Skip to content

Commit eb62348

Browse files
Merge branch 'main' into issue-3998-refreshes-opt-anomaly-docs
2 parents 6009994 + 665ff37 commit eb62348

File tree

2 files changed

+102
-1
lines changed

2 files changed

+102
-1
lines changed

docs/release-notes/8.14.asciidoc

Lines changed: 84 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,27 @@
55
[[release-notes-8.14.3]]
66
=== 8.14.3
77

8+
[discrete]
9+
[[known-issue-8.14.3]]
10+
==== Known issues
11+
12+
// tag::known-issue-14686[]
13+
[discrete]
14+
.{elastic-endpoint} does not properly populate the `user.name` field in security events
15+
[%collapsible]
16+
====
17+
*Details* +
18+
{elastic-endpoint} for Windows will not properly populate the `user.name` field with security events.
19+
20+
*Workaround* +
21+
Upgrade to 8.15.1.
22+
23+
*Resolved* +
24+
On September 5, 2024, this issue was resolved.
25+
26+
====
27+
// end::known-issue-14686[]
28+
829
[discrete]
930
[[bug-fixes-8.14.3]]
1031
==== Bug fixes
@@ -15,6 +36,27 @@
1536
[[release-notes-8.14.2]]
1637
=== 8.14.2
1738

39+
[discrete]
40+
[[known-issue-8.14.2]]
41+
==== Known issues
42+
43+
// tag::known-issue-14686[]
44+
[discrete]
45+
.{elastic-endpoint} does not properly populate the `user.name` field in security events
46+
[%collapsible]
47+
====
48+
*Details* +
49+
{elastic-endpoint} for Windows will not properly populate the `user.name` field with security events.
50+
51+
*Workaround* +
52+
Upgrade to 8.15.1.
53+
54+
*Resolved* +
55+
On September 5, 2024, this issue was resolved.
56+
57+
====
58+
// end::known-issue-14686[]
59+
1860
[discrete]
1961
[[bug-fixes-8.14.2]]
2062
==== Bug fixes
@@ -25,6 +67,27 @@ There are no user-facing changes in 8.14.2.
2567
[[release-notes-8.14.1]]
2668
=== 8.14.1
2769

70+
[discrete]
71+
[[known-issue-8.14.1]]
72+
==== Known issues
73+
74+
// tag::known-issue-14686[]
75+
[discrete]
76+
.{elastic-endpoint} does not properly populate the `user.name` field in security events
77+
[%collapsible]
78+
====
79+
*Details* +
80+
{elastic-endpoint} for Windows will not properly populate the `user.name` field with security events.
81+
82+
*Workaround* +
83+
Upgrade to 8.15.1.
84+
85+
*Resolved* +
86+
On September 5, 2024, this issue was resolved.
87+
88+
====
89+
// end::known-issue-14686[]
90+
2891
[discrete]
2992
[[bug-fixes-8.14.1]]
3093
==== Bug fixes
@@ -39,6 +102,27 @@ There are no user-facing changes in 8.14.2.
39102
[[release-notes-8.14.0]]
40103
=== 8.14.0
41104

105+
[discrete]
106+
[[known-issue-8.14.0]]
107+
==== Known issues
108+
109+
// tag::known-issue-14686[]
110+
[discrete]
111+
.{elastic-endpoint} does not properly populate the `user.name` field in security events
112+
[%collapsible]
113+
====
114+
*Details* +
115+
{elastic-endpoint} for Windows will not properly populate the `user.name` field with security events.
116+
117+
*Workaround* +
118+
Upgrade to 8.15.1.
119+
120+
*Resolved* +
121+
On September 5, 2024, this issue was resolved.
122+
123+
====
124+
// end::known-issue-14686[]
125+
42126
[discrete]
43127
[[features-8.14.0]]
44128
==== New features

docs/release-notes/8.15.asciidoc

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ On August 1, 2024, it was discovered that Elastic AI Assistant's responses when
4545
* Fixes an {elastic-defend} bug that sometimes caused {elastic-endpoint} to report an incorrect version if it used an independent {agent} release.
4646
* Fixes an {elastic-defend} bug where the `process.thread.Ext.call_stack_final_user_module.protection_provenance_path` field might be populated with a non-path value. This fix is for Windows endpoints only.
4747
* Fixes an {elastic-defend} bug that can lead to {elastic-endpoint} reporting `STATUS_ACCESS_DENIED` when attempting to open files for `GENERIC_READ`. {elastic-endpoint} almost always recovered from this issue, but with this fix, it succeeds on the first try. This fix is for Windows endpoints only.
48-
* Fixes an {elastic-defend} regression that was introduced in 8.13.1, where security events did not populate the `user.name` field. This fix is for Windows endpoints only.
48+
* Fixes an {elastic-defend} regression that was introduced in 8.14.0, where security events did not populate the `user.name` field. This fix is for Windows endpoints only.
4949
* Fixes an {elastic-defend} bug where {elastic-endpoint} sometimes missed file and network events on newer kernels that support eBPF. This only occurred if {elastic-endpoint} failed to enable eBPF probes and fell back to Kprobes. This fix is for Linux endpoints only.
5050
* Fixes a bug that caused errors if you used Azure OpenAI connector for streaming ({kibana-pull}191552[#191552]).
5151
* Fixes a bug that prevented duplicated prebuilt rules from inheriting **Required fields** and **Related integrations** field values ({kibana-pull}191065[#191065]).
@@ -91,6 +91,23 @@ On September 5, 2024, this issue was resolved.
9191
====
9292
// end::known-issue-5713[]
9393

94+
// tag::known-issue-14686[]
95+
[discrete]
96+
.{elastic-endpoint} does not properly populate the `user.name` field in security events
97+
[%collapsible]
98+
====
99+
*Details* +
100+
{elastic-endpoint} for Windows will not properly populate the `user.name` field with security events.
101+
102+
*Workaround* +
103+
Upgrade to 8.15.1.
104+
105+
*Resolved* +
106+
On September 5, 2024, this issue was resolved.
107+
108+
====
109+
// end::known-issue-14686[]
110+
94111
[discrete]
95112
[[breaking-changes-8.15.0]]
96113
==== Breaking changes

0 commit comments

Comments
 (0)