|
4 | 4 |
|
5 | 5 | Here are the highlights of what’s new and improved in {elastic-sec}. For detailed information about this release, check out our <<release-notes, release notes>>. |
6 | 6 |
|
7 | | -Other versions: {security-guide-all}/8.16/whats-new.html[8.16] | {security-guide-all}/8.15/whats-new.html[8.15] | {security-guide-all}/8.14/whats-new.html[8.14] | {security-guide-all}/8.13/whats-new.html[8.13] | {security-guide-all}/8.12/whats-new.html[8.12] | {security-guide-all}/8.11/whats-new.html[8.11] | {security-guide-all}/8.10/whats-new.html[8.10] | {security-guide-all}/8.9/whats-new.html[8.9] | {security-guide-all}/8.8/whats-new.html[8.8] | {security-guide-all}/8.7/whats-new.html[8.7] | {security-guide-all}/8.6/whats-new.html[8.6] | {security-guide-all}/8.5/whats-new.html[8.5] | {security-guide-all}/8.4/whats-new.html[8.4] | {security-guide-all}/8.3/whats-new.html[8.3] | {security-guide-all}/8.2/whats-new.html[8.2] | {security-guide-all}/8.1/whats-new.html[8.1] | {security-guide-all}/8.0/whats-new.html[8.0] | {security-guide-all}/7.17/whats-new.html[7.17] | {security-guide-all}/7.16/whats-new.html[7.16] | {security-guide-all}/7.15/whats-new.html[7.15] | {security-guide-all}/7.14/whats-new.html[7.14] | {security-guide-all}/7.13/whats-new.html[7.13] | {security-guide-all}/7.12/whats-new.html[7.12] | {security-guide-all}/7.11/whats-new.html[7.11] | {security-guide-all}/7.10/whats-new.html[7.10] | |
| 7 | +Other versions: {security-guide-all}/8.17/whats-new.html[8.17] | {security-guide-all}/8.16/whats-new.html[8.16] | {security-guide-all}/8.15/whats-new.html[8.15] | {security-guide-all}/8.14/whats-new.html[8.14] | {security-guide-all}/8.13/whats-new.html[8.13] | {security-guide-all}/8.12/whats-new.html[8.12] | {security-guide-all}/8.11/whats-new.html[8.11] | {security-guide-all}/8.10/whats-new.html[8.10] | {security-guide-all}/8.9/whats-new.html[8.9] | {security-guide-all}/8.8/whats-new.html[8.8] | {security-guide-all}/8.7/whats-new.html[8.7] | {security-guide-all}/8.6/whats-new.html[8.6] | {security-guide-all}/8.5/whats-new.html[8.5] | {security-guide-all}/8.4/whats-new.html[8.4] | {security-guide-all}/8.3/whats-new.html[8.3] | {security-guide-all}/8.2/whats-new.html[8.2] | {security-guide-all}/8.1/whats-new.html[8.1] | {security-guide-all}/8.0/whats-new.html[8.0] | {security-guide-all}/7.17/whats-new.html[7.17] | {security-guide-all}/7.16/whats-new.html[7.16] | {security-guide-all}/7.15/whats-new.html[7.15] | {security-guide-all}/7.14/whats-new.html[7.14] | {security-guide-all}/7.13/whats-new.html[7.13] | {security-guide-all}/7.12/whats-new.html[7.12] | {security-guide-all}/7.11/whats-new.html[7.11] | {security-guide-all}/7.10/whats-new.html[7.10] | |
8 | 8 | {security-guide-all}/7.9/whats-new.html[7.9] |
9 | 9 |
|
10 | 10 | // NOTE: The notable-highlights tagged regions are re-used in the Installation and Upgrade Guide. Full URL links are required in tagged regions. |
11 | 11 | // tag::notable-highlights[] |
12 | 12 |
|
| 13 | + |
| 14 | +[float] |
| 15 | +== Generative AI enhancements |
| 16 | + |
| 17 | +[float] |
| 18 | +=== Automatically migrate Splunk SIEM rules |
| 19 | + |
| 20 | +{security-guide}/siem-migration.html[Automatic Migration] for detection rules helps you quickly convert SIEM rules from the Splunk Processing Language (SPL) to the Elasticsearch Query Language ({esql}). If comparable Elastic-authored rules exist, it simplifies onboarding by mapping your rules to them. Otherwise, it creates custom rules on the fly so you can verify and edit them instead of writing them from scratch. |
| 21 | + |
| 22 | +[role="screenshot"] |
| 23 | +image::whats-new/images/8.18/security-siem-migration-1.png[The Upload Splunk SIEM rules flyout] |
| 24 | + |
| 25 | +[float] |
| 26 | +=== Automatic Import improvements |
| 27 | + |
| 28 | +{security-guide}/automatic-import.html[Automatic Import] now allows you to select API (CEL input) as a data source and to provide the associated OpenAPI specification (OAS) file to automatically generate a CEL program to consume an API. |
| 29 | + |
| 30 | +[float] |
| 31 | +=== Control which alerts Attack Discovery analyzes |
| 32 | + |
| 33 | +You can now specify which alerts {security-guide}/attack-discovery.html[Attack Discovery] analyzes using a date and time selector and a KQL filter. |
| 34 | + |
| 35 | +[role="screenshot"] |
| 36 | +image::whats-new/images/8.18/security-attack-discovery-settings.png[Attack Discovery's settings menu,60%] |
| 37 | + |
| 38 | +[float] |
| 39 | +=== View citations and documentation in AI Assistant |
| 40 | + |
| 41 | +{security-guide}/security-assistant.html[AI Assistant] can now cite sources, including Elastic's product documentation, threat reports, and more. |
| 42 | + |
| 43 | + |
| 44 | +[float] |
| 45 | +== Entity Analytics enhancements |
| 46 | + |
| 47 | +[float] |
| 48 | +=== Monitor services installed in your environment |
| 49 | + |
| 50 | +The {security-guide}/entity-store.html[entity store] now supports a new *service* entity type, expanding the range of entities you can track and monitor in your environment. Previously, only user and host entities were supported. With the addition of the service entity type, you can now investigate and protect the various services installed across your infrastructure. |
| 51 | + |
| 52 | +[role="screenshot"] |
| 53 | +image::whats-new/images/8.18/service-risk-scores.png[Service risk scores table] |
| 54 | + |
| 55 | +[float] |
| 56 | +=== Verify entity store engine status |
| 57 | + |
| 58 | +Use the new **Engine Status** tab on the **Entity Store** page to {security-guide}/entity-store.html#verify-engine-status[verify] which engines are installed in your environment and check their current statuses. This tab provides a centralized view for monitoring engine health, allowing you to ensure proper functionality, and troubleshoot any potential issues. |
| 59 | + |
| 60 | +[role="screenshot"] |
| 61 | +image::whats-new/images/8.18/engine-status.png[Engine status tab,60%] |
| 62 | + |
| 63 | +[float] |
| 64 | +=== Entity risk scoring and entity store are generally available |
| 65 | + |
| 66 | +{security-guide}/entity-risk-scoring.html[Entity risk scoring] and entity store are moving from technical preview to general availability. Use these features to monitor the risk score of entities in your environment and query persisted entity metadata. |
| 67 | + |
| 68 | +[float] |
| 69 | +=== Include closed alerts in risk score calculations |
| 70 | + |
| 71 | +When {security-guide}/turn-on-risk-engine.html[turning on the risk engine], you now have the option to include `Closed` alerts in risk scoring calculations. By default, only `Open` and `Acknowledged` alerts are included. Additionally, you can specify a custom date and time range for the calculation, allowing for more flexible and tailored risk monitoring. |
| 72 | + |
| 73 | +[role="screenshot"] |
| 74 | +image::whats-new/images/8.18/include-closed-alerts.png[Toggle for including closed alerts in risk score calculations,60%] |
| 75 | + |
| 76 | +[float] |
| 77 | +== Detection rules and alerts enhancements |
| 78 | + |
| 79 | +[float] |
| 80 | +=== Customize and manage prebuilt detection rules |
| 81 | + |
| 82 | +Previously, you had limited ability to customize prebuilt rules, couldn’t export or import them, and could only accept Elastic changes during rule updates. Now, you can do so much more. |
| 83 | + |
| 84 | +After installing prebuilt rules, you're now able to {security-guide}/rules-ui-management.html#edit-rules-settings[edit] most of their settings to fit your custom needs. When updating rules, Elastic retains your changes whenever possible and helps you auto-resolve conflicts that may occur. Additional enhancements, such as the ability to compare different versions of a rule and edit the final update, have also been made to give you more control over the {security-guide}/prebuilt-rules-update-modified-unmodified.html[prebuilt rule update experience]. |
| 85 | + |
| 86 | +In addition to customizing prebuilt rules, you're now able to: |
| 87 | + |
| 88 | +* {security-guide}/rules-ui-management.html#import-export-rules-ui[Export and import] prebuilt rules that have been modified or left unchanged. |
| 89 | +* {security-guide}/rules-ui-management.html#edit-rules-settings[Bulk-edit] prebuilt rules settings, such as custom highlighted fields or tags. |
| 90 | + |
| 91 | + |
| 92 | +[float] |
| 93 | +=== Manual run enhancements |
| 94 | + |
| 95 | +The {security-guide}/rules-ui-management.html#manually-run-rules[manual runs] functionality is now generally available and includes the following new features: |
| 96 | + |
| 97 | +* Almost all rule actions are supported and can be activated when you run a rule manually. |
| 98 | +* Gaps in rule executions—which can lead to missed alerts and inconsistent rule coverage—can be monitored and manually filled. |
| 99 | + |
| 100 | +[role="screenshot"] |
| 101 | +image::whats-new/images/8.18/gaps-table.png[Gaps table on the rule execution results tab] |
| 102 | + |
| 103 | +[float] |
| 104 | +=== Preview logged {es} requests for more rule types |
| 105 | + |
| 106 | +You can now {security-guide}/rules-ui-create.html#view-rule-es-queries[preview logged {es} requests] for new terms, threshold, custom, and machine learning rule types. |
| 107 | + |
| 108 | +[float] |
| 109 | +=== Suppress alerts for event correlation rules |
| 110 | + |
| 111 | +{security-guide}/alert-suppression.html[Alert suppression] is now supported for event correlation rules using sequence queries. |
| 112 | + |
| 113 | + |
| 114 | +[float] |
| 115 | +== Investigations enhancements |
| 116 | + |
| 117 | +[float] |
| 118 | +=== Control access to Timeline and notes with more granularity |
| 119 | + |
| 120 | +You now have more control over role access to {security-guide}/timelines-ui.html#timeline-privileges[Timeline] and {security-guide}/add-manage-notes.html#notes-privileges[notes]. When you upgrade to 8.18, roles that previously had `All` or `Read` access to Security will inherit these privileges for Timelines and notes. |
| 121 | + |
| 122 | +[float] |
| 123 | +=== Visualizations are available by default in the alert details flyout |
| 124 | + |
| 125 | +The `securitySolution:enableVisualizationsInFlyout` advanced setting is now turned on by default and generally available. The **Session View** and **Analyzer Graph** {security-guide}/view-alert-details.html#expanded-visualizations-view[sub-tabs] in the alert details flyout are also available by default and generally available. |
| 126 | + |
| 127 | +[float] |
| 128 | +=== Quickly access visited places from the alert details flyout |
| 129 | + |
| 130 | +From the {security-guide}/view-alert-details.html#right-panel[alert details flyout], you can click the history icon (image:detections/images/history-icon.png[History icon,15,15]) to display a list of places that you visited from the alert's details flyout—for example, flyouts for other alerts or users. Click any list entry to quickly access the item's details. |
| 131 | + |
| 132 | + |
13 | 133 | [float] |
14 | | -== Logsdb index mode with detection rules and alerts |
| 134 | +== Response actions enhancements |
15 | 135 |
|
16 | | -The {ref}/logs-data-stream.html[logsdb index mode] allows you to store log data more efficiently. If you're considering using it, refer to {security-guide}/detections-logsdb-index-mode-impact.html[Using logsdb index mode with {elastic-sec}] to learn how it can impact your rules and alerts. |
| 136 | +[float] |
| 137 | +=== Updated privileges for third-party response actions |
17 | 138 |
|
18 | | -NOTE: To use the {ref}/mapping-source-field.html#synthetic-source[synthetic `_source`] feature, you must have the appropriate subscription. Refer to the subscription page for https://www.elastic.co/subscriptions/cloud[{ecloud}] and {subscriptions}[{stack}/self-managed] for the breakdown of available features and their associated subscription tiers. |
| 139 | +A new {kib} feature privilege is now required when {security-guide}/response-actions-config.html[configuring third-party response actions]. To find and assign the privilege, navigate to **Management** -> **Actions and Connectors** -> **Endpoint Security**. |
19 | 140 |
|
20 | 141 | [float] |
21 | | -== Signature option available for macOS trusted applications conditions |
| 142 | +=== Run a script on CrowdStrike-enrolled hosts |
| 143 | + |
| 144 | +Using Elastic's CrowdStrike integration and connector, you can now {security-guide}/response-actions.html#runscript[run a script] on CrowdStrike-enrolled hosts by providing one of the following: |
| 145 | + |
| 146 | +* The full script content |
| 147 | +* The name of the script stored in a cloud storage location |
| 148 | +* The file path of the script located on the host machine |
| 149 | + |
| 150 | +[float] |
| 151 | +=== Isolate and release Microsoft Defender for Endpoint–enrolled hosts |
| 152 | + |
| 153 | +Using Elastic's Microsoft Defender for Endpoint integration and connector, you can now {security-guide}/third-party-actions.html#defender-response-actions[perform response actions] on hosts enrolled in Microsoft Defender's endpoint protection system. These actions are available in this release: |
22 | 154 |
|
23 | | -When adding a {security-guide}/trusted-apps-ov.html[trusted application] for macOS, you can now specify conditions based on the application's digital signer—previously only available on Windows. |
| 155 | +* Isolate a host from the network |
| 156 | +* Release an isolated host |
24 | 157 |
|
25 | 158 | [float] |
26 | | -== Cases action is generally available |
| 159 | +=== Third-party response actions are generally available |
27 | 160 |
|
28 | | -The {kibana-ref}/cases-action-type.html[Cases action] feature, first introduced in 8.14, is moving from technical preview to general availability. Use this action to automatically create cases from rules. |
| 161 | +{security-guide}/third-party-actions.html[Third-party response actions] are moving from technical preview to general availability. This includes response capabilities for Sentinel One, Crowdstrike, and Microsoft Defender for Endpoint. |
| 162 | + |
| 163 | + |
| 164 | +[float] |
| 165 | +== Increase Osquery timeout to 24 hours |
| 166 | + |
| 167 | +When {kibana-ref}/osquery.html#osquery-run-query[running Osquery queries], you can now set a timeout period of up to 24 hours (86,400 seconds). Overwriting the query's default timeout period allows you to support queries that take longer to run. |
| 168 | + |
| 169 | + |
| 170 | +[float] |
| 171 | +== Increased support for agentless integrations |
| 172 | + |
| 173 | +An additional 14 {security-guide}/agentless-integrations.html[integrations] can now be deployed using agentless technology. |
29 | 174 |
|
30 | 175 |
|
31 | 176 | // end::notable-highlights[] |
| 177 | + |
| 178 | + |
0 commit comments