Stellar Cyber 6.2.0s Release Notes

Software Release Date:
Release Note Updated:

The Stellar Cyber 6.2.0s release advances the Stellar Cyber vision of an autonomous SOC by enhancing speed, clarity, and confidence across detection, automation, and user experience.

The release notes are organized into the following sections:

Highlights

  • Resource Center: Gives you immediate, in-product access to release updates, feature guidance, documentation, training, and Stellar Cyber News, helping you stay informed and learn new capabilities directly within the Stellar Cyber Platform.

  • Adaptive Alert Filters: Expands alert filtering into dynamic, context-aware controls that let you automatically adjust severity, add business-relevant tags, or exclude low-value alerts from case scoring, turning raw detections into prioritized insights that align with real business impact.

  • New Identity-Based Detections: Expands detection logic to focus on user and entity behaviors, improving clarity and precision in detecting identity-related threats.

  • ASN Enrichment: Adds Autonomous System Number metadata for public IP addresses, enriching key fields such as src_ip and dst_ip with the associated number and organization to provide greater context and visibility into external network relationships.

  • Object-Level Access Control: Introduces fine-grained role-based permissions, ensuring users only access specific cases, detections, or assets relevant to their role, enhancing data security and confidence.

  • TCP Reset Response Action: Adds an automated response action for sensors monitoring mirrored traffic to terminate malicious network sessions in real time, improving speed and effectiveness in active threat containment.

  • Arbor Peakflow SP Parser Enhancements: Enhances parsing precision and consistency in Arbor Peakflow SP logs, improving data accuracy and maintaining compatibility with existing integrations.

  • ESET Premium Feed: Seamlessly ingests ESET threat intelligence to enrich detections and hunts in real time, ensuring indicators are instantly recognized and correlated for faster context and higher confidence.

    This feed is supported only when the Threat Intelligence Platform is enabled in your deployment. If you don’t see it in your user interface, contact your Stellar Cyber Customer Success representative to request enablement.

Actions Required

There are no actions required in this release.

Behavior Changes

Changes that affect the way users interact with the product or interpret results are listed below.

  • DATA-2964: Updated the Arbor Peakflow SP parser to extract alert_id values and normalize usage data. The field usage_pct now outputs as the numeric field usage_pct_number, removing the percent sign for easier aggregation in dashboards and queries. The msg_origin.category value changed from other to traffic for consistent classification with other network telemetry. These updates improve parsing for additional message variants and cause usage_pct to appear as numeric data and include new alert_id fields in Arbor Peakflow SP logs, which can affect saved filters or visualizations that previously used text values.

  • DATA-2957: Updated the Cynet (CEF) parser to correct field mappings and restore consistent classification. The parser no longer uses cynet_360 as the values for dev_type, dev_class, msg_origin.source, and msg_class. The dev_type and msg_origin.source fields now revert to cynet, while dev_class and msg_class values are determined dynamically by the cef.name field. This change ensures Cynet 360 logs normalize to the expected schema and that detections referencing cynet_alert match as intended. Parsed Cynet event data now displays cynet instead of cynet_360, which can affect filters, queries, or custom content based on the previous field values.

  • DATA-2936: Updated the NEC Indoor Unit parser to change how 419-character payloads are parsed. When a log payload contains 419 characters—419 characters being the fixed-width message format used by certain NEC IDU logs—the former event_detail field is no longer used. Instead, its components—event_type, slot, description, and result—are now parsed as separate fields according to their defined widths. Payloads of other lengths continue to use the previous parsing logic. This change improves field accuracy and visibility in event views, allowing queries and dashboards to filter or group by these individual values rather than a single aggregated event_detail field.

Deprecated Features

The third party alert integration for CrowdStrike based on DetectionSummaryEvent will be deprecated. Crowdstrike has deprecated DetectionSummaryEvent and replaced it with EppDetectionSummary. A new alert integration based on EppDetectionSummary will be in a future release.

Detection/ML

New Features

Improvements

Usability

New Features

Improvements

Stellar Cyber Platform

New Features

Improvements

Sensors

New Features

Improvements

Connectors

New Features

Improvements

Parsers

New Features

Improvements

Early Access Program

If you're interested in testing out new features ahead of general availability, consider joining the Early Access Program (EAP) by contacting your Stellar Cyber Customer Success representative and telling them which EAP feature you want to test. Once you've agreed to the EAP terms and signed up, the EAP feature is unlocked for you.

The purpose of this program is to boost performance and reliability through real-world customer insights, giving you a hands-on role in shaping a Stellar Cyber feature. In return, you'll receive early access to upcoming releases and the chance to guide product development.

The following are the EAP features available in this release:

Automated Triage of Phishing Email

The automated triage of suspected phishing email is available for SaaS deployments only. It classifies user-reported email messages through built-in threat intelligence, optional external threat intelligence, and AI-powered analysis. This feature provides an automated triage agent that analyzes reported emails, offering detailed analysis and AI-generated insights. As a result of automated processing, Stellar Cyber reduces manual workloads, enables faster response times, and ensures consistent, transparent alerting in the UI.

AI Case Analysis & Summary

This release includes AI-generated narratives within the Case Detail view to accelerate investigations. New AI-generated sections automatically summarize alerts into a case-level story, reconstruct timelines, explain relationships between entities, and provide tailored response recommendations. Analysts gain faster context and clearer next steps without manually stitching alerts together.

XDR Connect Webhook Ingestion

This is a simple webhook framework that lets you post JSON data directly from any external system into Stellar Cyber, accelerating custom integrations and expanding your visibility across the entire security stack.

Resolved Issues

Upgrading Sensors

You can upgrade Stellar Cyber Sensors from 6.0.0 or later to 6.2.0. You must:

  • Prepare for the upgrade

  • Upgrade the sensors

  • Verify the upgrade

Prepare for the Upgrade

To prepare for the upgrade:

  • Make sure the sensors are up and running
  • Take note of the ingestion rate for the sensors to be upgraded in the Sensor Details page
  • Make sure the system health indicators in the Sensor Details page all show green.

Upgrade the Sensors

New features, updated ML algorithms, and enhanced configurations may change ingestion and detection patterns. We recommend the following to ensure a smooth upgrade:

  • Upgrade sensors with the Sandbox and IDS features enabled before sensors with the only the Network Traffic feature enabled. Sensors with Network Traffic enabled send data to sensors with Sandbox and IDS enabled for additional processing.
  • Upgrade sensors in batches instead of all at once.
  • For server sensors (agents):
    • Upgrade a small set of sensors that cover non-critical assets.
    • After 24 hours, ensure that your ingestion is as expected, then upgrade a larger set.
    • After 24 hours, ensure that your ingestion is as expected, then upgrade the remaining server sensors.

CentOS 7.1 Prerequisite – Update curl to 7.29.0-59.el7_9.2 or Higher

Before upgrading any Linux Server Sensors running in CentOS 7.1, you must check your curl version and update it to 7.29.0-59.el7_9.2 or higher to use the strong encryption required by the Stellar Cyber Platform.

  1. Check your curl version as shown below:

    yum list installed curl

    \* Loaded plugins: fastestmirror Loading mirror speeds from cached hostfile Installed Packages curl.x86_64 7.29.0-19.el7

  2. If the listed version is lower than 7.29.0-59.el7_9.2 (as it is in the example above), use the following commands to update the curl package:

    yum makecache

    yum install curl

  3. If installation of the curl package fails, it is most likely because CentOS is trying to use a repo that has reached its end of life. Try updating the base URL and then reinstall curl. The following sed command makes the necessary changes for most environments to ensure that the updated curl package can be installed:

    sudo sed -i.bak -e 's|^mirrorlist=|#mirrorlist=|' -e 's|^#baseurl=http://mirror.centos.org/centos/\$releasever|baseurl=http://archive.kernel.org/centos-vault/7.9.2009|' /etc/yum.repos.d/CentOS-Base.repo

To upgrade sensors:

You can upgrade a sensor to the most recent release from the two previous releases. This means that you can upgrade a sensor to the 6.2.0 release from any 6.0.x or 6.1.x release.

If you are upgrading a Windows Server Sensor, complete any pending updates for the host Windows machine before upgrading the Server Sensor.

  1. Select System | DATA SOURCE MANAGEMENT | Sensors | Sensors.

    The Sensor List appears.

  2. Select Manage | Software Upgrade.

    The Sensor Software Upgrade page appears.

  3. Choose the target software version.

  4. Choose the target sensors.

  5. Select Submit.

Verify the Upgrade

To verify that the upgrade was successful:

  • Check the Software Version in the Sensor List.
  • Check the Sensor Status LED in the Sensor List.
  • Check the ingestion rate in the Sensor Details page for upgraded sensors and make sure it is as expected.