Skip to content

Conversation

kcreddy
Copy link
Contributor

@kcreddy kcreddy commented Aug 11, 2025

Backport

This will backport the following commits from main to 8.19:

Questions ?

Please refer to the Backport tool documentation

… to kibana_system role permissions (elastic#132445)

Add logs-m365_defender.vulnerability-* and logs-microsoft_defender_endpoint.vulnerability-* data stream indices to the kibana_system's read privileges. This is required for the latest transform for 3rd party integrations CDR workflows (vulnerability findings) to work.

Also add delete_index on logs-m365_defender.vulnerability-* and logs-microsoft_defender_endpoint.vulnerability-* to facilitate index removal through ILM policies.

(cherry picked from commit 716bff8)
@elasticsearchmachine elasticsearchmachine added external-contributor Pull request authored by a developer outside the Elasticsearch team v8.19.2 labels Aug 11, 2025
@kcreddy kcreddy added >non-issue :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Security Meta label for security team auto-merge-without-approval Automatically merge pull request when CI checks pass (NB doesn't wait for reviews!) Team:Cloud Security Meta label for Cloud Security team labels Aug 11, 2025
@kcreddy
Copy link
Contributor Author

kcreddy commented Aug 11, 2025

@elasticsearchmachine test this please

@kcreddy
Copy link
Contributor Author

kcreddy commented Aug 11, 2025

@elasticsearchmachine test this please

@elasticsearchmachine elasticsearchmachine merged commit ab7d1bb into elastic:8.19 Aug 11, 2025
28 checks passed
efd6 pushed a commit to elastic/integrations that referenced this pull request Oct 12, 2025
…plementation (#15603)

Existing CEL program uses 3 API endpoints to fetch vulnerability
data. Although we fetch more fields using this approach, it doesn't 
scale well and hence is unusable even for few hundred machines.

This PR updates the vulnerability data stream with new 
SoftwareVulnerabilitiesExport API[1], which is recommended for 
larger workloads. While there are few data points missed in this 
new implementation[2], we maintain all the required fields for 
3rd party vulnerability workflow[3].

Other changes:
- Updates microsoft_defender_endpoint min stack version to "8.19.3"
  as the permissions for the transform were actually applied in 
  "8.19.3" version, and not in "8.19.2"[4].
- Add dataset filter to all visualisations of vulnerability dashboards.

[1]: https://learn.microsoft.com/en-us/defender-endpoint/api/get-assessment-software-vulnerabilities#2-export-software-vulnerabilities-assessment-via-files
[2]: #15521 (comment)
[3]: https://docs.elastic.dev/security-solution/cloud-security/cdr/3p-dev-guide
[4]: elastic/elasticsearch#132629
@nchaulet
Copy link
Member

Looks like this one did not make it to 8.19.2 but 8.19.3

@nchaulet nchaulet added v8.19.3 and removed v8.19.2 labels Oct 14, 2025
@kcreddy
Copy link
Contributor Author

kcreddy commented Oct 15, 2025

Looks like this one did not make it to 8.19.2 but 8.19.3

Yes, we recently noticed it and updated the integration's version constraint to 8.19.3.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

auto-merge-without-approval Automatically merge pull request when CI checks pass (NB doesn't wait for reviews!) backport external-contributor Pull request authored by a developer outside the Elasticsearch team >non-issue :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Cloud Security Meta label for Cloud Security team Team:Security Meta label for security team v8.19.3

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants