Stellar Cyber 6.5.0s Release Notes

Software Release Date:
Release Note Updated:

The Stellar Cyber 6.5.0s release delivers the following updates to the Stellar Cyber Open XDR platform.

The release notes are organized into the following sections:

Highlights

Early Access Program Features

  • Stellar Cyber MCP Server: Added an MCP server to connect AI clients to the Stellar Cyber Platform through the Model Context Protocol (MCP) to retrieve case and alert data, review investigation context, perform tenant-aware operations, and update selected case fields.

  • Parser Studio: Added Parser Studio to create and manage custom log parsers for data ingestion by cloning existing parsers, testing parser behavior before deployment, and activating parsers for production log ingestion.

Detections/Machine Learning

  • Successful Login After Brute Force: Added a detection for successful login activity from a new or previously unseen IP address shortly after brute-force login attempts targeting the same user account from different IP addresses, helping identify distributed or rotating-IP brute-force attacks.

  • Suspicious AWS Configuration: Added built-in detection coverage for AWS Config events so configuration changes and compliance evaluation events can generate alerts and correlate with other AWS telemetry.

  • Location-Based Detection Fidelity Scoring: Improved fidelity scoring for location-based detections by refining how new location, ASN, and user agent changes affect alert accuracy, helping reduce false positives and improve triage for User Login Location Anomaly and Impossible Travel Anomaly.

System

  • ATH Rules Import/Export: Added ATH rule import and export functionality so you can move rules between environments, include referenced queries and lookups, validate dependencies before import, and resolve naming conflicts with skip, overwrite, or rename options.

  • Query Execution Management: Enhanced ATH playbook status views with a Last Scheduled Run section that shows the most recent scheduled run attempt, including details about the input status, condition status, and action status.

Usability

  • Dashboard Landing Page: Added a dashboard landing page called Dashboard Hub to centralize access to existing dashboards and charts so you can browse, open, and edit them from one place based on your current permissions.

  • Alert Filters for a Fixed Period of Time: Added expiration settings for alert filters so you can apply filter actions temporarily during maintenance windows, planned changes, or other short-term events and have them deactivate automatically when the specified time period ends.

Integrations

  • New Integrations: Expanded third-party integration coverage across network security, cloud and SaaS security, cyber asset and exposure monitoring, and XDR response platforms to improve data ingestion, broaden security visibility, and support more coordinated detection and response workflows.

Actions Required

There are no actions required in this release.

Behavior Changes

Changes that affect the way users interact with the product or interpret results are listed below.

  • AELDEV-67120: Updated the login flow to avoid revealing whether a user exists before authentication completes. Failed login attempts now return the same result whether the username, password, or both are incorrect. All login flows also display the Continue with SSO button, and the tenant-specific logo that previously appeared after a user entered an email address now only appears after login. These changes help prevent attackers from using the login flow to identify valid accounts.

  • DATA-3291: Updated the Trend Micro Interscan Messaging parser to use port 5684 instead of port 5678. Deployments that previously sent logs to port 5678 must be updated to send traffic on port 5684, including any related firewall policy changes. Logs that continue to arrive on port 5678 will no longer be ingested by the Trend Micro Interscan Messaging parser.

Deprecated Features

  • Office 365 Reporting Web Service connector – Microsoft deprecated the Reporting Web Service for message trace collection on April 8, 2026. Stellar Cyber provides the Microsoft Graph Message Trace connector as the replacement for message trace collection. Migrate existing Reporting Web Service configurations to the new connector.

  • Netskope Connector (API V1) – API V1 support was removed from the Netskope connector. API V2 is now the default option.

Detection/ML

New Features

Improvements

Stellar Cyber Platform

New Features

Improvements

Sensors

New Features

Improvements

Connectors

New Features

Improvements

Parsers

New Features

Improvements

Usability

New Features

Improvements

Early Access Program

If you're interested in testing out new features ahead of general availability, consider joining the Early Access Program (EAP) by contacting your Stellar Cyber Customer Success representative and telling them which EAP feature you want to test. Once you've agreed to the EAP terms and signed up, the EAP feature is unlocked for you.

The purpose of this program is to boost performance and reliability through real-world customer insights, giving you a hands-on role in shaping a Stellar Cyber feature. In return, you'll receive early access to upcoming releases and the chance to guide product development.

The following EAP features are in this release:

MCP Server

The Stellar Cyber MCP Server connects supported AI clients to the Stellar Cyber Platform through the Model Context Protocol (MCP). The MCP server lets AI clients retrieve case and alert data, review investigation context, perform tenant-aware operations, and update selected case fields. This capability helps teams extend AI-assisted investigations by giving approved clients structured access to operational security data and workflows.

Parser Studio

Parser Studio lets you create and manage custom log parsers for data ingestion by cloning existing parsers, testing parser behavior before deployment, and activating parsers for production use. This capability helps you accelerate onboarding of custom log sources while reducing parser development effort and improving validation before live ingestion.

XDR Connector Webhook Ingestion

This is a simple webhook framework that lets you post JSON data directly from any external system into Stellar Cyber, accelerating custom integrations and expanding your visibility across the entire security stack. The XDR Connector is in Public Preview in this release.

Customizable Case Correlation Strategies

This EAP feature introduces support for multiple case correlation strategies, allowing teams to evaluate and experiment with different approaches to grouping alerts into cases. Each strategy provides a distinct investigative perspective:

  • Attacker-Centric Correlation groups alerts by the source (attacker) host, making it easier to track adversary behavior across multiple targets.

  • Victim-Centric Correlation organizes alerts by the destination (victim) host, enabling focused protection and visibility on high-value assets.

  • Multi-Entity Correlation links alerts across interconnected hosts and actions to form a single case, offering a holistic view of extended or lateral attack campaigns.

This flexibility enables security teams to tailor investigations based on their operational priorities—whether that’s identifying persistently targeted endpoints, tracing threat actor movements, or capturing full-scale intrusion campaigns.

Alert for Suspicious OCI Tenant-to-Tenant Communication

This EAP feature introduces a new alert type that detects cross-tenancy communications in the Oracle Cloud Infrastructure (OCI). By analyzing tenantId fields in audit logs, the feature identifies requests that target resources in a different tenancy. This provides accurate visibility into potentially unauthorized cross-tenancy activity and strengthens oversight in OCI environments.

To join the Early Access Program and begin testing these features, contact your Stellar Cyber Customer Success representative.

Resolved Issues

The following issues have been resolved in this release.

Upgrading Sensors

Depending on the type of server sensor, you can upgrade your sensors directly to version 6.5.0 from these previous versions:

  • Linux Server Sensors: 6.3.0 or 6.4.0

  • Windows Server Sensors: 5.1.0 through 6.4.0

Upgrade the sensors to version 6.5.0 using the following process:

  1. Prepare for the upgrade.

  2. Upgrade the sensors.

  3. Verify the upgrade.

Prepare for the Upgrade

To prepare for the upgrade:

  • Make sure the sensors are up and running
  • Take note of the ingestion rate for the sensors to be upgraded in the Sensor Details page
  • Make sure the system health indicators in the Sensor Details page all show green.

Upgrade the Sensors

New features, updated ML algorithms, and enhanced configurations may change ingestion and detection patterns. We recommend the following to ensure a smooth upgrade:

  • Upgrade sensors with the Sandbox and IDS features enabled before sensors with the only the Network Traffic feature enabled. Sensors with Network Traffic enabled send data to sensors with Sandbox and IDS enabled for additional processing.
  • Upgrade sensors in batches instead of all at once.
  • For server sensors (agents):
    • Upgrade a small set of sensors that cover non-critical assets.
    • After 24 hours, ensure that your ingestion is as expected, then upgrade a larger set.
    • After 24 hours, ensure that your ingestion is as expected, then upgrade the remaining server sensors.

CentOS 7.1 Prerequisite – Update curl to 7.29.0-59.el7_9.2 or Higher

Before upgrading any Linux Server Sensors running in CentOS 7.1, you must check your curl version and update it to 7.29.0-59.el7_9.2 or higher to use the strong encryption required by the Stellar Cyber Platform.

  1. Check your curl version as shown below:

    yum list installed curl

    \* Loaded plugins: fastestmirror Loading mirror speeds from cached hostfile Installed Packages curl.x86_64 7.29.0-19.el7

  2. If the listed version is lower than 7.29.0-59.el7_9.2 (as it is in the example above), use the following commands to update the curl package:

    yum makecache

    yum install curl

  3. If installation of the curl package fails, it is most likely because CentOS is trying to use a repo that has reached its end of life. Try updating the base URL and then reinstall curl. The following sed command makes the necessary changes for most environments to ensure that the updated curl package can be installed:

    sudo sed -i.bak -e 's|^mirrorlist=|#mirrorlist=|' -e 's|^#baseurl=http://mirror.centos.org/centos/\$releasever|baseurl=http://archive.kernel.org/centos-vault/7.9.2009|' /etc/yum.repos.d/CentOS-Base.repo

To upgrade sensors:

You can upgrade a sensor to the most recent release from the two previous releases. This means that you can upgrade a sensor to the 6.5.0 release from any 6.3.x or 6.4.x release.

If you are upgrading a Windows Server Sensor, complete any pending updates for the host Windows machine before upgrading the Server Sensor.

  1. Select System | DATA SOURCE MANAGEMENT | Sensors | Sensors.

    The Sensor List appears.

  2. Select Manage | Software Upgrade.

    The Sensor Software Upgrade page appears.

  3. Choose the target software version.

  4. Choose the target sensors.

  5. Select Submit.

Verify the Upgrade

To verify that the upgrade was successful:

  • Check the Software Version in the Sensor List.
  • Check the Sensor Status LED in the Sensor List.
  • Check the ingestion rate in the Sensor Details page for upgraded sensors and make sure it is as expected.