Skip to content

Commit 7b08868

Browse files
natasha-moore-elasticbenironsidegabriellandauferullonastasha-solomon
authored andcommitted
[Security] 9.2.0 release notes (elastic#3451)
Resolves elastic#3390: adds the 9.2.0 Security and Endpoint release notes. Previews: * [Elastic Security release notes > 9.2.0](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/3451/release-notes/elastic-security#elastic-security-9.2.0-release-notes) * [Elastic Security breaking changes](https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/3451/release-notes/elastic-security/breaking-changes) --------- Co-authored-by: Benjamin Ironside Goldstein <[email protected]> Co-authored-by: Gabriel Landau <[email protected]> Co-authored-by: Daniel Ferullo <[email protected]> Co-authored-by: Nastasha Solomon <[email protected]>
1 parent 4e4e24f commit 7b08868

File tree

2 files changed

+110
-1
lines changed

2 files changed

+110
-1
lines changed

release-notes/elastic-security/breaking-changes.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,18 @@ Breaking changes can impact your Elastic applications, potentially disrupting no
1515
% **Action**<br> Steps for mitigating deprecation impact.
1616
% ::::
1717

18-
## 9.0.7 [elastic-security-900-breaking-changes]
18+
## 9.2.0 [elastic-security-920-breaking-changes]
19+
::::{dropdown} Changes invalid category for Gatekeeper
20+
21+
Changes `event.category` from `security` to `configuration` for Gatekeeper on macOS.
22+
23+
**Impact**<br> Gatekeeper events on macOS are now labeled as `event.category == configuration`.
24+
25+
**Action**<br> If you're deploying custom rules using `event.category == security` on macOS, change the query to `event.category == configuration`.
26+
27+
::::
28+
29+
## 9.0.7 [elastic-security-907-breaking-changes]
1930
::::{dropdown} Changes invalid category for Gatekeeper
2031

2132
Changes `event.category` from `security` to `configuration` for Gatekeeper on macOS.

release-notes/elastic-security/index.md

Lines changed: 98 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,102 @@ To check for security updates, go to [Security announcements for the Elastic sta
2727

2828
% *
2929

30+
31+
## 9.2.0 [elastic-security-9.2.0-release-notes]
32+
33+
### Features and enhancements [elastic-security-9.2.0-features-enhancements]
34+
35+
* Adds the Security Entity Analytics risk score reset feature [#237829]({{kib-pull}}237829).
36+
* Introduces a Security risk scoring AI Assistant tool [#233647]({{kib-pull}}233647).
37+
* Uses {{esql}} for calculating entity risk scores [#237871]({{kib-pull}}237871).
38+
* Enables privileged user monitoring and the Entity analytics navigation item by default [#237436]({{kib-pull}}237436).
39+
* Enables discovering privileged users from the Entity Analytics Okta integration [#237129]({{kib-pull}}237129).
40+
* Adds the data view picker to the **Privileged user monitoring** dashboard page [#233264]({{kib-pull}}233264).
41+
* Implements minor UI changes on **Privileged user monitoring** dashboard page [#231921]({{kib-pull}}231921).
42+
* Populates the `entity.attributes.Privileged` field in the entity store for users [#237038]({{kib-pull}}237038).
43+
* Adds public APIs for attack discovery and attack discovery schedules [#236736]({{kib-pull}}236736).
44+
* Displays total execution time for automatic migrations [#236147]({{kib-pull}}236147).
45+
* Adds **Update missing index pattern** option to the automatic migration **Translated rules** page [#233258]({{kib-pull}}233258).
46+
* Introduces new API endpoints for automatic migration of dashboards [#229112]({{kib-pull}}229112).
47+
* Adds a new deployment method, "cloud connector", for the CSPM and Asset Discovery integrations [#235442]({{kib-pull}}235442), [#230137]({{kib-pull}}230137).
48+
* Implements CDR Data View versioning and migration logic [#238547]({{kib-pull}}238547).
49+
* Makes automatic troubleshooting generally available [#234853]({{kib-pull}}234853).
50+
* Updates the automatic troubleshooting feature to detect warnings and failures in {{elastic-defend}} policy responses and suggest possible remediations [#231908]({{kib-pull}}231908).
51+
* Adds an advanced setting that keeps the alert suppression window active after you close an alert, preventing new alerts during that period [#231079]({{kib-pull}}231079).
52+
* Adds `DOES NOT MATCH` capability to indicator match rules [#227084]({{kib-pull}}227084).
53+
* Adds the `customized_fields` and `has_base_version` fields to the `rule_source` object schema [#234793]({{kib-pull}}234793).
54+
* Enables the auto-extract observables toggle in the alerts table for both row and bulk actions when adding alerts to a case [#235433]({{kib-pull}}235433).
55+
* Enables the new data view picker [#234101]({{kib-pull}}234101).
56+
* Adds a `managed` property to data views, marking Kibana-managed data views with a **Managed** tag [#223451]({{kib-pull}}223451).
57+
* Adds support for specifying a reason when closing an alert [#226590]({{kib-pull}}226590).
58+
* Adds a source event ID link to the alert flyout's **Highlighted fields** section, allowing you to quickly preview the event that triggered the alert [#224451]({{kib-pull}}224451).
59+
* Updates the indicator details flyout's UI to be more consistent with the alert details flyout's UI [#230593]({{kib-pull}}230593).
60+
* Restricts **Value report** page access to `admin` and `soc_manager` roles in the Security Analytics Complete {{serverless-short}} feature tier [#234377]({{kib-pull}}234377).
61+
* Implements the **Value report** page for the Elastic AI SOC Engine (EASE) {{serverless-short}} project type [#228877]({{kib-pull}}228877).
62+
* Adds conversation sharing functionality to the Security AI Assistant, allowing you to share conversations with team members [#230614]({{kib-pull}}230614).
63+
* Adds a non-CVE reference link list to the vulnerability details flyout [#225601]({{kib-pull}}225601).
64+
* Adds support for using the `runscript` response action on SentinelOne-enrolled hosts [#234492]({{kib-pull}}234492).
65+
* Adds support for using the `cancel` response action on MDE-enrolled hosts [#230399]({{kib-pull}}230399).
66+
* Adds support for trusted applications advanced mode [#230111]({{kib-pull}}230111).
67+
* Introduces the {{elastic-defend}} **Endpoint Exceptions** sub-feature privilege [#233433]({{kib-pull}}233433).
68+
* Adds an {{elastic-defend}} advanced policy setting that allows you to disable the firewall anti-tamper plugin or move it into detect-only mode [#236431]({{kib-pull}}236431).
69+
* Adds two new {{elastic-defend}} advanced policy settings that allow you to opt out of collecting ransomware diagnostics on macOS [#235193]({{kib-pull}}235193).
70+
* Adds an {{elastic-defend}} advanced policy setting to disable the filtering of file-backed volumes and CD-ROMs in the `device_control` plugin [#236620]({{kib-pull}}236620).
71+
* Adds an {{elastic-defend}} option to remediate orphaned state by attempting to start {{agent}} service.
72+
* Adds a new device data stream to the {{elastic-defend}} integration.
73+
* Adds two new dashboards to the {{elastic-defend}} integration.
74+
* Adds more {{elastic-defend}} options to the {{ls}} output, allowing for finer control.
75+
* Increases the throughput of {{elastic-defend}}'s {{ls}} connections by increasing the maximum size it can upload at once.
76+
* Adds {{elastic-defend}} support for device control on macOS and Windows.
77+
* Adds architecture of PE file in Windows malware alerts to {{elastic-defend}}.
78+
* Adds the `Endpoint.state.orphaned` indicator to {{elastic-defend}} policy response.
79+
* Adds {{elastic-defend}} support for cluster migration.
80+
* Adds firewall anti-tamper plug-in to protect {{elastic-endpoint}} processes against network blocking via Windows Firewall.
81+
* Includes `origin_url`, `origin_referrer_url`, and `Ext.windows.zone_identifier` fields to {{elastic-defend}} by default to Windows image load and process events, if the information can be retrieved.
82+
* Improves {{elastic-defend}} by integrating a new Event Tracing for Windows (ETW) provider (Microsoft-Windows-Ldap-Client) to create new event types that prebuilt endpoint rules can use to detect malicious LDAP activity.
83+
* Improves reporting reliability and accuracy of {{elastic-defend}}'s {{es}} connection.
84+
* Enriches {{elastic-defend}} macOS network connect events with `network.direction`. Possible values are `ingress` and `egress`.
85+
* Improves {{elastic-defend}} malware scan queue efficiency by not blocking scan requests when an oplock for the file being scanned cannot be acquired.
86+
* Adds an {{elastic-defend}} advanced policy setting `windows.advanced.events.security.event_disabled` that lets users disable security event collection per event ID.
87+
* Shortens the time it takes {{elastic-defend}} to recover from a `DEGRADED` status caused by communication issues with {{agent}}.
88+
* Improves the `verify` command to ensure {{elastic-endpoint}} service is running, otherwise {{agent}} has to fix it automatically.
89+
* Adds experimental {{elastic-defend}} support for Windows on ARM. This is pre-release software under active development, and should not be run on any production systems. We welcome feedback in our [community Slack](https://ela.st/slack).
90+
* Improves the reliability of {{elastic-defend}} Kafka connections.
91+
92+
### Fixes [elastic-security-9.2.0-fixes]
93+
94+
* Fixes an issue where the names of the `Security solution default` and `Security solution alerts` data views were displayed incorrectly [#238354]({{kib-pull}}238354).
95+
* Fixes an issue where the navigation manu overlapped expandable flyouts [#236655]({{kib-pull}}236655).
96+
* Ensures the data view picker icon is always vertically centered [#236379]({{kib-pull}}236379).
97+
* Integrates data view logic into host KPIs charts [#236084]({{kib-pull}}236084).
98+
* Fixes integrations RAG in automatic migration rule translations [#234211]({{kib-pull}}234211).
99+
* Removes the feature flag for privileged user monitoring [#233960]({{kib-pull}}233960).
100+
* Returns a 500 response code if there is an error during privileged user monitoring engine initialization [#234368]({{kib-pull}}234368).
101+
* Ensures that privileged user `@timestamp` and `event.ingested` fields are updated when a privileged user is updated [#233735]({{kib-pull}}233735).
102+
* Fixes a bug in privileged user monitoring index synchronization where stale users weren't removed after index pattern changes [#229789]({{kib-pull}}229789).
103+
* Updates the privileged user monitoring UI to replace hard-coded CSS values with the EUI theme [#225307]({{kib-pull}}225307).
104+
* Fixes incorrect threat enrichment for partially matched `AND` conditions in indicator match rules [#230773]({{kib-pull}}230773).
105+
* Adds a validation error to prevent users from setting a custom action interval shorter than the rule's check interval [#229976]({{kib-pull}}229976).
106+
* Fixes accessibility issues on the **Benchmarks** page [#229521]({{kib-pull}}229521).
107+
* Simplifies the Cloud Security Posture Misconfigurations data view by removing redundancy in the index pattern definition [#227995]({{kib-pull}}227995).
108+
* Fixes an issue causing "missing authentication credentials" warnings in `TelemetryConfigWatcher` and `PolicyWatcher`, reducing unnecessary warning log entries in the `securitySolution` plugin.
109+
* Fixes an {{elastic-defend}} issue on Linux by preventing unnecessary locking within Malware Protections to avoid invalid watchdog firings.
110+
* Fixes issues that could sometimes cause crashes of the {{elastic-defend}} user-mode process on very busy Windows systems.
111+
* Adds support in {{elastic-defend}} for installing eBPF event probes on Linux endpoints when cgroup2 is mounted in a non-standard location or not mounted at all.
112+
* Adds support in {{elastic-defend}} for installing eBPF probes on Linux endpoints when taskstats is compiled out of the kernel.
113+
* Fixes an issue in {{elastic-defend}} where Linux network events could have source and destination bytes swapped.
114+
* Fixes a bug where Linux capabilities were included in {{elastic-endpoint}} network events despite being disabled.
115+
* Fixes an issue where {{elastic-defend}} would incorrectly calculate throughput capacity when sending documents to output. This may have limited event throughput on extremely busy endpoints.
116+
* Improves the reliability of local {{elastic-defend}} administrative shell commands. In rare cases, a command could fail to execute due to issues with interprocess communication.
117+
* Fixes an issue in {{elastic-defend}} where host isolation could auto-release incorrectly. Host isolation now only releases when {{elastic-endpoint}} becomes orphaned. Intermittent {{elastic-agent}} connectivity changes no longer alter the host isolation state.
118+
* Fixes a bug in {{elastic-defend}} where Linux endpoints would report `process.executable` as a relative, instead of absolute, path.
119+
* Fixes an issue which could cause {{elastic-defend}} to improperly report success when self-healing rollback attempted to terminate a process with an active debugger on Windows.
120+
* Fixes an issue in {{elastic-defend}} installation logging where only the first character of install paths (usually 'C') was logged.
121+
* Fixes an issue to improve reliability of health status reporting between {{elastic-endpoint}} and {{agent}}.
122+
* Fixes a race condition in {{elastic-defend}} that occasionally resulted in corrupted process command lines on Windows. This could cause incorrect values for `process.command_line`, `process.args_count`, and `process.args`, leading to false positives.
123+
* Fixes an issue in {{elastic-defend}} that could result in a crash if a specified {{ls}} output configuration contained a certificate that couldn't be parsed.
124+
125+
30126
## 9.1.6 [elastic-security-9.1.6-release-notes]
31127

32128
### Features and enhancements [elastic-security-9.1.6-features-enhancements]
@@ -36,6 +132,8 @@ To check for security updates, go to [Security announcements for the Elastic sta
36132
### Fixes [elastic-security-9.1.6-fixes]
37133
* Fixes {{elastic-endpoint}} artifacts spaces migration to ensure all artifacts are processed [#238740]({{kib-pull}}238740).
38134
* Fixes an issue causing "missing authentication credentials" warnings in `TelemetryConfigWatcher` and `PolicyWatcher`, reducing unnecessary warning log entries in the `securitySolution` plugin. [#237796]({{kib-pull}}237796).
135+
136+
39137
## 9.1.5 [elastic-security-9.1.5-release-notes]
40138

41139
### Features and enhancements [elastic-security-9.1.5-features-enhancements]

0 commit comments

Comments
 (0)