1
3538

3639
On April 8, 2025, it was discovered that alert suppression for event correlation rules is incorrectly shown as being in technical preview when you create a new rule. For more information, check [#1021](https://github.com/elastic/docs-content/issues/1021).
3740

41+
**Resolved**<br>
42+
43+
Resolved in {{stack}} 9.0.1
44+
45+
:::
46+
47+
48+
:::{dropdown} Interaction between Elastic Defend and Trellix Access Protection causes IRQL_NOT_LESS_EQUAL bugcheck
49+
50+
Applies to: {{elastic-defend}} 9.0.0
51+
52+
An `IRQL_NOT_LESS_EQUAL` [bugcheck](https://learn.microsoft.com/en-us/windows-hardware/drivers/debugger/bug-checks--blue-screens-) in the {{elastic-defend}} driver happens due to an interaction with Trellix Access Protection (`mfehidk.sys`). This issue can occur when `elastic-endpoint-driver.sys` calls [`FwpmTransactionBegin0`](https://learn.microsoft.com/en-us/windows/win32/api/fwpmu/nf-fwpmu-fwpmtransactionbegin0) to initialize its network driver. `FwpmTransactionBegin0` performs a synchronous RPC call to the user-mode Base Filtering Engine service. Trellix's driver intercepts this service's operations, causing `FwpmTransactionBegin0` to hang or slow significantly. This delay prevents {{elastic-defend}} driver from properly initializing in a timely manner. Subsequent system activity can invoke {{elastic-defend}}'s driver before it has fully initialized, leading to a `IRQL_NOT_LESS_EQUAL` bugcheck. This issue affects {{elastic-defend}} versions 8.16.0-8.16.6, 8.17.0-8.17.5, 8.18.0, and 9.0.0.
53+
54+
**Workaround**<br>
55+
56+
If you can't upgrade, either disable Trellix Access Protection or add a [Trellix Access Protection exclusion](https://docs.trellix.com/bundle/endpoint-security-10.6.0-threat-prevention-client-interface-reference-guide-windows/page/GUID-6AC245A1-5E5D-4BAF-93B0-FE7FD33571E6.html) for the Base Filtering Engine service (`C:\Windows\System32\svchost.exe`).
57+
58+
**Resolved**<br>
59+
60+
Resolved in {{elastic-defend}} 9.0.1
61+
62+
:::
63+
64+
65+
:::{dropdown} Unbounded kernel non-paged memory growth issue in Elastic Defend's kernal driver causes slow down on Windows systems
66+
67+
Applies to: {{elastic-defend}} 9.0.0
68+
69+
An unbounded kernel non-paged memory growth issue in {{elastic-defend}}'s kernel driver occurs during extremely high event load situations on Windows. Systems affected by this issue will slow down or become unresponsive until the triggering event load (for example, network activity) subsides. We are only aware of this issue occurring on very busy Windows Server systems running {{elastic-defend}} versions 8.16.0-8.16.6, 8.17.0-8.17.5, 8.18.0, and 9.0.0
70+
71+
**Workaround**<br>
72+
73+
If you can't upgrade, turn off the relevant event source at the kernel level using your {{elastic-defend}} [advanced policy settings (optional)](/solutions/security/configure-elastic-defend/configure-an-integration-policy-for-elastic-defend.md#adv-policy-settings):
74+
75+
* Network Events - Set the `windows.advanced.kernel.network` advanced setting to `false`.
76+
* Registry Events - Set the `windows.advanced.kernel.registry` advanced setting to `false`.
77+
78+
Note that clearing the corresponding checkbox under [event collection](/solutions/security/configure-elastic-defend/configure-an-integration-policy-for-elastic-defend.md#event-collection) is insufficient, as {{elastic-defend}} may still process these event sources internally to support other features.
79+
80+
**Resolved**<br>
81+
82+
Resolved in {{elastic-defend}} 9.0.1
83+
3884
:::

0 commit comments

Comments
 (0)