Skip to content

Commit dd2da10

Browse files
natasha-moore-elasticbenironsidestephmilovicgabriellandau
authored
[Security] 9.2.4 release notes (#4558)
## Summary Resolves #4497: adds the 9.2.4 Security and Endpoint release notes. ## Preview [Elastic Security release notes > 9.2.4](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/4558/release-notes/elastic-security#elastic-security-9.2.4-release-notes) ## Generative AI disclosure 1. Did you use a generative AI (GenAI) tool to assist in creating this contribution? - [x] Yes - [ ] No Tool(s) and model(s) used: Cursor, claude-4.5-opus-high --------- Co-authored-by: Benjamin Ironside Goldstein <91905639+benironside@users.noreply.github.com> Co-authored-by: Steph Milovic <stephanie.milovic@elastic.co> Co-authored-by: Gabriel Landau <42078554+gabriellandau@users.noreply.github.com>
1 parent 2177e7d commit dd2da10

File tree

1 file changed

+28
-0
lines changed

1 file changed

+28
-0
lines changed

release-notes/elastic-security/index.md

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,34 @@ To check for security updates, go to [Security announcements for the Elastic sta
2727

2828
% *
2929

30+
## 9.2.4 [elastic-security-9.2.4-release-notes]
31+
32+
### Features and enhancements [elastic-security-9.2.4-features-enhancements]
33+
* Updates MITRE ATT&CK mappings to `v18.1` [#246770]({{kib-pull}}246770).
34+
* Adds a server configuration setting that allows you to disable the automatic installation of the Endpoint Security ({{elastic-defend}}) rule when creating an {{elastic-defend}} integration policy [#246418]({{kib-pull}}246418).
35+
* Persists the visual event analyzer's data view selection in local storage [#245002]({{kib-pull}}245002).
36+
* Improves responsiveness on systems running {{elastic-defend}}.
37+
* Optimizes the {{elastic-defend}} kernel driver to collect file and registry access events more efficiently, improving overall system responsiveness and reducing CPU usage.
38+
39+
### Fixes [elastic-security-9.2.4-fixes]
40+
* Fixes an issue where the Security AI Assistant chat completion API didn't use an associated conversation's system prompt [#248020]({{kib-pull}}248020).
41+
* Fixes an issue where entity user and host names were not escaped in URLs, which resulted in invalid URLs [#247707]({{kib-pull}}247707).
42+
* Fixes an issue where the `createdBy` field in the notes filter didn't use exact matching [#247351]({{kib-pull}}247351).
43+
* Fixes an issue where special characters in {{esql}} queries for risk scoring were not handled correctly [#247060]({{kib-pull}}247060).
44+
* Fixes a display issue with filters on the **MITRE ATT&CK® coverage** page [#246794]({{kib-pull}}246794).
45+
* Fixes an issue where the **Integrations** section on the privileged user monitoring **Manage data sources** page always showed a "no data stream" warning [#246180]({{kib-pull}}246180).
46+
* Fixes an issue where Timeline actions appeared in the Alerts table bulk actions menu without proper privileges [#246150]({{kib-pull}}246150).
47+
* Fixes an issue where the visual event analyzer preview didn't use the same data view that was selected in the analyzer [#246081]({{kib-pull}}246081).
48+
* Fixes an issue where the visual event analyzer rendered before the data view was ready [#245712]({{kib-pull}}245712).
49+
* Fixes an issue where the **Threat intelligence** section in the alert details flyout didn't display multiple values [#245449]({{kib-pull}}245449).
50+
* Fixes an issue in {{elastic-defend}} Windows on-write malware scanning that could cause sharing violations when other applications attempted to open files.
51+
* Fixes an issue where {{elastic-defend}} upgrades and uninstallations could fail on busy systems.
52+
* Fixes an issue in {{elastic-defend}} on Windows where Mark of the Web parsing incorrectly handled file origin information ending with a `\0`.
53+
* For {{elastic-defend}} on Linux, reduces the occurrence of policy failures related to malware protection system deadlock avoidance.
54+
* Fixes an issue in {{elastic-defend}} that could result in delayed or missing malware-on-write alerts.
55+
* Fixes a bug in {{elastic-defend}} on Windows that could sometimes result in `KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL` or `PAGE_FAULT_IN_NONPAGED_AREA` bugchecks when [Offloaded Data Transfer (ODX)](https://learn.microsoft.com/en-us/windows-hardware/drivers/storage/offloaded-data-transfer) was used to copy files. This regression was introduced in {{elastic-defend}} versions 8.19.8, 9.1.8, and 9.2.2.
56+
57+
3058
## 9.2.3 [elastic-security-9.2.3-release-notes]
3159

3260
### Features and enhancements [elastic-security-9.2.3-features-enhancements]

0 commit comments

Comments
 (0)