Stellar Cyber 5.2.0s Release Notes

Software Release Date: July 10, 2024
Release Note Updated:
July 17, 2024

This release note lists and describes all the exciting improvements in the Stellar Cyber Open XDR platform in the 5.2.0s release.

The release notes are organized into the following sections:

Highlights

The 5.2.0s release introduces several key features and improvements that enhance the Stellar Cyber Open XDR platform:

Alert Enrichment and Detection

  • Enhanced alert enrichment for SMB traffic: Provides deeper insights into SMB Read/Write Anomalies.

  • Detailed IDS rule enrichment: Adds comprehensive threat intelligence for various exploit anomalies.

  • New ML alert type for abnormal Windows account password resets: Enables proactive security measures.

Reporting and Visualization

  • Faster alert reporting: Improves response times for Impossible Travel Anomaly and User Login Location Anomaly.

  • Enhanced case analysis graphs: Offers clearer visualization of complex attack scenarios.

  • Refined correlation strategy: Ensures every alert is assigned to a case.

Integrations and Standards

Usability Enhancements

  • Stellar Cyber Chat in the knowledge base: Introduces Stellar Cyber Chat as an AI chatbot to help you find information quickly and easily within the knowledge base.

  • Usability enhancements: Includes new case management dashboards, bulk actions, visibility into enriched fields, and enhanced observable insights, enabling faster triage and investigation of alerts as part of a case.

  • Data visibility improvements: Features human-readable JSON timestamps and automatic log parser sync.

  • Field Customization: Introduces key field customization for alerts created from Automated Threat Hunting (ATH) rules, empowering analysts with easier access to critical context information.

Platform and Infrastructure

Data Processing and Parsers

  • Data processor improvements: Offers tailored threat detection and increased context accuracy.

  • New and improved parsers: Broadens the range of log sources monitored for more accurate threat detection and comprehensive security solutions.

Actions Required

  • Update any configurations with field changes noted in the Behavior Changes section.

Behavior Changes

Changes that affect the way users interact with the product or interpret results are listed below.

  • The alert types with Azure AD have been renamed to Microsoft Entra ID. This change only applies to the display name of the affected alert types (xdr_event.display_name). The internal event name (xdr_event.name) remains unchanged. The following alert types have this name change: Azure AD Apps Modified To Allow Multi-Tenant AccessMicrosoft Entra Apps Modified To Allow Multi-Tenant Access, Azure AD Custom Domains ChangedMicrosoft Entra Custom Domains Changed, and AzureADRiskDetectionMicrosoft Entra RiskDetection (third-party alert integration) This name change also applies to alert descriptions and other display strings in alerts and rules.

  • Trend Micro Apex Central CEF parser – deviceprocessname is moved from msg_data to the vendor field.

  • McAfee Firewall parser – Unsupported values in the protocol field are moved into vendor namespace while those with supported values are still normalized as proto.

  • Netflow parser: This parser no longer puts all the fields into msg_data. Except for the srcip, dstip, srcport, dstport, proto, inbytes_delta, and inpkts_delta fields, all other fields are now under netflow.

  • Fortinet Fortigate parser – The action, url, and direction fields are normalized into top-level fields.

  • Barracuda Firewall parser – proto_name is normalized into proto when possible.

  • Mako Networks Firewall parser – A proto: <proto-name> key-value pair is parsed as proto: <proto-name> when the value is icmp, igmp, tcp, or udp. Any other value is stored under vendor namespace.

  • Mako Networks Firewall parser – The action field moved from the msg_data to the top level.

  • Ubiquiti UAP-AC-Pro parser – The whole message part is kept in the log.event_description field for wcad logs.

  • Ubiquiti UAP-AC-Pro parser – The ubiquiti.wevent_type field is renamed as ubiquiti.event_type.

  • ProofPoint parser – The following key list was added: ["process_name", "process_id", "s", "m", "x", "mod", "cmd", "rule", "dkimresult", "spfresult", "duration", "value", "routes", "rcpt_routes", "rcpt_notroutes", "data_routes", "data_notroutes", "to", "delay", "xdelay", "mailer", "tls_verify", "tls_version", "cipher", "pri", "relay", "dsn", "stat", "from", "size", "class", "nrcpts", "msgid", "proto", "daemon", "auth", "version", "verify", "bits", "reply", "ctladdr", "STARTTLS", "msg"]

  • Any fields that come from key-value pairs that aren't in the list are stored in msg_data.

  • Sophos Firewall parser – device is normalized into sophos.device.

  • Cisco Meraki parser – device is normalized into cisco.device.

  • The schema for the PUT /connect/api/v1/users/{id} API endpoint no longer requires the name field as of the 5.2.0s release. Existing API requests that include the name field will not break in 5.2.0s. The name field is simply ignored if included in a PUT or PATCH request to the users API endpoint.

  • Users should no longer be configured with duplicate email addresses. Currently, the username and email addresses are discrete fields, with the former being the unique identifier. In an upcoming release, these fields will be consolidated with the email address field becoming the unique identifier for a user. Administrators should begin updating their user accounts to ensure no two users have the same email address.

  • In previous releases, the names of applications and protocols appeared in the user interface in uppercase, mixed case, and lowercase formats, sometimes resulting in multiple similar entries differing only by case. For example, syslog, SYSLOG, Sylog, SysLog. To reduce the number of entries, Stellar Cyber now combines them into one entry with a lowercase name: syslog, SYSLOG, Sylog, SysLog syslog. A possible exception to the use of lowercase application names is user-configured custom applications (System | Traffic Filters | Custom Applications). For custom applications, Stellar Cyber displays the name in whatever case the user defined it

Deprecations

  • The Company Trends page is no longer available.

  • Azure Security Center was renamed and this content type is deprecated from Azure Event Hub connector.

  • The Sophos alert type for Malware on Disk, which also has a detection for Windows Defender for Endpoint, is deprecated. The new Sophos alert integration covers the same alerts.

  • The normalization fields sha256, group, and threat are deprecated and will be changed in a future release.

Critical Bug Fixes

Detection/ML

New Features

Improvements

Usability

New Features

Improvements

Stellar Cyber Platform

New Features

Improvements

Sensors

New Features

Improvements

Connectors

New Features

Improvements

Parsers

New Features

Improvements

Operational Notes

  • Keep in mind that the global Status filters available at the left of most Stellar Cyber tables (All Open, New, In Progress, Ignored, and Closed) apply only to security events (alerts). They do not apply to cases. You can apply Status filters to cases, too, but only from the Cases interface itself. The names of the Status filters for cases are also slightly different from those available for alerts.

  • Lookup strings for hash values should not include the SHA= or MD5= prefix. Enter these strings using just the hash value itself.

Known Issues

  • When searching the Asset Analytics tab for an IP address, make sure you set the Search Column to Friendly Name, IP, or IP History. Searches for IP addresses with the Search column set to its default value of All don't work correctly. This will be fixed in a later release.

  • The Cylance responder is unable to perform the Contain Host action due to a limitation in the Cylance REST API. All requests return a 500 Internal Server Error response.

  • Stellar Cyber recommends that you do not use the same login credentials to configure Azure or Azure Active Directory connectors for multiple tenants in the same company.

  • Windows Server Sensor installation can trigger the installation of Microsoft Visual C++ on the host machine if it isn't installed already. If the installation of Visual C++ fails, the Windows Server Sensor might not be able to decode the token used to authorize and configure its installation, leaving it unable to register with stellarcyber.cloud. If this happens, use the following steps to proceed:

    1. Update and restart the host Windows machine to repair the Microsoft Visual C++ installation.

    2. Either reinstall the Windows Server Sensor or use the set token command in the Sensor CLI to authorize and configure the existing installation.

  • The Log Forwarder only collects statistics for up to 100 different log source IP addresses per Log Forwarder worker. If the total number of log source IP addresses exceeds 100, statistics for the additional log source IP addresses are aggregated into the catch-all IP address of 0.0.0.0.

  • When multiple traffic filters are defined for a tenant with the same combination of IP address, port, protocol, and layer 7 rules, the filter might fail to take effect. If this happens, review the defined traffic filters and make sure there are no duplicate definitions.

  • If you change the network interface configuration of a sensor VM after deployment, the eth0 interface might be remapped to a new interface. If this happens, the management network is disconnected. Contact Stellar Cyber Customer Success for assistance.

  • The Sensor content type for Cybereason's connector requires the System Admin role and Sensor Admin L1 role (if your Cybereason environment uses sensor grouping) to collect.

  • Due to an ongoing issue with Cybereason's Query Sensors API, the Cybereason connector may not always be able to retrieve host IP addresses, resulting in missing host information in alerts and incomplete case correlation.

  • When a new tenant is onboarded, the rare-type alerts (anomaly_tag:rare) triggered from Private/Public to Private/Public Exploit Anomaly, Scanner Reputation Anomaly, External / Internal Non-Standard Port Anomaly, Carbon Black:XDR Anomaly, and CylanceOPTICS:XDR Anomaly may have an unusually large days_silent and a higher than usual fidelity. This issue will be addressed in a future release.

  • If you use a Cynet connector to perform a Contain Host or Shutdown Host on a host that is already disabled, shutdown, or otherwise not reachable, Cynet returns a status that the request was successful which is reported in the Stellar Cyber UI. If you are not certain whether an action was successful, you may verify it in the Cynet dashboard.

  • Operators are enabled in pick list menus when they are supported with the selected field or rule. For this reason, use the menu-based queries rather than the Search keyword field with these operators. Examples include contains, does not contain, and is operators. Additional fields / rule support will be added in the future.

  • Log Forwarder only collects statistics for limited different log source IP addresses per Log Forwarder worker. If the total number of log source IP addresses exceeds the limit, the additional log source IP address statistics will be aggregated into a catch-all IP address of 0.0.0.0. Note: In releases prior to 5.1.1, the limit had been 100 sensors, but it was increased to 200 sensors with more than 8 GB of memory in the 5.1.1 release.

  • When a modular sensor is configured as a Log Forwarder-only sensor (Network Traffic and other features are not enabled), the Log Forwarder might periodically restart if there isn't enough sensor memory. Stellar Cyber recommends that the sensor memory (in GB) be at least 1.5 times the CPU core number. For example, if the sensor has a total of 8 cores, the sensor should have at least 8 * 1.5 = 12 GB of memory.

  • A modular sensor upgrade will fail when the associated modular sensor profile has the IDS or Sandbox features enabled and the corresponding feature license is not assigned to the sensor. Workaround: Authorize the sensor with an IDS and Sandbox license, or in the modular sensor profile, disable the IDS and the Sandbox features and try to upgrade again.

  • When multiple traffic filters in different tenants are defined with the same combination of IP, port, protocol, and layer 7 rules, the sensor only takes the filter belonging to the same tenant with the sensor and ignores the others. Administrators should review the defined traffic filters and avoid creating duplicate definitions.

  • Files may not be assembled by Security Data Sensors for traffic mirrored from physical interfaces on Cisco Nexus 9K models. As a workaround, configure VLAN mirroring on the Cisco switch.

  • If you change the network interface configuration of a sensor’s VM after deployment, the eth0 interface may be remapped to a new interface. If this happens, the management network is disconnected. Contact Customer Success for assistance.

  • If you configure a sensor's aggregator using its hostname instead of its IP address, you can not see the aggregator in the Sensor List. This does not affect the sensor's ability to communicate with the DP through the aggregator.

  • Deleting Elasticsearch data from the Root Tenant in the System | Data Management | Advanced tab deletes data from sub-tenants as well.

Upgrading Sensors

New features, updated ML algorithms, and enhanced configurations may change ingestion and detection patterns. Stellar Cyber recommends the following to ensure a smooth upgrade:

  • Upgrade sensors in batches instead of all at once.

  • For Server Sensors:

    • Upgrade a small set of sensors that cover non-critical assets.

    • After 24 hours, ensure that your ingestion is as expected, then upgrade a larger set.

    • After 24 hours, ensure that your ingestion is as expected, then upgrade the remaining agent sensors.

    • If you are upgrading a Windows Server Sensor, complete any pending updates for the host Windows machine before upgrading the Server Sensor.