Skip to content

Commit ad0d071

Browse files
nastasha-solomongabriellandaunatasha-moore-elastic
authored
[Security] 9.1.2 release notes (#2512)
Resolves #2511: adds the 9.1.2 Security and Endpoint release notes. Preview: [9.1.2](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/2512/release-notes/elastic-security) --------- Co-authored-by: Gabriel Landau <[email protected]> Co-authored-by: natasha-moore-elastic <[email protected]> Co-authored-by: natasha-moore-elastic <[email protected]>
1 parent 832a1fa commit ad0d071

File tree

1 file changed

+14
-0
lines changed

1 file changed

+14
-0
lines changed

release-notes/elastic-security/index.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,20 @@ To check for security updates, go to [Security announcements for the Elastic sta
2727

2828
% *
2929

30+
## 9.1.2 [elastic-security-9.1.2-release-notes]
31+
32+
### Features and enhancements [elastic-security-9.1.2-features-enhancements]
33+
* Adds Automatic Import documentation links for users in log description and the error message so that users have better access to the data types that are valid [#229375]({{kib-pull}}229375).
34+
* To help identify which parts of `elastic-endpoint.exe` are using a significant amount of CPU, {{elastic-defend}} on Windows can now include CPU profiling data in diagnostics. To request CPU profiling data using the command line, refer to [{{agent}} command reference](/reference/fleet/agent-command-reference.md#_options). To request CPU profiling data using {{kib}}, check the **Collect additional CPU metrics** box when requesting {{agent}} diagnostics.
35+
* Improves {{elastic-defend}} malware scan queue efficiency on Windows by not blocking scan requests when an oplock for the file being scanned cannot be acquired.
36+
* Allows {{elastic-defend}} to automatically recover in some situations when it loses connectivity with {{agent}}.
37+
38+
### Fixes [elastic-security-9.1.2-fixes]
39+
* Fixes privileged user monitoring index sync in non-default {{kib}} spaces [#230420]({{kib-pull}}230420).
40+
* Only creates a privileged user monitoring default index source if one doesn't currently exist [#229693]({{kib-pull}}229693).
41+
* Fixes a race condition in {{elastic-defend}} that may occasionally result in corrupted process command lines on Windows. When this occurs, `process.command_line`, `process.args_count` and `process.args` may be incorrect, leading to false positives.
42+
* Due to an issue in macOS, {{elastic-defend}} would sometimes send network events without `user.name` populated. {{elastic-defend}} will now identify these events and populate `user.name` if necessary.
43+
3044
## 9.1.1 [elastic-security-9.1.1-release-notes]
3145

3246
### Features and enhancements [elastic-security-9.1.1-features-enhancements]

0 commit comments

Comments
 (0)