Stellar Cyber 4.3.4 Release Notes
Stellar Cyber 4.3.4 brings improvements to the Stellar Cyber Open XDR platform, including new features, improvements, enhancements, key fixes, and known issues. Upgrade instructions follow all of that great information.
For an overview, see the Stellar Cyber 4.3.4 Preview Video
Highlights
-
Introduced per-tenant authentication configuration (SSO or Local).
-
Introduced the CYRISMA connector.
-
MalOps (alerts) ingested from Cybereason connectors are deduplicated and mapped to XDR alerts.
-
Introduced a public API to update properties of a Stellar Cyber Incident.
-
Enhanced the public API for incident search with a time range.
Behavior Changes / Deprecations
Changes that affect the way users interact with the product or interpret results are listed below.
-
With the introduction of per-tenant authentication override (Local or SSO), the user login flow is changed. Users need to enter just their username or email address before completing the authentication. For more details, refer to the online help topic on Logging In.
-
Parser changes are listed below.
-
Deprecated and removed the Session Deduplication option in the Data Analyzer Profile. The behavior now is always Off.
Critical Bug Fixes
-
Addressed a race condition during sensor software upgrade that can block sensors from sending data to Data Processors.
-
Fixed the issue the Public and Private addresses are reversed in the tooltip in the Visualize | ML-IDS dashboard.
-
Fixed a regression issue that correlated alerts do not have links to the underlying Interflow records.
-
Fixed the issue that in the Ingestion Dashboard only the top ten items are listed in each table.
-
Fixed a bug that a user cannot submit a newly created dashboard after changing the type from Per Record to Grouping.
-
Fixed an exception error in the tenable Nessus connector running in a sensor.
-
Fixed a Log Forwarder parser error where the log delimiter was not found when received in TCP sessions.
Usability Improvements
-
Enhanced incident management so that the assignee is based on the access scope of the assigner.
-
Added alert updates and score changes to the incident history.
-
Added a link to the original Interflow records for each alert in an incident’s alert table.
-
Enhanced the Windows Server Sensor profile to allow both inclusion and exclusion filters.
-
Introduced per-tenant authentication configuration. Each tenant can be configured to override the Global authentication model. A tenant can be set to use the strategy configured at the Global level, to use Local authentication, or to use a separate IdP provider for single sign-on (SSO). (The Root Tenant must be configured to the Default (same method as the Global authentication) or Local. It is not supported for configuration with an independent SSO.)
-
The help menu now links to the Stellar Cyber Support Community page instead of the FAQs.
Detection/ML Improvements
-
Alerts ingested from Cybereason connectors are deduplicated and mapped to XDR alerts.
-
The Process Anomaly, Abnormal Parent/Child Process, Uncommon Process Anomaly, and User Process Usage Anomaly alerts now use log source Sysmon event ID 1, whenever available, instead of Windows event ID 4688. This provides more information, including the binary hash value of the process.
-
Improved the Abnormal Parent / Child Process and Uncommon Process Anomaly alerts by removing processes belonging to the Stellar Cyber agent to reduce false alarms.
-
Improved the low-volume alert for Data Ingestion Volume Anomaly so that fewer alerts are reported.
-
Improved the Login Time Anomaly alert with tuned hyperparameters to reduce false positives. Changed the fidelity calculation to produce higher quality output.
-
The previous Google Workspace User Suspended alert is split into separate Google Workspace User Suspended and Google Workspace Account Manipulation alerts to reflect different types of user suspensions in Google Workspace.
-
improved the External & Internal Brute-Forced Successful User Login alerts to reduce the total number of alerts per day. We now report only one alert per day for each srcip identified as a brute forcer.
-
Introduced the DCSync Attack alert. This attack uses a legitimate Windows Domain Controller's API to simulate the process that replicates domain credential data from a remote host using a domain account with sufficient replication permissions. This alert identifies rarely seen domain replication events on the Domain Controller as the sign of potential compromise.
-
Enhanced Stellar Cyber alerts by always trying to find and merge an Interflow record with traffic metadata.
-
Improved the SMB Suspicious Copy alert to detect more types of SMB file copy behaviors.
Platform Enhancements
-
Introduced a public API to update properties of a Stellar Cyber incident, including the priority, status, assignee, tags, or description.
-
Enhanced the public API for incident search with a time range.
Sensor Improvements
-
Introduced built-in Sensor Profile templates for different levels of Windows Server Sensor log collection:
-
Windows Detect Profile (Low Volume). The selection covers the minimal events required for native detections in Stellar Cyber.
-
Windows Context Profile (Medium Volume). Adds events commonly used by third-party detection rules.
-
Windows Compliance Profile (High Volume). Covers all Windows events.
-
- Added the Windows PowerShell option under Other Channels in the Windows sensor profile.
-
A Tenable Nessus vulnerability scanner is integrated in the Stellar Cyber modular sensor and can be enabled with a license and Link Key from Tenable. You configure this option in a Modular Sensor profile before applying that profile to a sensor that has been upgraded to 4.3.4.
-
Improved the sensor CLI to allow an unreachable domain in
set cm <domain>
. This lets you configure the sensor in an offline setup environment. -
Removed the Powershell dependency for Windows server sensor installation.
Connector Enhancements
-
Introduced the CYRISMA connector. When configured in the Root tenant, vulnerability data from multiple CYRISMA tenants can be collected and mapped to the matching tenants.
-
Introduced the Isolate an Endpoint response action for the Deep Instinct connector.
-
Enhanced the Azure EventHub connector to support Bastion and Key Vault as content types.
-
Enhanced the Tenable.sc connector with an added option for ingesting Severity 0 logs.
-
For the Cybereason connector, the
primaryRootCauseName
in thecybereason_malops_all_types
content type is mapped differently depending on the value ofcybereason.rootCauseElementType
:-
If the value is
process
, thenprimaryRootCauseName
is set toprocess.name
-
For all other values, including file, then
primaryRootCauseName
is set tofile.name
-
Parser Enhancements
-
Introduced the following new built-in parsers
-
Made the following parser enhancements
Known Issues
-
In the rare case when the Stellar Cyber menu options have been significantly reorganized, it is possible that administrators will need to review settings for their custom user RBAC profiles. For example, any changed path to User Management, Connectors, or Visualize is considered by Stellar Cyber to be a "new feature." So if you have user profiles with Behavior for New Features in Future Releases set to No Access, they will not be able to access these features. Since the menu options were significantly changed in v4.3.0, migrations from older releases to v4.3.x and beyond warrant this review.
-
If you use a Cynet connector to perform a Contain Host or Shutdown Host on a host that is already disabled, shutdown, or otherwise not reachable, Cynet returns a status that the request was successful which is reported in the Stellar Cyber UI. If you are not certain whether an action was successful, you may verify it in the Cynet dashboard.
-
Deleting a Data Sink Import task and then creating a new one with the same dates results in duplicate data for any pre-4.3.1 data requested by the import.
-
To prevent an inconsistent database state, make sure you delete any active Data Sink import or restore tasks before using the Clear Database option in the System | Data Processor | Data Management | Advanced tab.
-
Operators are enabled in pick list menus when they are supported with the selected field or rule. For this reason, use the menu-based queries rather than the Search keyword field with these operators. Examples include contains, does not contain, and is operators. Additional fields / rule support will be added in the future.
-
During upgrade to v4.x and later, the alert type definitions are migrated to a new internal format, but the alert name remains the same in the UI. If the data you are viewing contains alerts generated from prior to the upgrade, be advised that those will be treated as separate from the alerts generated by the new, migrated definition (even though the alert name appears to be the same). Optionally, rename your alerts to more easily identify alerts generated from the old definitions from those created post upgrade.
-
Use the System | Sensors | Manage | Software Upgrade feature to upgrade Windows Server Sensors running 3.7.x and later to 4.3.4. Although you can use the System | Agents | Windows page to download MSI and/or MST files for Windows Server Sensor installations, these files should only be used for fresh installations and reinstallations and not for upgrades.
-
Currently, administrators need to use the Stellar Cyber UI to upgrade existing 4.2.2 Windows agent sensors to version 4.3.4. Download the GPO configuration in UI System | Agents | Windows only for new sensor installation or sensor re-installation.
-
You cannot delete a Data Sink that has an active import or restore in the Data Sink Import or Data Sink Restore tabs. Delete any active import/restore tasks for the data sink, wait at least ten minutes, and then delete the data sink.
-
With improvements made to the table management, some saved columns may not appear and users need to readjust columns.
-
Log Forwarder only collects statistics for up to 100 different log source IPs per Log Forwarder worker. If the total number of log source IPs exceed 100, the additional log source IPs' statistics will be aggregated into a catch-all IP “0.0.0.0”.
-
A modular sensor upgrade will fail when the associated modular sensor profile has the IDS or Sandbox features enabled and the corresponding feature license is not assigned to the sensor. Workaround: Authorize the sensor with an IDS and Sandbox license, or in the modular sensor profile, disable the IDS and the Sandbox features and try to upgrade again.
-
Stellar Cyber recommends using the same CPU and Memory specifications for DL nodes. Variations in specifications across worker nodes can cause Data Lake stability issues.
-
For deployments with HTTP proxy configured for Sensors or Data Processors, note that the vendor APIs Stellar Cyber relies on for the following connectors do not support communication through a proxy: Proofpoint, Cisco Umbrella, VMware Carbon Black, Duo Security, Tenable.io, Prisma Cloud, AWS Cloudtrail, BlueCoat WSS, Proofpoint on Demand and Azure Event Hub.
-
When multiple traffic filters are defined for a tenant with the same combination of IP, port, protocol, and layer 7 rules, the filter may fail to take effect. Administrators should review the defined traffic filters and make sure there are no duplicate definitions.
-
Files may not be assembled by Security Data Sensors for traffic mirrored from physical interfaces on Cisco Nexus 9K models. As a workaround, configure VLAN mirroring on the Cisco switch.
-
If you change the network interface configuration of a sensor’s VM after deployment, the eth0 interface may be remapped to a new interface. If this happens, the management network is disconnected. Contact Technical Support for assistance.
Upgrading
You can only upgrade Stellar Cyber from 4.2.x, 4.3.x, to 4.3.4. You must:
Please refer to the online documentation section Upgrading Software for more detailed instructions.
Preparing for the Upgrade
To prepare for the upgrade:
- Back up the data and configuration
- Make sure the sensors are up and running
- Take note of the ingestion rate
- Take note of the number of alerts
- Make sure the system health indicator shows
- Run the pre-upgrade check
Upgrading the DP to 4.3.4
-
Click Admin | Software Upgrade.
-
Choose 4.3.4.
-
Click Start Upgrade.
Review Alert/Machine Learning Training Time for guidance on training time of updated ML models.
Upgrading Sensors
New features, updated ML algorithms, and enhanced configurations may change ingestion and detection patterns. We recommend the following to ensure a smooth upgrade:
- Upgrade sensors with the Sandbox and IDS features enabled before sensors with the only the Network Traffic feature enabled. Sensors with Network Traffic enabled send data to sensors with Sandbox and IDS enabled for additional processing.
- Upgrade sensors in batches instead of all at once.
- For server sensors (agents):
- Upgrade a small set of sensors that cover non-critical assets.
- After 24 hours, ensure that your ingestion is as expected, then upgrade a larger set.
- After 24 hours, ensure that your ingestion is as expected, then upgrade the remaining server sensors.
Because Windows Server Sensors running 5.1.0 do not support sensor profiles that contain text in Unicode but Windows Server Sensors running 5.1.1 or later do, if you want to use Unicode in your sensor profiles, be sure to upgrade to 5.1.1 or later before downloading any profiles with Unicode to your Windows Server Sensors.
To upgrade Linux or Windows Server Sensors:
If you are upgrading a Windows Server Sensor, complete any pending updates for the host Windows machine before upgrading the Server Sensor.
-
Click System | Sensors. The Data Sensor List appears.
-
Click Software Upgrade in the Manage dropdown. The Data Sensor Software Upgrade page appears.
-
Choose the target software version.
-
Choose the target sensors.
-
Click Submit.
Verifying the Upgrade
To verify that the upgrade was successful:
- Check the Current Software Version on the Admin | Software Upgrade page.
- Make sure the sensors are up and running.
- Check the ingestion rate and make sure it is as expected.
- Check the number of alerts and make sure it is as expected.
- Check the system health indicator:
- indicates a perfectly healthy system.
- indicates minor issues. Monitor the system for 30 minutes. If the issues remain, investigate further.
- indicates major issues. Contact Technical Support.