You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/release-notes/8.15.asciidoc
+18-2Lines changed: 18 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,22 @@
1
1
[[release-notes-header-8.15.0]]
2
2
== 8.15
3
3
4
+
[discrete]
5
+
[[release-notes-8.15.5]]
6
+
=== 8.15.5
7
+
8
+
[discrete]
9
+
[[bug-fixes-8.15.5]]
10
+
==== Bug fixes
11
+
* Ensures that only the asset criticality index is refreshed after you bulk upload asset criticality data ({kibana-pull}200897[#200897]).
12
+
* Fixes {agent} to {elastic-defend} communication on endpoints using a proxy. With this fix, localhost TCP traffic should skip any proxies.
13
+
* Fixes a time skew bug that occurs when Linux virtual machines that are using eBPF event probes are suspended and then resumed.
14
+
* Fixes an {elastic-defend} bug where Windows API events might be dropped if they contain Unicode characters that can’t be converted to ANSI.
15
+
* Fixes a bug where {elastic-defend} could fail to properly enrich Windows API events for short-lived processes on older operating systems that don’t natively include this telemetry, such as Windows Server 2019. This might result in dropped or unattributed API events.
16
+
* Ensures that {elastic-defend} does not emit an empty `memory_region` if it can’t enrich a memory region in an API event. With this fix, {elastic-defend} removes these fields.
17
+
* Enhances {elastic-defend} by improving the `call_stack_final_user_module` attribution where potential `proxy_call` modules are encountered during Windows call stack analysis.
18
+
19
+
4
20
[discrete]
5
21
[[release-notes-8.15.4]]
6
22
=== 8.15.4
@@ -200,6 +216,7 @@ On October 17, 2024, this issue was resolved.
200
216
* Fixes an {elastic-defend} regression that was introduced in 8.14.0, where security events did not populate the `user.name` field. This fix is for Windows endpoints only.
201
217
* Fixes an {elastic-defend} bug where {elastic-endpoint} sometimes missed file and network events on newer kernels that support eBPF. This only occurred if {elastic-endpoint} failed to enable eBPF probes and fell back to Kprobes. This fix is for Linux endpoints only.
202
218
* Fixes a bug that caused errors if you used Azure OpenAI connector for streaming ({kibana-pull}191552[#191552]).
219
+
* Fixes a bug that caused Elastic AI Assistant's responses to sometimes include tags when using Bedrock Sonnet 3.5.
203
220
* Fixes a bug that prevented duplicated prebuilt rules from inheriting **Required fields** and **Related integrations** field values ({kibana-pull}191065[#191065]).
204
221
* Turns off the option to assign users to an alert if no assignees exist ({kibana-pull}190937[#190937]).
205
222
* Fixes a bug that prevented Timeline template settings from being applied to new Timelines that were generated by a rule ({kibana-pull}190511[#190511]).
@@ -222,7 +239,6 @@ On October 17, 2024, this issue was resolved.
222
239
*Details* +
223
240
On August 1, 2024, it was discovered that Elastic AI Assistant's responses when using Bedrock Sonnet 3.5 may include `<antThinking>` tags, for example `<search_quality_reflection>` ({kibana-issue}189676[#189676]).
224
241
225
-
226
242
====
227
243
// end::known-issue-189676[]
228
244
@@ -269,7 +285,7 @@ On September 5, 2024, this issue was resolved.
269
285
A bug prevented third-party response actions with CrowdStrike from working.
0 commit comments