Stellar Cyber 5.4.0s Release Notes
Software Release Date: January 28, 2025
Release Note Updated: April 18, 2025
The Stellar Cyber 5.4.0
The release notes are organized into the following sections:
Highlights
-
Reporting and Insights: Stellar Cyber introduces a new reporting engine that enables you to create beautiful PDF reports out-of-the-box and a new scheduler that allows more granular control over report delivery.
-
Expanded Threat Intelligence and Indicators of Compromise (IoCs): Deepen your coverage with fresh support for file hashes, revealing even more insights into known malicious activities.
-
Unified Silent Mode: Rule Based Detections, machine learning (ML) Detections, and Third Party Integrations now share a consistent silent mode experience, letting you refine strategies without the alert noise.
-
Enriched Email and Cloud Observables: Gain a clearer picture of threat narratives with intuitive visualizations and improved email and cloud data correlation.
-
Smarter Domain Controller Correlation: Focus on real offenders rather than routine authentication events. Case correlation logic has been refined to ensure that domain controllers appear only when they're relevant.
-
Network-Based Windows Attack Detection: Strengthen your defense without using a Windows Server Sensor. SMB traffic analysis now uncovers suspicious behavior independently.
-
Location History Retention and Account Creation Alerts: Track unusual user movements and sudden account spikes to catch emerging risks before they escalate.
-
New Log Forwarding Use Cases: Enable lightweight log forwarding from workstation-class Windows operating systems to support small-footprint deployments using syslog forwarding on Windows Server Sensors.
-
Alert Filters for Tenant Groups: Create filters to exclude alerts and apply alert filters to one or more tenant groups in bulk from the root level or to multiple tenants in bulk from the root and partner levels.
-
System Action Center Alerts: Added support for sending individual System Action Center notifications for each matching event instead of consolidated summaries.
-
Connectors: Added the following new connectors: FortiEDR, Juniper Mist, WithSecure Elements, Abnormal Security Email Security, Versa Networks Concerto, AWS Inspector, Trend Micro Email Security, NetFoundry, Fortra Frontline, and Google Cloud Security Command Center.
Actions Required
-
When using correlations that rely on the time boundary feature, switch to the time range configuration on each query, which runs more efficiently.
-
To support processes introduced in 5.4.0 that let Stellar Cyber enable or disable features and fixes already included in the platform, ensure that the web browsers of all Stellar Cyber users can make HTTPS connections to the following domains:
From Stellar Cyber users' web browsers
-
https://clientsdk-ld.stellarcyber.ai
-
https://clientstream-ld.stellarcyber.ai
-
https://events-ld.stellarcyber.ai
Without access to these URLs, your Stellar Cyber Platform still functions, but features and fixes cannot be enabled or disabled, and Early Access Program features will not be available.
-
-
Update any configurations with field changes noted in the Behavior Changes section.
Behavior Changes
Changes that affect the way users interact with the product or interpret results are listed below.
-
The correlation logic that determines how domain controllers show up in cases has been refined. In cases where a domain controller is just doing routine authentication, it’s no longer highlighted as the center of the threat narrative. Instead, the focus is on the systems and accounts genuinely involved in suspicious activity. This results in fewer false leads, better grouping, and more accurate scoring.
-
When using the Palo Alto Networks Firewall parser, note that the
threatid
field was split intopalo_alto_networks.threat_id
andpalo_alto_networks.threat_name
. -
The CyberArk PTA (CEF) parser now parses the
Value
andOld Value
fields frommsg
and stores them in the vendor namespace. -
When using the Zscaler - NSSWeblog (CEF) parser, note that the
suser
field was renamed tosrcip_username
, and invalid values forsrc
anddstip
are now stored in the vendor namespace. -
The McAfee ePolicy Orchetrator parser now normalizes the
Username
field touser.name
. -
The Avanan (HTTP JSON) parser now normalizes the
event.entity.entity_payload.internet_message_id
field toemail.message_id
. -
When parsing Incapsula SIEM Integration (CEF) logs, note that the
rule_info
field was relocated to the vendor namespace. -
The Hewlett Packard UNIX parser redirects invalid
srcip
anddstip
field values to a vendor-specific namespace instead of keeping them in thesrcip
anddstip
fields. -
The Created At filter in the Cases page now defaults to show cases from the last 24 hours. You can set a different range manually, if required.
-
Creating a Security Event Filter using a post to the
connect/api/v1/security_event_filters
public API endpoint now requires you to include a newtenants
parameter, as described in the SecurityEventFilterFormData schema in the public API reference.
Deprecated Features
The following feature has been deprecated in this release.
-
The use of an extended time boundary in correlated queries was deprecated in 5.4.0 because it is no longer needed. It was replaced by time ranges for each correlated query.
Detection/ML
New Features
-
AELDEV-49249: Enhanced support for email alerts in Case Management.
Improved the graphic representation of email alerts in Case Management. This enhancement introduces a new email observable icon and offers a more detailed view of an email alert in the case analysis graph, thus enabling more comprehensive management of alerts from integrated email security products, such as Mimecast and Proofpoint, and better tracking and organization of email-related security alerts.
-
AELDEV-49245: Extended support of cloud observables.
Extended Case Management support to include cloud-based case correlation from alerts originated from AWS GuardDuty, AWS CloudTrail, and Azure Activity Log, in addition to the alerts from Microsoft Defender for Cloud, which was supported in 5.3.0. This enhancement also introduced a new category of cloud observables called Firewall, broadening the scope of cloud observables. These updates provide more comprehensive analysis and management of cloud-based security events.
-
AELDEV-49243: Added Sigma rule-based alert types for ICMP and SMB sensor traffic data.
Added Sigma rules to detect anomalous traffic patterns in ICMP and SMB traffic data captured by Stellar Cyber's Modular Sensors (and by previously released Security Sensors and Network Sensors). Stellar Cyber now detects ICMP exfiltration attempts and many other Windows lateral movement attempts carried over plaintext SMB protocols (SMB, SMB2, and SMB 3.0 without multichannel). By leveraging the network traffic captured by Stellar Cyber device sensors, these traffic-enhanced Sigma rules add extra detection coverage when a Windows Server Sensor is not installed.
-
AELDEV-49238: Added alert integration to the Abnormal Security Email Security connector.
Added alert integration to the Abnormal Security Email Security connector to ingest alerts and map them to the Stellar Cyber Platform. Select the Threats content type in the connector to integrate and enrich alerts.
-
AELDEV-48948: Added new data sources to the Detection Management System.
Added several new data sources and their accompanying icons to the Detection Management System: Aviatrix Firewall, SOLIDServer, Hisun Global E-banking, Imperva Incapsula, Clavister NetWall, and VMware NSX Edge Firewall.
-
AELDEV-46687: Implemented a unified Silent Mode option for all detection types.
Introduced a unified Silent Mode across Rule Based Detections, ML Detections, and 3rd Party Integrations, enabling consistent rule tuning by monitoring detection hits without generating alerts, optimizing threat detection strategies while reducing unnecessary noise, and refining your threat detection strategy before fully activating new rules.
-
AELDEV-44846: Introduced the Account Creation Anomaly alert type for the detection of anomalous spikes in user account creation.
Introduced the Account Creation Anomaly alert type to identify unusual spikes in user account creation, specifically targeting environments such as Microsoft Entra ID (formerly Azure Active Directory), Windows, Google Workspace, and Amazon Web Services (AWS). This alert type triggers on potentially suspicious activities such as the rapid creation of numerous user accounts within a short timeframe, which might indicate compromised systems.
-
AELDEV-43693: Added alert use cases for Imperva Incapsula log sources.
Added alert use cases for Imperva Incapsula log sources, enabling detection of Web Application Firewall (WAF) rule violations. Normalization functions were enhanced to map Imperva security events into the detection framework using fields such as
event.sig_id
andevent.reason
. This improvement allows existing WAF detections such as WAF Rule Violation Anomaly and WAF Internal Attacker Anomaly to identify suspicious activity in Imperva Incapsula logs. The implementation supports efficient anomaly detection without modifications to the existing machine learning models. -
AELDEV-41478: Added file hash ingestion support to Threat Intelligence feeds.
Added support for file hash ingestion to all applicable Threat Intelligence (TI) feeds. This update includes coverage for built-in feeds that supply file hash Indicators of Compromise (IoCs), the emerging threat feed, and customized feeds enabling file hash IoC ingestion. Direct file hash IoC imports are also supported (MD5, SHA1, and SHA256).
Improvements
-
AELDEV-52736: Updated queries for azure_18, process_creation_image_26, and windows_security_166 rules.
Updated the query for azure_18, process_creation_image_26, and windows_security_166 rules to reduce false positives.
-
AELDEV-52367: Renamed the alert type and updated the severity of rule azure_34.
Modified the rule azure_34 so it's now an alert type named Password Reset By User Account. It had been included in Microsoft Entra Changes to Privileged Account, which was misleading because this rule could be triggered when a user reset their password in Microsoft Entra ID (without knowing if it was a privileged account or not). The severity changed from 50 to 30.
-
AELDEV-51178: Updated user field handling in Windows event alerts.
Modified the processing of Windows event alerts so that the user field is retained without modification, as it is defined as an object in the metadata. The previous approach of renaming this field to
wineventlog_user
to avoid conflicts is being phased out. However, to support existing dependencies, user data into thewineventlog_user
field is duplicated if the user field is an object. This ensures that integrations relying onwineventlog_user
remain functional. -
AELDEV-49565: Improved host enrichment in SentinelOne activities for more accurate correlation.
Enhanced the enrichment process for
sentinelone_activities
alerts by aligningcomputer_name
andhost.name
withsentinelone.data.computerName
. This ensures improved correlation of host identifiers across different SentinelOne message classes, such assentinelone_threat_detection
. -
AELDEV-49242: Enhanced case correlation for domain controllers.
Improved the case correlation logic for login-related alerts involving domain controllers. Stellar Cyber now distinguishes when a domain controller is merely an authenticator and avoids correlating it as a central entity, reducing noisy cases and preventing inflated case scores. The improved logic applies to Windows events 4624, 4625, 4768, 4769, 4771, and 4776.
-
AELDEV-49068: Expanded the Google Workspace alert integration.
Expanded the Google Workspace alert integration to include these additional alert types: Gmail phishing, Google identity, User Changes, Access Approvals, Domain-wide takeout, State sponsored Attack, Mobile device management, Security Center rules, Data Loss Prevention, Apps outage, Sensitive Admin Action, Customer abuse, Reporting Rule, Chrome, and Google Mandatory.
-
AELDEV-48174: Improved srcip_username normalization for Windows events.
Enhanced normalization processes for
srcip_username
andsrcip_usersid
in Windows events (ID 4624, 4625, 4768, 4771, and 4776). Enrichment logic now excludes enrichment when normalization is absent. Adjustments include shifting enrichment for 4768 and 4771 toTargetSid
instead ofTargetUserSid
and adding normalization for unhandled event IDs. Normalization for approximately 57 new event types were added, resolving existing defects related to incomplete or incorrectsrcip_username
displays. Changes were implemented to ensure consistent and accurate data handling across supported Windows event logs. -
AELDEV-46487: Enhanced normalization of Azure Activity Logs for cloud observables.
Enhanced normalization of the Azure Activity Log to facilitate the correlation of cloud observables. The update ensures that the
resourceType.value
from Azure data is applied tocloud.resource.type
, improving consistency with Microsoft Defender data. A classification process was implemented to categorize unrecognized cloud resource types. This refinement supports clearer UI representation and enriching observables for seamless case management. Adjustments include handling Azure Log data fields to align with use cases and backend processing requirements. -
AELDEV-46485: Enhanced AWS CloudTrail normalization for cloud observables.
Improved the normalization process for Amazon Web Services (AWS) CloudTrail logs by standardizing cloud observables in line with GuardDuty classifications. The update ensures that
cloud.resource
fields are correctly mapped to recognized types such asS3Bucket
. Unrecognized types default tomiscellaneous
, and when multiple resources exist, prioritization is based on scope, identified by the shortest ARN. This release also assures consistency across related log collectors handling CloudTrail data, reinforcing the reliability of cloud events tracking. -
AELDEV-46405: Improved AWS GuardDuty normalization for cloud observables.
Enhanced Amazon Web Services (AWS) GuardDuty normalization to support the case correlation of various cloud observables. The update covers multiple resource types, ensuring proper identification through resource-specific fields like Instance ID, Access Key ID, and ARNs where applicable. To improve overall observability and incident tracking capabilities, these improvements facilitate better precision in handling findings related to instances, access keys, S3 buckets, containers, and more within the GuardDuty ecosystem.
-
AELDEV-45803: Enhanced asset counting to include public IP addresses marked as internal.
Updated the entity-based licensing feature to count public IP addresses designated as private IP addresses in the Data Enrichments page as assets for licensing purposes. This adjustment ensures that public IP addresses designated as private in System | Data Enrichment are counted as assets in the entity-based licensing model, improving the accuracy of the asset count.
-
AELDEV-40693: Updated the User Login Location Anomaly alert type to add location history retention.
Added a location history retention mechanism to the User Login Location Anomaly alert type, ensuring that historical location data is periodically reviewed and outdated locations are removed. Additionally, locations that are very common across a tenant can now be used to suppress alerts. This update helps reduce data noise, improves detection accuracy, and ensures that only relevant location data is retained, enhancing overall system performance and monitoring efficiency for user login behaviors.
-
AELDEV-40296: Updated the Emerging Threat alert type to add reputation.
Updated the Emerging Threat alert type to include reputation and reputation source details within the key fields. These changes help in quickly identifying and understanding potential threats.
-
AELDEV-37420: Introduced coverage of Kerberos TGS requests to the User Asset Access Anomaly alert type.
Restructured the User Asset Access Anomaly Detection to monitor Kerberos Ticket Granting Service (TGS) requests, focusing on unusual user-asset relations. By leveraging ML and graph models for improved accuracy, this new alert subtype identifies anomalies when a user accesses an unfamiliar asset. It provides detailed alerts with information about the user, asset, and potential anomalies, enhancing threat detection in Windows environments.
Usability
New Features
-
AELDEV-47806: Added a grouping feature to the correlation query builder.
Added functionality to the correlation query builder to group the results of queries. The grouping parameters include calculation type, field to calculate on, size, and threshold condition so you can organize data into meaningful, logical groups based on shared values in a specific field. This makes it easier to uncover patterns, spot anomalies, and perform investigations.
-
AELDEV-46897: Added support for sending individual System Action Center notifications.
Added the ability for System Action Center rules to send either consolidated notifications (existing behavior), grouping all triggered instances for a given rule in the same time interval into a single message, or send individual notifications for each separate event. Sending individual notifications can aid in integration with downstream systems that cannot handle batched notifications.
-
AELDEV-46352: Enhanced the public API to assign connectors to a DA Profile.
Enhanced the public API for connector creation to include a parameter that automates the assignment of connectors to a specific Data Analyzer (DA) Profile. This enhancement addresses the need for clients managing multiple DA clusters to automate the process that previously required manual assignment through the UI. Using the new parameter, the assignment process can be controlled programmatically, streamlining workflow integration and reducing manual intervention in setting DA Profile associations through the API.
Improvements
-
AELDEV-51159: Added rate-limiting to password reset functionality.
Enhanced password reset functionality with rate limiting. You can now change your password a maximum of three times within a 24-hour period. Additionally, password reset email requests are limited to three per hour. These limits persist across system upgrades and restarts, ensuring consistent application of the restrictions within any operational environment.
-
AELDEV-51112: Updated the remote CLI terminal to support copy-and-paste functionality.
Updated the remote CLI terminal to support copy-and-paste operations. You can now paste text directly into the terminal using standard keyboard shortcuts like
Ctrl+V
. This enhancement simplifies inputting long strings or tokens, improving the efficiency and usability for system administrators and operators working with the remote CLI environment. -
AELDEV-48797: Implemented a duration display for Interflow metric calculations.
Added a display of the duration information in the Average Packet Bytes Input and Average Metadata Output metrics to the System Health Check feature. Previously, you couldn't determine the time period these averages represented but now you can easily understand that these are hourly metrics, ensuring better clarity on data interpretation and operational insights.
-
AELDEV-36981: Added a time zone selection for scheduled reports and log exports.
Added the ability to select the original time zone of the log source for scheduled reports and log exports, addressing the needs of users in different time zones. Users can configure reports to display timestamps (write time, timestamp, alert time) according to the end user's local time zone. This update is applicable to both legacy and newly updated reports, ensuring time zone accuracy for Managed Security Service Providers (MSSPs) and their customers.
Stellar Cyber Platform
New Features
-
AELDEV-48843: Implemented editable report names.
Made the report name field editable in the user interface. Duplicate names are checked to ensure uniqueness. This update streamlines report management by providing a more flexible user editing experience.
-
AELDEV-46835: Added a warning for logs with incorrect timestamps.
Added a flag for logs with timestamps significantly behind or ahead by adding fields to indicate a timestamp mismatch. This enhancement allows for real-time detection via dashboards or automated alerts when the timestamp of a log deviates by over an hour from the current time. The fields
tz_offset_records_delta
andtz_offset_records_total
in messagetype 32
capture these discrepancies. This update aids in preventing missed detections due to incorrect time settings from sensor timezone differences. -
AELDEV-46481: Added tenant ingestion readiness as an indicator in the onboarding workflow.
Enhanced the tenant onboarding workflow by providing an indication of ingestion readiness. The tenant table shows the status in the new tenant message column to indicate if the system is ready for ingestion. This update ensures that you have clear visibility of the ingestion states of your tenants for more efficient management and operational planning.
-
AELDEV-44964: Added support for zstd compression to data sinks.
Added support for Zstandard (zstd) compression to S3 , General S3 , and OCI data sinks, complementing the existing support for gzip. This update offers improved decompression speeds and potentially reduced file sizes. This feature is not enabled by default and is not user-configurable; it requires manual activation by Stellar Cyber Customer Success. Contact the Customer Success team if you are interested in enabling this feature.
Improvements
-
AELDEV-52651: Resolved delays to rule execution due to resource limits.
Addressed an issue causing accumulated delays in the execution of scheduled rules. The problem stemmed from resource constraints in the environment affecting both user-defined and migrated rules. Adjustments were made to better handle scheduling under limited resource conditions. Alerts now trigger more reliably without extensive delays, ensuring timely detection and response.
-
AELDEV-51582: Enhanced fault tolerance for SaaS data node downtime.
Increased fault tolerance to maintain data ingestion even if a data node goes offline. The improvement ensures that SaaS deployments can handle node failures similarly to on-premises deployments, where ingestion is minimally impacted by node outages.
-
AELDEV-51436: Enabled JA3-related IDS rules in default sensor profiles.
Updated sensor profiles to activate the JA3-based rules for coinminers, exploit kits, phishing, adware, and potentially unwanted programs by default. JA3 uses the attributes of a TLS handshake to generate a unique client fingerprint. IDS rules then leverage the JA3 fingerprint to detect threats based on characteristic behaviors of malicious tools, even when communications are encrypted.
-
AELDEV-49729: Deprecated the extended time boundary feature.
Deprecated the extended time boundary feature because it is no longer needed; Stellar Cyber now supports exact time ranges for each correlated query. If you have correlations that rely on the time boundary feature, switch to a time-range configuration on each query.
-
AELDEV-49692: Added the ability to disable private IP Geo enrichment.
Added the option to disable private IP Geo enrichment. When you disable this, the enrichment of IP Geo information for private IP addresses does not occur. Disabling Geo enrichment of private IP addresses can reduce redundant data and unnecessary information storage.
-
AELDEV-48176: Added annotation field for srcip_username enrichment.
Added a new annotation field to indicate if the
srcip_username
is enriched. The update ensures accurate identification of the origin ofsrcip_username
. The annotation marks data asenriched
when appropriate, supporting more informed decision-making regarding the reliability of the data. This update applies to all<ip-type>_username
fields, enhancing consistency across various IP types. -
AELDEV-48175: Enhanced IPv6 link-local address handling in the enrichment pipeline.
Improved the username enrichment logic to better support IPv6 link-local addresses. This update ensures that such addresses are properly normalized to the
srcip
field when processing login events. Previously, only certain IPv4 addresses and IPv6 public addresses were handled, but now IPv6 link-local addresses likefe80::xxxx
are also included in the enrichment process. This enhancement aids in the accurate enrichment and correlation of login events, particularly for Windows login events with specific event IDs, ensuring better logging and analysis of authentication activity across systems. -
AELDEV-44783: Added tenant group exclusions for alert filters.
Implemented a feature that lets you define alert filters based on tenant groups, enhancing manageability for large Managed Security Service Providers (MSSPs). Previously, you had to specify tenants individually, leading to cumbersome conditions for alert exclusions. The update introduces new fields to the alert object, supporting both multiple tenants and tenant groups for a single filter. This facilitates efficient alert management by addressing scalability issues associated with larger client portfolios.
-
AELDEV-44484: Implemented on-premises license server and provision client integration.
Implemented the on-premises license server to serve as the authoritative source for license-related information. It integrates with a feature management tool to create environments if absent and provides an API for interaction with the provision client. The provision client refreshes feature-related components as needed for both new installations and upgrades. These enhancements cater to both on-premises (pre-SaaS) and dark-site/air-gapped deployments.
-
AELDEV-36207: Enhanced certificate validation for domain mismatches.
Implemented additional checks to validate domain names against certificate components to prevent potential issues from domain name mismatches. This enhancement ensures certificates are properly vetted, minimizing the risk of misconfiguration that can lead to component operation failures.
-
AELDEV-33882: Updated license compliance logic to rely on average usage.
Revised the license compliance logic to use average daily usage measurements instead of consecutive ones. The new logic tracks average usage over the past three and seven days for warnings and violations respectively. This update helps prevent short-term fluctuations from affecting license compliance states.
Sensors
New Features
-
AELDEV-48578: Removed the OS restriction for Windows installer on Windows Server Sensors.
Removed installation restrictions for the Windows Server Sensor on Windows 10 and Windows 11. This update lets you install the Windows Server Sensor on these operating systems and enable the Filebeat option to use the sensor as a lightweight log forwarder in a site without server infrastructure. This change applies to both on-premises and SaaS environments.
This is the only scenario where the Windows Server Sensor is supported on a Windows desktop host – when using the Server Sensor as a log forwarder. Keep in mind, however, that when using this feature on a Server Sensor installed on a Windows desktop version, you must enable only the Filebeat option in the Windows tab of the sensor's Standard Sensor Profile.
-
AELDEV-46838: Implemented bulk sensor token update in the UI for SaaS instance transfers.
Added support to the Stellar Cyber UI to support updating tokens for sensors in bulk to transfer them between SaaS instances. The update ensures the sensor can apply the new token and connect to the desired instance, with provisions to fallback to the original configuration in case of connection issues.
-
AELDEV-33675: Enhanced Windows FIM event log filtering.
Enhanced Windows FIM event log filtering by allowing detailed filters on the Log Filters UI. You can define filters to include and exclude specific logs, leveraging existing wildcard filename logic with an
AND
relation. This enables more granular control over data ingestion by excluding precisely defined logs, such asprocess-id=100
while matching*.exe
. Multiple filters can be combined as in current Log Forwarder configurations. Additionally, Windows Server Sensors now keep counters for logs excluded by these filters to facilitate troubleshooting.
Improvements
-
AELDEV-44451: Enabled syslog forwarding on Windows Server Sensors.
Enabled Windows Server Sensors to forward syslog events using Filebeat, facilitating log ingestion from on-premises devices. This also includes support for workstation-class Windows versions such as Windows 10 and Windows 11. You can enable and configure log forwarding from Windows Server Sensors using the Filebeat option in the Windows tab of the Standard Sensor Profile.
The new Filebeat feature for Windows Server Sensors is mutually exclusive with the
dhcp_log
feature configured from the sensor's CLI – you can use one or the other, but not both. If you apply a Sensor Profile with Filebeat enabled to a Windows Server Sensor with thedhcp_log
feature enabled, the Filebeat settings do not take affect. You must disabledhcp_log
before you use the Filebeat feature.
Thedhcp_log
feature lets Windows Server Sensors use DHCP beats to send DHCP logs to a Modular Sensor. Keep in mind that DHCP logs have been included with standard Windows Event Logs since the Windows Server 2012 release. -
AELDEV-45826: Updated the Linux Server Sensor to support Rocky Linux 9.3.
Updated the Linux Server Sensor to include support for installation and operation on Rocky Linux version 9.3.
-
AELDEV-50197: Updated the Linux Server Sensor to support CentOS 9.
Updated the Linux Server Sensor to include support for installation and operation on CentOS 9.
-
AELDEV-44384: Added support for CloudLinux 7.9.
Added support for CloudLinux beginning with version CloudLinux 7.9.
-
AELDEV-52190: Added NTP sync status to the "show ntp" CLI command
Added the NTP sync status to the
show ntp
CLI command, providing clearer visibility into time synchronization issues. -
AELDEV-51211: Enhanced the "show metalist" CLI command to show app IDs used in sensor profiles.
Updated the
show metalist
CLI command to show custom applications and built-in applications so that you can quickly identify specific configurations without searching through predefined system applications. The enhancement affects only the standardshow metalist
command. To see all applications, both custom and system-defined, use theshow metalist all
command. This update improves configuration visibility when you are managing custom application groups. -
AELDEV-48919: Added support for the tenant ID parameter during the Linux Server Sensor deployment.
Enhanced the Linux Server Sensor installation script to support tenant ID configuration. This update allows users to specify both CM and tenant ID using command line arguments, streamlining the agent deployment process.
-
AELDEV-48177: Enhanced user enrichment for Sysmon events.
Enhanced the user enrichment process for Sysmon events collected by the Windows Server Sensor. Previously, the user object was incorrectly defaulting to
SYSTEM
. This update improves the logic to ensure accurate identification and enrichment of the actual user involved in Sysmon event generation, enhancing the ability to track and analyze endpoint security data. -
AELDEV-45846: Refactored the DNS cache mechanism for best-practice compliance.
Updated the DNS cache mechanism to comply with industry best practices. Previous methods involved direct file manipulation under the
/run
directory, which could lead to potential issues and instability. The revised implementation avoids such direct interactions, ensuring more robust and maintainable code.
Connectors
New Features
-
AELDEV-51444: Introduced the AWS Inspector connector.
Introduced the AWS Inspector connector to collect scan events. When the Inspector detects a software vulnerability or unintended network exposure, it creates an inspector finding, which is a detailed report about the issue.
-
AELDEV-50721: Introduced the Trend Micro Email Security connector.
Introduced the Trend Micro Email Security connector to query logs relating to email protection, such as policy event logs and mail tracking logs.
-
AELDEV-50200: Introduced the Juniper Mist connector.
Introduced the Juniper Mist connector, enabling the collection of logs, system events, and alarm data from Juniper Mist wireless networks. This integration facilitates monitoring administrative actions and device connection logs, essential for identifying network access points during potential security incidents.
-
AELDEV-49905: Introduced the Abnormal Security Email Security connector.
Introduced the Abnormal Security Email Security connector to ingest threat data and audit logs generated by the email security product. You can now gain insights from Abnormal Security email threat assessment and incorporate these findings into security investigations.
-
AELDEV-49903: Introduced the Versa Networks Concerto connector.
Introduced the Versa Networks Concerto connector so that Stellar Cyber can collect Versa audit log data.
-
AELDEV-49763 and AELDEV-47072: Introduced the WithSecure Elements connector with collect and respond functions.
Introduced the WithSecure Elements connector so that Stellar Cyber can pull logs and respond to incidents. The integration supports content types for devices, security events, incidents, and detections. The respond function is implemented with webhook templates for the following actions: WithSecure Elements Isolate From Network, WithSecure Elements Kill Process (Beta feature), WithSecure Elements Kill Thread (Beta feature), and WithSecure Elements Release From Network Isolation.
-
AELDEV-46317: Introduced the Google Cloud Security Command Center connector.
Introduced the Google Cloud Security Command Center (SCC) connector to query threat and vulnerability data and list security findings using the Security Command Center API.
-
AELDEV-43925: Introduced the NetFoundry connector.
Introduced the NetFoundry connector, which integrates with the NetFoundry API to query API session events and audit logs.
-
AELDEV-28474: Introduced the FortiEDR connector.
Introduced the FortiEDR connector to collect events. This integration leverages the FortiEDR REST API, enabling Stellar Cyber to ingest event data directly for further analysis. The connector supports interaction with the
list-events
API endpoint. -
AELDEV-25270: Introduced the Fortra Frontline connector.
Introduced the Fortra Frontline connector to ingest vulnerability scanning data and host data from the Fortra Frontline Vulnerability Manager.
Improvements
-
AELDEV-52115: Updated the Broadcom Symantec Endpoint Security (SES) connector to support customizable API endpoints.
Updated the Broadcom Symantec Endpoint Security (SES) connector to let you customize API endpoints by making the
hostname
field editable. -
AELDEV-51799: Modified query logic for ExtraHop Reveal(x) 360 detection integration.
Updated the integration for ExtraHop Reveal(x) 360 detections to utilize the
mod_time
attribute, addressing the issue of duplicate events due to inherently persistent detection IDs. By altering the query to focus on detections modified in the last five minutes rather than merely active ones, redundancy in reported detections was reduced. This change lowers the overall event volume in the query response. However, this approach might initially overlook older, unmodified detections when onboarding. The update accounts for the semantic differences between long-term detections by ExtraHop Reveal(x) 360 and short-term event alerts by Stellar Cyber. -
AELDEV-51061: Addressed an issue with the AWS CloudTrail connector in which a prefix update required a restart to take effect.
Addressed an issue where changes to the AWS CloudTrail connector prefix were not automatically applied until after the connector was manually restarted. The connector now recognizes prefix updates without requiring a manual restart.
-
AELDEV-50091: Resolved temporary logs retention issue in Cisco Umbrella and AWS CloudTrail.
Implemented a change to ensure that temporary log files from Cisco Umbrella and AWS CloudTrail are not incorrectly retained in the log collector directories. The change ensures the proper cleanup of downloaded files to avoid unnecessary storage utilization.
-
AELDEV-50043: Improved normalization logic for AWS GuardDuty on S3Object resource type.
Updated normalization logic to handle cases where AWS GuardDuty findings with ResourceType as S3Object might not include S3ObjectDetails. The process now first checks for S3ObjectDetails, and if absent, falls back to S3BucketDetails. This enhancement ensures correct normalization of cloud resource data in line with existing AWS metadata structures, even when S3ObjectDetails are missing from the provided data. This change reflects improved adaptability in the processing of AWS GuardDuty findings.
-
AELDEV-49196: Improved Office 365 normalization and enrichment.
Enhanced Office 365 connector normalization and enrichment to improve the Microsoft product alert integration. More elaborate logic was added to the Office 365 connector related to the normalization of fields such as
user.name
,user.email
,user.id
,host.name
,srcip
, and theemail
object to ensure accurate alerting. -
AELDEV-48629: Removed temporary S3 files automatically from the temp directory.
Resolved an issue where temporary files in the
/work/log-collector/tmp/generic_s3
directory were not being automatically removed, leading to unnecessary space consumption. These files, once downloaded, are now properly cleaned up. This enhancement aligns the Generic S3 connector with logic used for similar connectors, ensuring consistent temporary file management across the Stellar Cyber Platform. -
AELDEV-48359: Improved Mimecast alert integration for email observable correlation.
Improved Mimecast alert integration to support the correlation of email observables with improved normalization and enrichment processes. This update allows for more effective case correlation by ensuring
msgid
/MsgId
is normalized toemail.message_id
. This enhancement facilitates a more robust analysis of email events by improving the depth of data available for threat scoring and alert creation. -
AELDEV-48357: Enhanced Proofpoint on Demand alert integration to correlate email observables.
Enhanced the integration of Proofpoint on Demand alerts by improving the normalization and enrichment processes to support the correlation of email observables. This enhancement facilitates better case management by enabling the correlation between different email observables within Proofpoint on Demand data. Additionally, the
messageParts
data structure is now normalized into afile_list
field and themessageID
field is normalized toemail.message_id
. This update provides the necessary framework for improved threat detection and response regarding email-related security incidents. -
AELDEV-46055: Enhanced the Cyrisma connector to support SaaS deployments.
Enhanced the Cyrisma connector to support SaaS deployments and pull Cyrisma data. You need to set up one connector for each CYRISMA tenant from which you want to pull data.
-
AELDEV-45801: Updated the Netskope connector to ingest network events.
Updated the Netskope connector to add a Network content type for ingesting the network activities that Netskope monitors. These include alerts, application events, and network events. The integration is through the Netskope V2 API.
-
AELDEV-45284: Enhanced Office 365 data enrichment for user and group events.
Office 365 data enrichment now includes separate fields for users being created and users added to groups in Active Directory. Fields such as user and group attributes are parsed into distinct fields, improving search capabilities within logs. This change enhances the
ModifiedProperties
structure by converting list entries into distinct objects, facilitating structured searches in Microsoft Entra ID (formerly Azure Active Directory) logs and assisting in comprehensive audit reporting. -
AELDEV-43507: Updated the CrowdStrike connector to support the FIM content type.
Updated the CrowdStrike connector to include support for the File Integrity Monitoring (FIM) content type. This enables the collection and processing of FIM event data.
-
AELDEV-41400: Updated the Test button in the Universal Webhook responder.
Updated the Test button in the Universal Webhook responder for custom webhooks. This lets you test the responder directly within the configuration, eliminating the need for manual tests in alert workflows. You can examine the entirety of the request and response bodies during testing to verify expected results, including raw data return from a third-party system.
-
AELDEV-39431: Updated the Universal Webhook responder to implement a raw Interflow payload option.
Added support to the Universal Webhook responder for sending an entire Interflow record as a payload, accommodating receivers expecting full Interflow data. You can select the format by using placeholders such as
interflow
,interflow_raw
, orinterflow_str
to deliver JSON object or string formats. This enhancement enables integration with programmatic interfaces, ensuring complete data transmission without the need to create payloads manually.Note: To use the Universal Webhook responder on a sensor, the sensor must be upgraded to 5.4.0 if the Stellar Cyber Platform is running on 5.4.0.
-
AELDEV-38645: Updated the Generic S3 connector to add Assumed Role authentication.
Added support for Assumed Role authentication to the Generic S3 Connector, in addition to the traditional access key and secret key method. This enhancement lets you leverage Identity and Access Management (IAM) roles for more secure and flexible access management.
-
AELDEV-30225: Updated the AWS CloudTrail connector to add Assumed Role authentication.
Added support for Assumed Role authentication to the AWS CloudTrail connector. This lets you authenticate with temporary credentials obtained from AWS Identity and Access Management (IAM) roles. This method replaces the previous reliance on a static Access Key ID and Secret Access Key, enhancing security by reducing the need for key rotation and credential management across multiple connectors. You can now specify an IAM role Amazon Resource Name (ARN). The connector will assume the specified role to obtain temporary credentials for accessing AWS resources.
-
AELDEV-26275: Updated the SentinelOne connector to add Site field.
Updated the SentinelOne connector to add the Site field to the configuration to allow mapping of Sentinel One site names to Stellar Cyber tenants. The Site field is a string and can be either a site ID or site name.
Parsers
New Features
-
DATA-2330:Introduced a parser for ingesting Dell EMC Data Domain logs.
Added a built-in parser for ingesting Dell EMC Data Domain logs on port 5874.
-
DATA-2323: Introduced a parser for ingesting Microsoft Exchange Server logs.
Added a built-in parser for ingesting Microsoft Exchange Server logs on port 5876.
-
DATA-2319: Introduced a parser for ingesting SOCRadar logs.
Added a built-in parser for ingesting SOCRadar logs on port 5872.
-
DATA-2315: Introduced a parser for ingesting Snowflake (CEF) logs.
Added a built-in parser for ingesting Snowflake logs on port is 5143.
-
DATA-2304: Introduced a parser for ingesting IBM WinCollect 10 logs.
Added a built-in parser for ingesting IBM WinCollect 10 logs on ingestion port 5869.
-
DATA-2293: Introduced a parser for ingesting Intrusion ATI logs.
Added a built-in parser for ingesting Intrusion ATI (Applied Threat Intelligence) logs on ingestion port 5868.
-
DATA-2283: Introduced multiple Trellix FireEye parsers to support logs from additional products.
Added the following built-in parsers to ingest CEF logs from various Trellix FireEye products:
-
Trellix FireEye - eMPS (CEF)
-
Trellix FireEye - ETP (CEF)
-
Trellix FireEye - fMPS (CEF)
-
Trellix FireEye - HX (CEF)
-
Trellix FireEye - MAS (CEF)
The logs are ingested on port 5143 and, for logs with Octet Counting, on TCP port 5870.
Existing Trellix FireEye CMS and MPS parsers were also updated to support
trellix
in the vendor field in CEF ingestions, as all the newly added sTrellix FireEye parsers do. -
-
DATA-2278: Introduced a parser for ingesting Teramind CEF logs.
Added a built-in parser for ingesting Teramind CEF logs port 5143 or 5870.
-
DATA-2277: Introduced a parser for ingesting Trellix ESM (Enterprise Security Manager) logs.
Added a built-in parser for ingesting Trellix ESM (Enterprise Security Manager) logs on ingestion port 5873.
-
DATA-2263: Introduced a parser for ingesting syslog events from a SonicWall Firewall.
Added a built-in parser for ingesting syslog events that a SonicWall Firewall sends to UDP port 514 on a Windows Server Sensor. Filebeat collects the syslog events and forwards them to the SonicWall Firewall parser on port 5767 on a Modular Sensor. The Modular Sensor parses and normalizes the logs and then forwards them to the Stellar Cyber Platform for further analysis and processing.
-
DATA-2249: Introduced a parser for ingesting F5 BIG-IP LTM logs.
Added a built-in parser for ingesting F5 BIG-IP LTM (Local Traffic Manager) logs on ingestion port 5765.
-
DATA-2223: Introduced a parser for ingesting Versa Networks Unified SASE Platform logs.
Added a built-in parser for ingesting Versa Networks Unified SASE Platform logs on ingestion port 5766.
-
DATA-2200: Introduced a parser for ingesting Ruckus SmartZone Network Controller logs.
Added a built-in parser for ingesting Ruckus SmartZone Network Controller logs on ingestion port 5875.
-
DATA-2187: Introduced a parser for ingesting Hisun Global E-banking logs.
Added a built-in parser for ingesting Hisun Global E-banking logs on ingestion port 5764.
-
DATA-2153 Introduced a parser for ingesting TmaxSoft WebtoB logs.
Introduced the new built-in parser for TmaxSoft WebtoB, the ingestion port is 5877.
Improvements
-
DATA-2372: Enhanced the Cisco routers and switches parser to parse logs in more granular detail.
Enhanced the Cisco routers and switches parser to parse access list logs and configuration change logs and extract more fields.
-
DATA-2308: Modified all CEF ingestions on port 5143 to support a dash ( - ) as a value for "cef_event_id".
Modified all Common Event Format (CEF) ingestions on port 5143 to accept a value of
-
forcef_event_id
, which means the log source didn't provide a specific event ID. In the context of CEF logs, a dash (-
) typically means that a value is not available or not applicable for the log entry. -
DATA-2305: Updated the Palo Alto Networks Firewall parser to preserve the original severity field reported in threat logs.
Updated the Palo Alto Networks Firewall parser to preserve the original severity assigned to security events in threat logs. Stellar Cyber also continues to map the original severity to its own severity scale to standardize the normalization of alerts across various log sourse. The original severity is preserved in a vendor-specific namespace
palo_alto_networks.severity
, and the mapped severity is stored in theips.severity
andids.severity
fields, depending on the type of detection. -
DATA-2301: Added support to the ManageEngine ADAudit Plus parser for a new log format.
Added support to the ManageEngine ADAudit Plus parser for logs formatted in the RFC 5424 standard.
-
DATA-2300: Added additional log format support for the Cisco Firepower parser.
Added support in the Cisco Firepower parser for a new format for logs that only have a priority and an RFC 5424 timestamp in the header.
-
DATA-2288: Enhanced the IBM AS400 parser to cover more formats.
Enhanced the IBM AS400 parser to support IBM AS/400 logs formatted with RFC 3164 syslog headers with custom fields for the IBM AS/400 journal entry structure.
-
DATA-2287: Added multi-line support for the VMware vCenter parser.
Added support to the VMware vCenter parser to process log entries that span multiple lines rather than treating each line as a separate entry.
-
DATA-2285: Enhanced Trellix FireEye - CMS (CEF) and Trellix FireEye - MPS (CEF) parsers to support more fields.
Enhanced the Trellix FireEye CMS (CEF) and Trellix FireEye - MPS (CEF) parsers to support
suser
,duser
, andsourcednsdomain
fields when ingesting CEF logs. Additionally, the ingestion process was updated to storesmac
anddmac
with invalid values in the vendor namespace rather than inmsg_data
. -
DATA-2257: Added support for HP ProCurve 2810 logs and srcip and dstip validation checks to the Hewlett Packard UNIX parser.
Enhanced the Hewlett Packard UNIX parser to support logs from HP ProCurve 2810 switches. Additionally, the parser now validates values in the
srcip
anddstip
fields, only storing valid IPv4 or IPv6 addresses in these fields and moving invalid values to a vendor-specific namespace for reference. -
DATA-2254: Enhanced the Palo Alto Networks Firewall parser to capture threat identification fields.
Enhanced the Palo Alto Networks Firewall parser to duplicate the
Threat/Content Name
(threatid
) field into two separate fields:-
palo_alto_networks.threat_id
for numeric threat identifiers (example:57955
) -
palo_alto_networks.threat_name
for textual threat names (example:ZGrab Application Layer Scanner Detection
)
This enhancement was necessary to accommodate a new format for the
threatid
field, which now appears asstring(integer)
. For example, the original format is(57955)
, and the new format is"ZGrab Application Layer Scanner Detection(57955)"
. -
-
DATA-2248: Improved the CyberArk PTA (CEF) parser to parse more fields.
Improved the CyberArk PTA (CEF) parser to enhance field parsing and storage within the vendor namespace. The fields
request_id
,ticket_id
,affected_user_name
,device_type
,database
,other_info
,externalid
, andreason
are now parsed and stored. The parser has also been updated to extractValue
andOld Value
from themsg
field when presented in a specific format. Additionally, the parser now recognizes "Cyber-Ark" and "Vault" as valid values forcef_device_vendor
andcef_device_product
. -
DATA-2240: Added support for a new SQL log format on the NXLog parser.
Added support for a SQL log format that uses pipes (
|
) to separate fields in the message section of a log. Logs in this format include 21 fields, and in some cases, 23 fields:clau
,usuari
,NomPantalla
,ModalitatPantalla
,ClauTaulaBase
,ip
,UsuariWindows
,Accio
,Funcio
,Servidor
,BaseDeDades
,Navegador
,CodiEstadistica
,sql
,Resultat
,Comentaris
,IdSessio
,Temps
,Tag
,dataalta
,UsuariAlta
. -
DATA-2237: Enhanced the Palo Alto Networks Firewall parser to parse additional fields from failed authentication events.
Enhanced the Palo Alto Networks Firewall parser to parse
srcip
andsrcip_username
from thepalo_alto_networks.description
field in failed authentication events inSYSTEM
logs. -
DATA-2235: Enhanced the Zscaler - NSSWeblog (CEF) ingestion to parse more fields.
Enhanced the Zscaler - NSSWeblog (CEF) parser to parse the following fields:
zscalernssweblogurlclass
,zscalernssweblogdlpdictionaries
,contenttype
,unscannabletype
,deviceowner
,devicehostname
,keyprotectiontype
,urlsupercat
,appclass
,dlpeng
In addition, normalization of the
suser
field was changed tosrcip_username
, and the invalid values of thesrc
anddstip
fields are now stored under the vendor namespace instead ofmsg_data
. -
DATA-2224: Updated the VMware ESXi parser to support new versions of ESXi.
Updated the VMware parser to enhance accuracy by addressing issues such as correcting field parsing, standardizing field names, and ensuring proper field types. In addition, the was also enhanced to provide detailed parsing of the message field in log entries, extracting finer details such as usernames and IP addresses from descriptive text. This enrichment breaks down the message content into structured fields, making the logs more actionable and searchable.
-
DATA-2221: Added additional field support and improved normalization for the McAfee ePolicy Orchestrator parser.
Updated the McAfee ePolicy Orchestrator parser to support additional fields parsed from XML logs.
MachineInfo.AgentGUID
MachineInfo.TimeZoneBias
Event.ThreatName
Event.TimeSZone
Event.OPGData
Event.UserInfo
UpdateEvent.Version
UpdateEvent.DateTime
UpdateEvent.InitiatorID
UpdateEvent.ProductID
UpdateEvent.InitiatorType
UpdateEvent.SiteName
MOVEOpt_Event.EventID
MOVEOpt_Event.MOVEOpt_server_state
MOVEOpt_Event.MOVEOpt_time_stamp
MOVEOpt_Event.MOVEOpt_product_id
MOVEOpt_Event.EventID
MOVEOpt_Event.MOVEOpt_event_name
MOVEOpt_Event.MOVEOpt_move_err
MOVEOpt_Event.MOVEOpt_move_reason
MOVEOpt_Event.GMTTime
MOVEOpt_Event.MOVEOpt_evt_sink
MOVEOpt_Event.MOVEOpt_evt_id
Additionally, the normalization of the
Username
field has been updated touser.name
for consistency. -
DATA-2220: Introduced a new ingestion port for CEF logs using the "Octet Counting" frame type.
Added support for CEF logs using the "Octet Counting" frame type on TCP port 5870 for vendor-specific parsers. CEF logs that don't use "Octet Counting" continue to use port 5143, with no changes required for existing ingestions. Additionally, TCP port 5871 was introduced as a new ingestion port supporting the "Octet Counting" frame type for the generic capture parser, which otherwise uses port 5201 to receive logs that don't use octet counting.
-
DATA-2212: Enhanced the normalization of alert data logs transmitted to the Avanan (HTTP JSON) parser.
Added normalization of the
event.entity.entity_payload.internet_message_id
field used by the Avanan security system toemail.message_id
for consistency and improved integration with Case Management for better email event correlation. -
DATA-2154: Enhanced the Ivanti Pulse Secure parser to support a new log format.
Added the ability to parse logs in a vendor-customized format that includes an extra syslog header before the message.
-
DATA-2096: Enhanced the Incapsula SIEM Integration (CEF) parser to support more fields and enrichments.
Enhanced the Incapsula SIEM Integration (CEF) parser to move the
rule_info
field frommsg_data
to the vendor namespace. Support was added for thecs9
andcs10
label fields, which are parsed along with their respective labels (cs9label
andcs10label
) into key-value pairs. Additionally, the parser was updated to enrichevent.reason
fromcef_name
and to enrichevent.sig_id
using therule_id
field from the first JSON entry ofrule_info
whenmsg_class
isimperva_security_logs
. -
DATA-1806: Enhanced the Palo Alto Networks Next-Generation Firewall and Panorama (BSD syslog and CSV) parser to parse additional fields from the description field of "System" type logs.
Enhanced the Palo Alto Networks parser to parse the following fields from the
description
field inSystem
type logs:reason
auth_profile
vsys
server_profile
server_address
Early Access Program
If you're interested in testing out new features ahead of general availability, consider joining the Early Access Program (EAP) by contacting your Stellar Cyber Customer Success representative and telling them which EAP feature you want to test. Once you've agreed to the EAP terms and signed up, the EAP feature is unlocked for you.
The purpose of this program is to boost performance and reliability through real-world customer insights, giving you a hands-on role in shaping a Stellar Cyber feature. In return, you’ll receive early access to upcoming releases and the chance to guide product development.
AI Investigator
The first EAP feature being spotlighted is AI Investigator. AI Investigator leverages generative AI to accelerate threat investigations through natural language queries, automated charts, and a streamlined investigation flow. Enrolling in EAP lets you experience these benefits first and provide direct feedback that influences the final feature. If this sounds exciting, reach out to your Customer Success representative to sign up and start exploring.
Operational Notes
-
Keep in mind that the global Status filters available at the left of most Stellar Cyber tables (All Open, New, In Progress, Ignored, and Closed) apply only to security events (alerts). They do not apply to cases. You can apply Status filters to cases, too, but only from the Cases interface itself. The names of the Status filters for cases are also slightly different from those available for alerts.
-
Lookup strings for hash values should not include the SHA= or MD5= prefix. Enter these strings using just the hash value itself.
Resolved Issues
-
AELDEV-52267: Resolved issue with Nessus agent unlinking and relinking during scans.
Resolved an issue causing Nessus agents to unlink and relink multiple times during scans. The problem was linked to trailing spaces in the linking_key configuration, which resulted in incorrect behavior. A trim function was added to the sensor backend to eliminate such spaces, ensuring proper relinking. Additionally, the configuration handling is being updated on the UI side to prevent future occurrences. This enhancement aims to improve scanner stability and reliability during operations.
-
AELDEV-52178: Resolved an issue with alerts not displaying in case detail view.
Resolved an issue preventing alerts from displaying in the Case Detail view. This was caused by associating index aliases with multiple indices, which caused retrieval complications. Alerts are now correctly fetched using a search filter, ensuring visibility in the Case Detail interface.
-
AELDEV-51862: Restored tenant_name in top-level correlation alerts.
Restored
tenant_name
to the top level of records for alerts created by correlation rules in addition totenantid
. -
AELDEV-51857: Restored conditions field searching in alert filters and queries
Addressed an issue where searching for values in the conditions field in alert filters and queries was disabled in version 5.3.0. The feature has been restored, allowing users to search using various values such as
xdr.event_name
. -
AELDEV-51823: Fixed an issue that prevented "No heartbeat" notifications from triggering.
Resolved a regression issue where "No heartbeat from device sensor(s)" notifications did not trigger in version 5.2.0. This affected situations where sensors reported as "Disconnected" failed to trigger notifications.
-
AELDEV-51794: Improved the stability of the Alert Filter builder.
Resolved an issue in the Alert Filter builder that caused the view to unexpectedly jump to the top of the page during configuration.
-
AELDEV-51680: Updated Mimecast alert descriptions for clarity.
Improved the descriptions in the Mimecast URL Protect alert integration to better clarify the actions taken.
-
AELDEV-51391: Corrected RDP Settings Hijacking alert description template.
Corrected the alert description template for the "RDP Settings Hijacking" alert, which was previously using the template for "RDP Registry Modification." The correct template now provides a more accurate depiction of suspicious actions involving RDP terminal service settings, such as changes to the fDenyTSConnections registry key. This ensures alerts correctly reflect actions that may jeopardize the security of remote desktop configurations.
-
AELDEV-51342: Updated the Linux Server Sensor to support MemoryMax on newer Linux systems.
Updated the Linux Server Sensor to resolve a warning on newer Linux distributions such as Red Hat 9.2/8.1 with
systemd v252
, to replace the deprecatedMemoryLimit
configuration withMemoryMax
. This update ensures compatibility with the unifiedcgroup
hierarchy and eliminates deprecated warnings in system logs. -
AELDEV-51295: Removed a PowerShell Script Block rule to reduce false positives.
Removed the
powershell_scriptblock_86
rule, identified as "Powershell Suspicious Win32_PnPEntity", to eliminate false positives. This rule was triggering detections due to a recent Windows update using theGet-PnpDevice
cmdlet. -
AELDEV-51106: Implemented HTTP 400 response for invalid JSON in API requests.
Updated the
security_event_filters
API to return an HTTP 400 status for improperly formatted JSON in request bodies. Previously, invalid JSON resulted in an HTTP 500 error. This change improves error feedback by indicating client-side formatting issues with the request payload, enabling better troubleshooting and handling for API consumers. -
AELDEV-50996: Fixed an issue with Webhook Responder Connector selection in the root tenant.
Resolved an issue where the Webhook Responder Connector was not selectable in the Alert Triggering Handler rule if the connector was located in the Root Tenant. This fix ensures that all webhook connectors, including those in the root hierarchy, are now visible and selectable within the interface, enhancing usability for tenant management. The fix is available starting from version 5.4.0, ensuring that users can now correctly configure webhook connectors regardless of their tenant location.
-
AELDEV-50975: Resolved false User Login Failure Anomaly alerts due to ambiguous classification of SSH traffic.
Modified the User Login Failure Anomaly to consider SSH traffic with uncertain login results as successful. The existing criteria for a login success is extremely strict, resulting in a skewed ratio of login successes to failures being presented to the model and false positive alerts being generated. This change takes that into consideration to prevent the model from ignoring logins that are likely successful, improving the detection’s accuracy and removing noise.
-
AELDEV-50582: Resolved fidelity score calculation for IPS signature alerts.
Adjusted the fidelity score calculation algorithm for Intrusion Prevention System (IPS) signature spike detections to ensure scores are above 1.
-
AELDEV-50389: Resolved a PowerShell logging issue on domain controllers.
Addressed an issue where PowerShell operational logs were not being collected on domain controllers running Windows Server 2012.
-
AELDEV-50330: Enhanced Windows Event log enrichment for TargetUserName.
Updated Windows Event log processing to enrich the username using
event_data.TargetUserName
for IPv4 and IPv6 loopback addresses. Previously,dstip_username
did not matchevent_data.TargetUserName
. This enhancement ensuressrcip_username
reflects the user logging in, especially for IP addresses127.0.0.1
and::1
. -
AELDEV-50177: Resolved a scrolling issue in expanded Threat Hunting records.
Resolved an issue in the Threat Hunting page where users experienced difficulty scrolling when a record was expanded and the integrated search bar was used. This fix prevents the table display from stuttering and ensures smooth navigation while searching within expanded detail panels.
-
AELDEV-49974: Fixed false positive alerts for Generic S3 connector monitoring.
Addressed an issue causing false positive alerts for
no data
in the System Action Center Connector Monitoring for the Generic S3 connector. Enhancements include preventing partial results from queries. These changes aim to ensure that alerts are only triggered when there is genuinely no data received from the connector within the expected timeframe. -
AELDEV-49890: Corrected username and hostname enrichment logic.
Addressed inaccuracies in the username and hostname enrichment logic related to Windows event data. These enhancements resolved discrepancies between field values such as
event_data.TargetUserName
anddstip_username
. The enrichment now consistently normalizes these fields based on event IDs, ensuring alignment with external systems for better reporting accuracy. -
AELDEV-49784: Tightened the criteria for frequent location alert suppression for Impossible Travel Anomaly by introducing an elapsed time requirement.
Updated the Impossible Travel Anomaly detection to incorporate stricter criteria for recognizing frequent locations. This enhancement prevents the suppression of alerts for impossible travel scenarios by introducing a delay before a location can be considered as frequent. This specifically addresses a scenario where ingestion delays could alter the outcome of the detection and improves detection accuracy by tightening the criteria for alert suppression. This update ensures more accurate detection of suspicious logins from disparate locations by distinguishing between truly anomalous access patterns and regular, permissible activities from recognized locations.
-
AELDEV-49779: Improved the accuracy of the username enrichment pipeline.
Enhanced the username enrichment pipeline to provide more accurate attribution of usernames derived from IP addresses. This update addresses a previously identified discrepancy where the inferred username information could be misleading due to reliance on IP address-based enrichment.
-
AELDEV-49776: Fixed a TLS configuration issue on customized parser ports.
Fixed an issue where TLS was not correctly enabled on the customized parser ports. Previously, parser ports remained non-TLS even when the ingestion port was set to TLS, leading to connection failures. With this fix, the TLS setting now correctly applies to customized parser ports when expected.
-
AELDEV-49758: Implemented date type for timestamps in the data schema.
Updated the
user_action.first_timestamp
anduser_action.last_timestamp
fields fromlong
todate type
in the schema for the Alerts index. This change ensures that timestamps are correctly converted and displayed in the browser timezone across tables and charts, addressing the previous issue where they appeared as epoch values. -
AELDEV-49494: Resolved IP address mismatches between xdr_event.description and related fields in alerts.
Addressed conflicts between the
xdr_event.description
and detected values in Emerging Threat alerts. Stellar Cyber now accurately reflects the correct destination IP addresses in alert descriptions. -
AELDEV-49439: Increased the buffer size for aella_winlog service to prevent restarts.
Increased the buffer size for the
aella_winlog
service from 16k to 64k to handle larger log sizes and prevent frequent service restarts. This adjustment addresses the issue where logs exceeding the initial buffer capacity caused service instability. If a log surpasses the 64k threshold, it will be dropped, and an error log will be generated. -
AELDEV-49350: Implemented username normalization to improve alert accuracy
We have enhanced our system to implement username normalization aimed at reducing false positives in alert reporting. Previously, alerts could mistakenly associate actions with incorrect usernames due to the inconsistent structure of Windows Event 4688 logs, which sometimes lack the TargetUserName/SubjectUserName fields. We now employ a more robust mechanism that avoids enrichment with unreliable data, ensuring usernames derived from IP address mappings do not mislead bystanders.
-
AELDEV-49198: Fixed an issue in which a case status refreshed while resolving a case due to a previous update that was still in progress.
Resolved an issue where case statuses would incorrectly be reset back to the current saved state while the user was in the process of resolving a case. This reset occurred because of a previous update that was in progress. Now the selected status will be retained if the user is in the status update process.
-
AELDEV-49062: Improved the normalization of Microsoft 365 original records.
Added normalization rules for Microsoft 365 events to normalize user email information from both alert records and original raw records. Specifically, we examine the Microsoft 365 event field
office365.f3u
and normalize it into theusername
field. We also examine the fieldoffice365.trc
and normalize it intoemail.to.addresses
field per Microsoft event format design. These normalization choices aim to cover the vast majority of Microsoft 365 event types. -
AELDEV-48940: Excluded specific Sophos events from triggering false positive alerts.
Enhanced Sophos EDR Alert integration by excluding specific types of false-positive alerts.
-
AELDEV-48824: Improved Microsoft product normalization.
Improved the normalization process for Microsoft products, specifically Microsoft 365 (formerly Office 365) and Microsoft Entra ID (formerly Azure Active Directory). The new improved normalization process generally focuses on correctly extracting IP addresses, device names, user IDs, and user email information from both alert records and raw message records from Microsoft 365 and Entra ID data sources. In addition, email-related entity information from Microsoft 365 raw data records is normalized, including the
from address
,to address
,cc address
,source IP address
,message ID
,subject
, and others, when they are available.Beyond the improved mapping rules for the normalization process, the normalization logic was also improved. The new implementation checks the content format of the original data source before normalization. To avoid unwanted case correlation results due to the normalization, Stellar Cyber checks if the user ID is in a valid UUID format and if the user email is in valid email format before normalization begins. The improvement aims to unify the normalization of multiple destination fields with the same meaning, such as
user.name
,srcip_username
, andusername
to avoid potential incorrect case correlation results. -
AELDEV-48518: Added maltrace and logforwarder outbytes fields to sensor records to address a case where their absence caused false positive continuous low Data Ingestion Volume Anomaly alerts.
Added out_bytes_delta fields for maltrace and logforwarder (
logfwd_out_bytes_delta
andmaltrace_out_bytes_delta
) to sensor monitoring records and added support for those fields to Data Ingestion Volume Anomaly to fix a case where sensors ingesting only maltrace or logforwarder data would get false positive Data Ingestion Volume Anomaly alerts repeatedly due to low ingestion. -
AELDEV-47890: Resolved issue where custom RBAC profile caused receiver to disappear from sensor profiles.
Fixed an issue where a custom RBAC profile based on User roles caused the receiver configuration to disappear from Sensor Profiles after an edit submission. The log forwarder filter was not being applied, necessitating intervention from super_admin or platform_admin accounts to restore the receiver configuration. The required permissions for this operation have been reviewed and adjusted to prevent similar issues in the future.
-
AELDEV-46974: Improved tenant-specific filtering for Top Cases widget
The Top Cases widget now accurately displays top cases per selected tenant within the Kill Chain dashboard. Previously, it aggregated data from all tenants, causing confusion when the selected tenant didn't have top cases. This update ensures that only relevant cases are shown based on the tenant filter, improving clarity for users viewing their specific environment. Additional documentation was updated to reflect these changes, ensuring users understand the widget's behavior and status filtering constraints. This enhancement helps prevent misinterpretations regarding monitoring efficiency for tenant-specific views.
-
AELDEV-46680: Resolved high resource usage in Windows Server Sensors.
Addressed an issue where unrelated processes caused 10% resource usage on Windows Server Sensors, regardless of server size.
-
AELDEV-46304: Resolved a role-based access control (RBAC) issue for custom user profiles based on the Security Admin template.
Fixed an RBAC issue where user profiles based on a user with Security Admin privileges could not make changes in System Action Center (SAC) despite having required permissions. Users with such profiles will no longer encounter a 403 error when modifying SAC settings.
-
AELDEV-45830: Hid Visibility Dashboard options in RBAC configuration.
Hid options when a user removes the Network Visibility and Service Visibility Dashboards using role-based access control (RBAC) so that these options are no longer selectable in the user interface. This prevents users from encountering a 404 error when attempting to access dashboards that were removed through RBAC. This improvement enhances usability by ensuring that only accessible options are displayed, aligning the user interface with underlying access permissions.
-
AELDEV-41096: Enhanced SentinelOne integration for improved alert enrichment.
Improved the SentinelOne alert integration by updating the Tactics, Techniques, and Procedures (TTP) mapping to align with version 13 specifications. The integration was reworked to handle multiple TTPs and sub-techniques as is done with other integrations.
-
AELDEV-39930: Updated to the latest SentinelOne Vulnerability API endpoints.
Updated to the latest SentinelOne API endpoints for vulnerability data collection due to deprecation of the old endpoints as of 2024. The deprecated endpoints caused inaccuracies in vulnerability data. The new endpoints include:
GET /web/api/v2.1/application-management/inventory
,GET /web/api/v2.1/application-management/risks
, among others. This update ensures continued accuracy and compliance with the latest SentinelOne protocols. -
DATA-2147: Fixed incorrect normalization on the Sonicwall Firewall parser to avoid sending logs to wrong indices.
Fixed incorrect normalization on the Sonicwall Firewall parser to avoid sending logs to wrong indices.
Known Issues
-
Upgrades of Windows Server Sensors to the 5.4.2 release are only supported from 5.3.0 and 5.4.0. They are not supported from 5.2.0 and lower.
-
Importing security rules via the Import Custom Security Rules page might cause the upload process to hang without providing a status update. If this happens, refresh the browser.
-
A query might not produce consistent search results if the
field
is set for a time, thevalue
includes milliseconds, and theoperator
is set asis
oris not
. Workaround: When you define a query with a timefield
and avalue
that includes milliseconds, it’s not recommended to useis
oris not
as theoperator
. For more consistent search results, use one of the following operators instead:greater than
,greater than or equal to
,less than
,less than or equal to
, orin range
. -
When searching the Asset Analytics tab for an IP address, make sure you set the Search Column to Friendly Name, IP, or IP History. Searches for IP addresses with the Search column set to its default value of All don't work correctly. This will be fixed in a later release.
-
The Cylance responder is unable to perform the Contain Host action due to a limitation in the Cylance REST API. All requests return a 500 Internal Server error response.
-
Stellar Cyber recommends that you do not use the same login credentials to configure Azure or Azure Active Directory connectors for multiple tenants in the same company.
-
Windows Server Sensor installation can trigger the installation of Microsoft Visual C++ on the host machine if it isn't installed already. If the installation of Visual C++ fails, the Windows Server Sensor might not be able to decode the token used to authorize and configure its installation, leaving it unable to register with stellarcyber.cloud. If this happens, use the following steps to proceed:
-
Update and restart the host Windows machine to repair the Microsoft Visual C++ installation.
-
Either reinstall the Windows Server Sensor or use the set token command in the Sensor CLI to authorize and configure the existing installation.
-
-
The Log Forwarder only collects statistics for up to 100 different log source IP addresses per Log Forwarder worker. If the total number of log source IP addresses exceeds 100, statistics for the additional log source IP addresses are aggregated into the catch-all IP address of 0.0.0.0.
-
When multiple traffic filters are defined for a tenant with the same combination of IP address, port, protocol, and layer 7 rules, the filter might fail to take effect. If this happens, review the defined traffic filters and make sure there are no duplicate definitions.
-
If you change the network interface configuration of a sensor VM after deployment, the eth0 interface might be remapped to a new interface. If this happens, the management network is disconnected. Contact Stellar Cyber Customer Success for assistance.
-
The Sensor content type for the Cybereason connector requires the System Admin role and Sensor Admin L1 role (if your Cybereason environment uses sensor grouping) to collect.
-
Due to an ongoing issue with the Cybereason Query Sensors API, the Cybereason connector might not always be able to retrieve host IP addresses, resulting in missing host information in alerts and incomplete case correlation.
-
When a new tenant is onboarded, the rare-type alerts (anomaly_tag:rare) triggered from Private/Public to Private/Public Exploit Anomaly, Scanner Reputation Anomaly, External / Internal Non-Standard Port Anomaly, Carbon Black:XDR Anomaly, and CylanceOPTICS:XDR Anomaly may have an unusually large days_silent and a higher than usual fidelity. This issue will be addressed in a future release.
-
If you use a Cynet connector to perform a Contain Host or Shutdown Host on a host that is already disabled, shutdown, or otherwise not reachable, Cynet returns a status that the request was successful which is reported in the Stellar Cyber UI. If you are not certain whether an action was successful, you may verify it in the Cynet dashboard.
-
Operators are enabled in pick list menus when they are supported with the selected field or rule. For this reason, use the menu-based queries rather than the Search keyword field with these operators. Examples include contains, does not contain, and is operators. Additional fields/rule support will be added in the future.
-
Log Forwarder only collects statistics for limited different log source IP addresses per Log Forwarder worker. If the total number of log source IP addresses exceeds the limit, the additional log source IP address statistics will be aggregated into a catch-all IP address of 0.0.0.0.
In releases prior to 5.1.1, the limit had been 100 sensors, but it was increased to 200 sensors with more than 8 GB of memory in the 5.1.1 release.
-
When a modular sensor is configured as a Log Forwarder-only sensor (Network Traffic and other features are not enabled), the Log Forwarder might periodically restart if there isn't enough sensor memory. Stellar Cyber recommends that the sensor memory (in GB) be at least 1.5 times the CPU core number. For example, if the sensor has a total of 8 cores, the sensor should have at least 8 * 1.5 = 12 GB of memory.
-
A modular sensor upgrade will fail when the associated modular sensor profile has the IDS or Sandbox features enabled and the corresponding feature license is not assigned to the sensor. Workaround: Authorize the sensor with an IDS and Sandbox license, or in the modular sensor profile, disable the IDS and the Sandbox features and try to upgrade again.
-
When multiple traffic filters in different tenants are defined with the same combination of IP, port, protocol, and layer 7 rules, the sensor only takes the filter belonging to the same tenant with the sensor and ignores the others. Administrators should review the defined traffic filters and avoid creating duplicate definitions.
-
Files might not be assembled by Security Data Sensors for traffic mirrored from physical interfaces on Cisco Nexus 9K models. As a workaround, configure VLAN mirroring on the Cisco switch.
-
If you change the network interface configuration of a sensor VM after deployment, the eth0 interface might be remapped to a new interface. If this happens, the management network becomes disconnected. Contact Customer Success for assistance.
-
If you configure a sensor aggregator using its hostname instead of its IP address, you can not see the aggregator in the Sensor List. This does not affect the sensor's ability to communicate with the DP through the aggregator.
-
Deleting Elasticsearch data from the Root Tenant in the System | Data Management | Advanced tab deletes data from sub-tenants as well.