You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
## Summary
Resolves#4497: adds the
9.2.4 Security and Endpoint release notes.
## Preview
[Elastic Security release notes >
9.2.4](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/4558/release-notes/elastic-security#elastic-security-9.2.4-release-notes)
## Generative AI disclosure
1. Did you use a generative AI (GenAI) tool to assist in creating this
contribution?
- [x] Yes
- [ ] No
Tool(s) and model(s) used:
Cursor, claude-4.5-opus-high
---------
Co-authored-by: Benjamin Ironside Goldstein <91905639+benironside@users.noreply.github.com>
Co-authored-by: Steph Milovic <stephanie.milovic@elastic.co>
Co-authored-by: Gabriel Landau <42078554+gabriellandau@users.noreply.github.com>
Copy file name to clipboardExpand all lines: release-notes/elastic-security/index.md
+28Lines changed: 28 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,6 +27,34 @@ To check for security updates, go to [Security announcements for the Elastic sta
27
27
28
28
% *
29
29
30
+
## 9.2.4 [elastic-security-9.2.4-release-notes]
31
+
32
+
### Features and enhancements [elastic-security-9.2.4-features-enhancements]
33
+
* Updates MITRE ATT&CK mappings to `v18.1`[#246770]({{kib-pull}}246770).
34
+
* Adds a server configuration setting that allows you to disable the automatic installation of the Endpoint Security ({{elastic-defend}}) rule when creating an {{elastic-defend}} integration policy [#246418]({{kib-pull}}246418).
35
+
* Persists the visual event analyzer's data view selection in local storage [#245002]({{kib-pull}}245002).
36
+
* Improves responsiveness on systems running {{elastic-defend}}.
37
+
* Optimizes the {{elastic-defend}} kernel driver to collect file and registry access events more efficiently, improving overall system responsiveness and reducing CPU usage.
38
+
39
+
### Fixes [elastic-security-9.2.4-fixes]
40
+
* Fixes an issue where the Security AI Assistant chat completion API didn't use an associated conversation's system prompt [#248020]({{kib-pull}}248020).
41
+
* Fixes an issue where entity user and host names were not escaped in URLs, which resulted in invalid URLs [#247707]({{kib-pull}}247707).
42
+
* Fixes an issue where the `createdBy` field in the notes filter didn't use exact matching [#247351]({{kib-pull}}247351).
43
+
* Fixes an issue where special characters in {{esql}} queries for risk scoring were not handled correctly [#247060]({{kib-pull}}247060).
44
+
* Fixes a display issue with filters on the **MITRE ATT&CK® coverage** page [#246794]({{kib-pull}}246794).
45
+
* Fixes an issue where the **Integrations** section on the privileged user monitoring **Manage data sources** page always showed a "no data stream" warning [#246180]({{kib-pull}}246180).
46
+
* Fixes an issue where Timeline actions appeared in the Alerts table bulk actions menu without proper privileges [#246150]({{kib-pull}}246150).
47
+
* Fixes an issue where the visual event analyzer preview didn't use the same data view that was selected in the analyzer [#246081]({{kib-pull}}246081).
48
+
* Fixes an issue where the visual event analyzer rendered before the data view was ready [#245712]({{kib-pull}}245712).
49
+
* Fixes an issue where the **Threat intelligence** section in the alert details flyout didn't display multiple values [#245449]({{kib-pull}}245449).
50
+
* Fixes an issue in {{elastic-defend}} Windows on-write malware scanning that could cause sharing violations when other applications attempted to open files.
51
+
* Fixes an issue where {{elastic-defend}} upgrades and uninstallations could fail on busy systems.
52
+
* Fixes an issue in {{elastic-defend}} on Windows where Mark of the Web parsing incorrectly handled file origin information ending with a `\0`.
53
+
* For {{elastic-defend}} on Linux, reduces the occurrence of policy failures related to malware protection system deadlock avoidance.
54
+
* Fixes an issue in {{elastic-defend}} that could result in delayed or missing malware-on-write alerts.
55
+
* Fixes a bug in {{elastic-defend}} on Windows that could sometimes result in `KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL` or `PAGE_FAULT_IN_NONPAGED_AREA` bugchecks when [Offloaded Data Transfer (ODX)](https://learn.microsoft.com/en-us/windows-hardware/drivers/storage/offloaded-data-transfer) was used to copy files. This regression was introduced in {{elastic-defend}} versions 8.19.8, 9.1.8, and 9.2.2.
56
+
57
+
30
58
## 9.2.3 [elastic-security-9.2.3-release-notes]
31
59
32
60
### Features and enhancements [elastic-security-9.2.3-features-enhancements]
0 commit comments