Stellar Cyber 6.4.0 Release Notes
Software Release Date:
Release Note Updated:
The Stellar Cyber 6.4.0 release strengthens speed, clarity, and confidence across the Open XDR Platform with production-ready Autonomous SOC capabilities, expanded machine learning detections, and enhanced operational workflows.
The release notes are organized into the following sections:
Highlights
Detection and Machine Learning
-
SQL Injection Behavior Detection: This machine-learning detection identifies repeated SQL injection payload patterns across HTTP traffic, covering both external web attacks and internal lateral movement scenarios.
-
VPN Login Failure Anomaly Detection: Identity-based anomaly detection now extends to VPN authentication telemetry, identifying abnormal VPN login failure patterns across Fortinet, Check Point, Palo Alto, and other supported platforms.
Dashboard Usability
-
Responsive Dashboard Authoring: The new grid-based, responsive dashboard layout system enables fluid resizing, reordering, and breakpoint-aware views for faster iteration and scalable operational reporting.
Integrations and Data Expansion
-
Expanded Connector Coverage: This expansion introduces several new connectors and multiple content integrations across email security, cloud infrastructure, vulnerability intelligence, and identity risk platforms to broaden ingestion depth and correlation capabilities.
-
Enhanced Parser and Normalization Framework: The enhancement expands parser coverage and normalization depth across endpoint, firewall, cloud, and infrastructure telemetry to improve detection fidelity and cross-source correlation.
Behavior Changes
Changes that affect the way users interact with the product or interpret results are listed below.
-
DATA-3179: Updated the VMware ESXi parser to migrate a top-level action field from
actiontovmware_esxi.actionfor consistent field semantics within theunixlogscategory. Saved searches, dashboards, and detection rules that referenceactionmust be updated to usevmware_esxi.action. Queries that continue to referenceactionwill no longer return expected results. -
DATA-3155: Updated the Forescout syslog parser to normalize the
log_typefield by removing the trailing semicolon (;) and refining its extracted value. Saved searches, dashboards, and detection rules that rely on exact matches of previouslog_typevalues that included a trailing semicolon must be updated to reflect the revised format. Queries that reference the prior value with a semicolon will no longer return expected results. -
DATA-3122: Updated the Check Point Harmony Email Collaboration parser to move the
actionfield from the top-level event structure into a vendor-specific fieldcheckpoint_harmony_email_collaboration.action. Saved searches, dashboards, and correlation rules that reference the top-levelactionfield for this data source must be updated to usecheckpoint_harmony_email_collaboration.action. Queries that continue to reference the top-levelactionwill no longer return expected results. -
DATA-3119: Updated the Forescout parser to classify Network Access Control match and unmatch events with a distinct
log_typevalue. Instead of assigning all events the value"NAC Policy Log:", the parser now sets the value of thelog_typefield to"NAC Policy Match/Unmatch Event"when theforescout.matchfield is present. Saved searches, dashboards, and detection rules that filter specifically onlog_type:"NAC Policy Log:"must be reviewed and updated if they are intended to include match or unmatch events. Queries that continue to filter exclusively on the previous value will no longer return those events.
Deprecated Features
No features have been deprecated in this release, but the following feature is planned for deprecation in a future version.
-
Upcoming Deprecation: Netskope Connector (API V1) – The Netskope connector supports API V1 and V2, but Netskope has deprecated API V1 so Stellar Cyber will retire the V1 API in a future release. Begin planning to migrate to the V2 API.
Detection/ML
New Features
-
AELDEV-63647: Added alert types for External/Internal Suspected SQL Injection.
Added new alert types for External and Internal Suspected SQL Injection. These alert types detect when a source host is exhibiting external or internal SQL injection behavior with multiple queries observed in the last 60 minutes. See Machine Learning Alert Type Details.
-
AELDEV-63211: Added VPN Logon Events subtype to the External Account Login Failure Anomaly and External User Login Failure Anomaly alert types.
Added a VPN Logon Events subtype to the existing External Account Login Failure Anomaly and External User Login Failure Anomaly alert types for data sources from all VPN logon events. The supported VPNs are Fortinet FortiGate, Check Point, and Palo Alto Networks Panorama. See Machine Learning Alert Type Details.
-
AELDEV-62330: Added Palo Alto Networks Prisma Cloud alert integration.
Added alert integration for Palo Alto Networks Prisma Cloud. The integration ingests Alerts. See Integration of Third Party Native Alerts.
-
AELDEV-61666: Added Halcyon alert integration.
Added alert integration for Halcyon. The integration ingests Alerts. See Integration of Third Party Native Alerts.
-
AELDEV-61664: Added Trend Micro Cloud App Security alert integration.
Added alert integration for Trend Micro Cloud App Security. The integration ingests security events for Exchange, OneDrive, Sharepoint Log, and Teams. See Integration of Third Party Native Alerts.
-
AELDEV-61072: Added Wiz alert integration.
Added alert integration for Wiz. The integration ingests Issues. See Integration of Third Party Native Alerts.
-
AELDEV-59932: Added proxy configuration to threat intelligence feeds.
Added support to the Threat Intelligence Platform for HTTP/HTTPS proxy setup in on-premise environments. This lets you successfully enable and use threat intelligence feeds in on-premise environments with restricted Internet access. Contact the Stellar Cyber Customer Support team if you need web proxy configured. See Configuring Feeds in the Threat Intelligence Platform.
-
AELDEV-59250: Added per-organization case processing for scoring and graph building.
Introduced per-organization processing for case score calculation and case graph construction in multi-organization deployments. To prevent cross-organization delays from large backlogs, each organization uses dedicated processing queues that isolate its workload from those of other organizations. The behavior applies automatically after upgrading; no configuration is required.
Improvements
-
AELDEV-63188: Fixed filter handling in the Public API detections endpoint.
Fixed the handling of the
filtersandsort_bysparameters in theGET /detectionsPublic API endpoint. Requests now apply server-side filtering based on the URL-encoded JSON array supplied infilters. Thefiltersparameter requires an array of objects withfieldandvalue(for example, filter bystatus). Sorting respectssort_bysaccording to the endpoint schema. This update does not add support forlimit,skip, orsearch. -
AELDEV-63077: Improved the extraction of user observables from Kerberos roasting alerts in the case graph.
Corrected the case graph to include all user accounts without Kerberos pre-authentication identified by Kerberos Authentication Service Reply (AS-REP) roasting alerts. Each extracted account appears as an observable in the case graph.
-
AELDEV-61551: Updated queries and alert presentations for firewall anomaly detections to include Unified Threat Management data.
Updated queries and alert presentations for the Firewall Denial Anomaly and Firewall Policy Anomaly detections to support Unified Threat Management (UTM) logs. These detections now read normalized UTM fields and display the UTM module and associated threat in
alert_subtype,description, andkey. The Firewall Denial Anomaly detection now adds event summarization to list all policies that produced a denial while continuing to usesrcip_hostand the existing data feed. The Firewall Policy Anomaly now includes the relevant UTM feature in the alert description. -
AELDEV-61209: Added the Outbytes Delta Anomaly subtype to the Outbytes Anomaly alert type.
Added an Outbytes Delta Anomaly subtype to the existing Outbytes Anomaly alert type for FortiGate Unified Threat Management (UTM) logs. This enhancement allows the alert type to identify sudden outbound data surges that might indicate data exfiltration. See Machine Learning Alert Type Details.
-
AELDEV-55554: Extended CrowdStrike alert integration to support additional detection message classes.
Extended the CrowdStrike alert integration to support additional detection message classes:
crowdstrike_EppDetectionSummaryEventandcrowdstrike_XdrDetectionSummaryEvent. See Integration of Third Party Native Alerts. -
AELDEV-53501: Added a No data status for Machine Learning detections in Detection Management.
Introduced the No data status in the Status column for Machine Learning (ML) detections. Stellar Cyber displays this status when an enabled detector has no alert data in the data store for seven days, indicating that there is insufficient input to train the model. When at least one alert is generated within seven days, the detector begins training and transitions to Ready. This enhancement provides clearer visibility into detector readiness and helps you distinguish between inactive models and fully trained detections. See Using the Detection Management System.
Stellar Cyber Platform
New Features
-
AELDEV-65875: Integrated Snowflake destination configuration with backend deployment and validation.
Integrated Snowflake configuration with backend deployment and validation. Saving a data pipeline now provisions and manages the Snowflake connector services, including start, update, and removal, based on configuration changes. Backend validation enforces required connection parameters and destination consistency before deployment. To configure, navigate to Data Pipeline | Configuration, select Snowflake as the destination, and provide
account,user,warehouse,database,schema, and authentication settings such aspasswordor key-based credentials. After applying changes, deployment brings up the services and begins data delivery if connectivity and permissions are valid. -
AELDEV-65303: Added support for Jinja2 templates in the email subject.
Enabled Jinja2 templating in the
Subjectfield for email notifications generated by Automated Threat Hunting workflows. Jinja2 is a full-featured templating engine that supports variables ({{ ... }}), conditionals, loops ({% ... %}), and filters for formatting and value transformation. This enhancement allows you to dynamically construct subject lines based on notification context data such as event severity, timestamps, or alert attributes. Existing Mustache templates, which support simple variable substitution, continue to work without change. With Jinja2 support, you can create more expressive and context-aware subject lines to improve alert prioritization and readability in downstream systems. -
AELDEV-65118: Added monitoring for stopped or delayed Automated Threat Hunting rule execution.
Added monitoring to detect missed or delayed executions of Automated Threat Hunting rules. When a scheduled rule runs ten minutes or more past its expected execution time, Stellar Cyber generates a notification to indicate a potential issue. A recovery notification is generated when the rule returns to its expected schedule.
Delays can occur due to data ingestion interruptions, resource constraints, or service disruptions that prevent rules from executing as expected. Because ATH rules generate detections and trigger downstream playbooks, missed executions can result in gaps in alerting and response activity. These notifications help you quickly identify detection blind spots, verify rule health, and restore coverage before operational visibility is impacted.
-
AELDEV-64826: Improved processing of vulnerability scan data to reduce Interflow record size and storage overhead.
Optimized the processing of vulnerability scan data to eliminate the duplication of large payload fields within individual Interflow records. Previously, large scan objects, such as Qualys and SentinelOne vulnerability data, were repeated across multiple derived records, which unnecessarily increased record size. The updated process stores a single canonical copy per scan and prevents redundant duplication in related records. This enhancement reduces storage consumption and improves data efficiency.
-
AELDEV-63706: Added separate Data Processor builds for Ubuntu 16.04 and Ubuntu 24.04.
Introduced release-specific Data Processor binaries and images for Ubuntu 16.04 and Ubuntu 24.04 to align with operating system and Python runtime requirements. Ubuntu 16.04 builds continue to use Python 2, while Ubuntu 24.04 supports Python 3 for new deployments and staged upgrades. This approach enables a controlled migration path from legacy environments to modern operating systems while maintaining upgrade continuity and deployment stability.
-
AELDEV-59284: Added Ubuntu 24.04 support for on-premises deployments.
Introduced a dedicated runtime and image set for on-premises deployments running Ubuntu 24.04 with Python 3. Earlier Ubuntu releases continue to use the existing runtime and image set to maintain stability during transition. Stellar Cyber maintains separate image sets to ensure operating system compatibility; image sets cannot be mixed across Ubuntu versions. This enhancement supports modernization to Ubuntu 24.04 while preserving upgrade continuity for existing deployments.
-
AELDEV-63615: Added Last executed timestamps to the Last Status report for Automated Threat Hunting playbooks.
Added Last executed timestamps to the Last Status report for Automated Threat Hunting playbooks. The report now displays execution timestamps for playbook components such as input processing, initialization, and configured actions, along with an icon indicating if each execution was successful. This enhancement lets you distinguish between the most recent execution time and the most recent triggered status, improving monitoring accuracy and troubleshooting.
-
AELDEV-63500: Added monitoring and alerts for Threat Intelligence Platform feed ingestion in the System Action Center.
Added monitoring and alerting for Threat Intelligence Platform feed ingestion within the System Action Center. Stellar Cyber now generates events for ingestion errors, retry exhaustion, sustained error rates, and absence of new indicators to help you detect feed disruptions. You can review feed status, metadata, and ingestion history and receive notifications through existing alerting channels. Each event includes remediation guidance to help you restore feed ingestion and maintain continuous threat intelligence coverage.
-
AELDEV-63497: Added System Action Center monitoring for ATH rule execution.
Added System Action Center monitoring for execution states of custom Automated Threat Hunting (ATH) rules. Stellar Cyber now generates alerts for consecutive failures, percentage-based failure rates, successful recovery after failure, and missed executions beyond a defined schedule tolerance. These alerts help you detect rule instability, prevent gaps in detection coverage, and verify recovery when execution resumes. Notifications use existing response actions and alerting channels for seamless integration with your operational workflows.
Improvements
-
AELDEV-65380: Added conditional handling for certain Data Processor upgrades.
Enhanced the Data Processor upgrade process to support a special upgrade mode controlled by a setting in the
ConfigMapenvironment. When this mode is enabled, the upgrade skips pulling container images, skips pod restart status checks, and disables automatic rollback. The upgrade logs clearly indicate the skipped steps and confirm that rollback was not attempted. This enhancement provides controlled upgrade behavior for environments that require customized Data Processor upgrade handling. -
AELDEV-63850: Added alert filter pre-check visibility.
Added a pre-check to evaluate alert filters before dispatch. Stellar Cyber now displays the predicted matching filter name in the alert Details section, allowing you to identify the likely filter responsible for suppression before ingestion. Alerts continue through the filtering component to preserve filter-hit accounting and downstream metrics. This enhancement improves transparency into alert filtering behavior and simplifies troubleshooting when alerts are not delivered as expected.
-
AELDEV-62599: Standardized the matches operator across correlation rules.
Standardized correlation rule behavior by replacing the
containsoperator withmatchesacross the user interface and configuration. Rules now evaluate exact match semantics rather than substring comparisons, ensuring consistent rule display and execution. This change resolves discrepancies that could cause unexpected rule triggers and improves predictability when authoring and running correlation logic. -
AELDEV-54686: Added tenant exclusion and generic connector options to notification rules.
Added tenant exclusion and generic connector selection options to System Action Center notification rules. You can now exclude specific tenants from rule evaluation and apply monitoring to all connector types without listing them individually. This enhancement simplifies rule configuration in multi-tenant environments, reduces duplication, and improves control over monitoring scope.
Sensors
New Features
-
AELDEV-64881: Added Netskope GENEVE packet parsing with vendor identification.
Added parsing of Netskope Generic Network Virtualization Encapsulation (GENEVE) packets. The parser sets
msg_origin.vendortonetskopeand normalizes key packet fields, including IP addresses, ports, applications, byte counts, and timing values, without requiring additional configuration. This enhancement ensures that Netskope-encapsulated traffic is correctly identified and consistently normalized, improving visibility, correlation accuracy, and investigation efficiency across environments that use Netskope for network security and access control.
Improvements
-
AELDEV-67936: Removed unnecessary sensor warning messages generated during routine connectivity checks.
Suppressed warning messages generated when sensors periodically contact Stellar Cyber to verify connectivity and retrieve operational information. Previously, this routine triggered a warning about an HTTPS request without certificate verification. Although the connection worked as expected and did not affect sensor operation, the warning appeared in system logs and automated notifications, which might have suggested a problem where none existed. Stellar Cyber now filters this message so routine connectivity checks run without producing unnecessary warnings, reducing log noise and helping you focus on meaningful operational events and security events.
-
AELDEV-67863: Prevented duplicate Windows event logs from being collected by Windows Server Sensors.
Improved Windows event collection in Windows Server Sensors to prevent duplicate logs from being generated under certain conditions. Previously, a Windows Server Sensor could reprocess previously collected Windows events and send them again, resulting in duplicate log entries. Stellar Cyber now ensures that Windows event collection resumes from the correct position so previously collected events are not processed again. By eliminating duplicate Windows logs, this change reduces noise in investigations and helps you analyze events more efficiently.
-
AELDEV-67573: Added a direct upgrade path for Windows Server Sensor versions 5.1.x through 6.3.x to 6.4.0 (x64).
Provided Windows Installer Patch (MSP) packages that enable in-place upgrades from supported 5.1.x–6.3.x Windows Server Sensor versions directly to 6.4.0 (x64). Each MSP package corresponds to a specific source version and follows the naming pattern
Windows_Sensor_<from>_6.4.0-x64.msp. The upgrade preserves existing configuration settings and automatically restarts the Windows Server Sensor service during installation. A user with local administrative privileges on the Microsoft Windows host where the Windows Server Sensor is installed must perform the upgrade. Supported platforms include Windows Server 2008 R2, 2012 R2, 2016, 2019, 2022, and Windows 10 and 11. This enhancement simplifies upgrade planning and reduces operational effort by eliminating intermediate upgrade steps. -
AELDEV-65126: Added SUSE Linux Enterprise Server 15 SP7 support for the Linux Server Sensor.
Added support for SUSE Linux Enterprise Server 15 SP7 for Linux Server Sensor deployments. Deployments on this platform now use the same installation package, configuration options, and lifecycle operations as other SUSE Linux Enterprise Server 15 releases. Systems running earlier supported SUSE Linux Enterprise Server 15 versions can upgrade to SP7 without requiring changes to existing sensor settings. This update ensures continued compatibility with current SUSE releases while simplifying upgrades and maintaining consistent monitoring across supported Linux environments.
-
AELDEV-62843: Added Linux Server Sensor support for Red Hat Enterprise Linux 10 and CentOS 10.
Added installation and upgrade support for the Linux Server Sensor on Red Hat Enterprise Linux 10 and CentOS 10. The self-contained installer now detects these operating system versions and loads the required runtime libraries to ensure successful deployment. Existing sensor deployments on these platforms also upgrade through the standard Linux Server Sensor upgrade process. This enhancement expands platform compatibility and enables deployment on newer enterprise Linux distributions.
-
AELDEV-63338: Added configurable log delivery timeouts for the Windows Server Sensor.
Added support for configuring per-source timeout values for Windows Event Logs and File Integrity Monitoring on the Windows Server Sensor to address high-latency or bandwidth-constrained environments. You can use the
set receiver timeout <seconds> winlogandset receiver timeout <seconds> fimcommands to allow independent timeout control. A value of0disables the timeout. Theunset receiver timeout winlogandunset receiver timeout fimcommands restore the default value of 90 seconds. Theshow receivercommand displays the effective timeout settings. This enhancement improves log delivery reliability and reduces premature timeout failures in variable network conditions. -
AELDEV-63298: Added configurable payload compression for the Windows Server Sensor.
Added support for gzip compression of Windows Event Log and File Integrity Monitoring payloads sent over HTTPS from the Windows Server Sensor. You can use the
set receiver compression <level> [winlog | fim]command to configure compression levels from0to9, where0disables compression and omission of the data type applies the setting to both sources. Theunset receiver compressioncommand restores the default compression level of1. Theshow receivercommand displays the active compression settings for each data type. Higher compression levels reduce bandwidth consumption while increasing CPU usage. This enhancement provides greater flexibility for environments with network constraints without requiring sensor profile changes. -
AELDEV-63220: Updated the Ansible sample inventory and playbook for Linux Server Sensor deployment.
Updated the sample Ansible inventory and playbook files used to automate Linux Server Sensor deployment. These files support automated installation and registration of the sensor in both on-premises and SaaS environments. The updated samples now support registration using either a token (SaaS deployments) or a Stellar Cyber platform IP address, as well as build selection and optional use of the all-in-one installer. This enhancement streamlines deployment automation and ensures consistent installation workflows across deployment models.
-
AELDEV-63119: Fixed Linux Server Sensor startup failures caused by complex traffic filter expressions.
Resolved Linux Server Sensor startup failures that occurred when pre–Deep Packet Inspection traffic filter expressions were excessively long, complex, or contained invalid syntax. The sensor now tolerates larger and more complex filter expressions and handles malformed syntax without preventing service startup. The update increased internal limits to support expanded filtering requirements. This enhancement improves sensor stability and prevents configuration errors from interrupting traffic monitoring.
-
AELDEV-60937: Added an enable or disable option for log forwarding in Modular Sensor profiles.
Added a control in Modular Sensor profiles that allows you to enable or disable the Log Forwarder module. You can disable log forwarding on Modular Sensors that do not require it. The setting applies only to Modular Sensors and does not affect other modules. Modular Sensors must run version 6.4.0 or later for the setting to take effect. This enhancement reduces resource usage and improves efficiency in environments where log forwarding is not required.
-
AELDEV-60813: Configured the Photon-100 Sensor on Ubuntu 22.04 to run at optimum CPU performance by default.
Changed the default CPU scaling setting so that the Photon-100 sensor running on Ubuntu 22.04 operates at higher processor speeds instead of dynamically reducing speed to conserve power. This setting ensures the CPU remains optimized for data processing workloads. The configuration persists across system reboots and sensor upgrades. This change applies only to Photon-100 and does not affect Photon-150 or Photon-160 models. This enhancement improves processing throughput and ensures consistent performance on supported Photon-100 deployments.
-
AELDEV-57158: Added an SSH client whitelist for the management interface on Ubuntu 22.04 sensors.
Added support for restricting SSH access to the management interface by specifying allowed source IP addresses or CIDR ranges on Ubuntu 22.04 sensors using the
set interface management ssh-whitelistcommand. The whitelist applies only to incoming SSH connections and does not affect outbound traffic or communication with the platform, receiver, or repository services. You can modify or remove the configuration through the CLI, including remote CLI and console access to prevent lockout. This enhancement strengthens access control and helps reduce exposure of the management interface to unauthorized SSH connections.
Connectors
New Features
-
AELDEV-63255: Introduced the People Risk Explorer connector.
Added the People Risk Explorer connector to ingest Organization Group Risk Posture, People Group Risk Posture, and People Risk Posture data through the People Risk Explorer API. See Configuring People Risk Explorer Connectors.
-
AELDEV-63140: Introduced the Stellar Cyber connector.
Added the Stellar Cyber connector to ingest User Activity data through the Stellar Cyber API. See Configuring Stellar Cyber Connectors.
-
AELDEV-62715: Introduced the Check Point Harmony Email connector.
Added the Check Point Harmony Email connector to ingest Security Event logs through the Harmony Email & Collaboration Smart API. See Configuring Check Point Harmony Email Connectors.
-
AELDEV-58090: Introduced the Vicarius connector.
Added the Vicarius connector to ingest Assets, Active Vulnerabilities, and Vulnerabilities through the Vicarius vRx API. See Configuring Vicarius Connectors.
Improvements
-
AELDEV-66127: Updated indexing and classification for Azure Firewall events ingested through the Azure Event Hub connector.
Changed the index for Azure Firewall events ingested through Azure Event Hub to Traffic. Updated
msg_classandmsg_origin.categoryto firewall for classification consistency. Existing connectors do not require reconfiguration. See Configuring Azure Event Hub Connectors. -
AELDEV-64620: Added the Structured Azure Firewall Log content type to the Azure Event Hub connector.
Added the Structured Azure Firewall Log content type to the Azure Event Hub connector. This content type is sent to the Traffic index (same as the Azure Firewall content type). See Configuring Azure Event Hub Connectors.
-
AELDEV-64572: Added option to disable SSL certificate verification for the Trend Micro Apex Central connector.
Added an option to disable SSL certificate verification for the Trend Micro Apex Central connector. See Configuring Trend Micro Apex Central Connectors.
-
AELDEV-64448: Changed the index for the Nodeware connector from Syslog to Scans.
Changed the index for the Nodeware connector from Syslog to Scans. See Configuring Nodeware Connectors.
-
AELDEV-63041: Added a configuration option for Deep Visibility in the SentinelOne connector.
Added a configuration option to specify the number of Deep Visibility items retrieved in an interval in the SentinelOne connector. The default is 20,000 items. Use caution when adjusting the limit. If it is too high, there are risks, for example, the SentinelOne API might not support the high number. See Configuring SentinelOne Connectors.
-
AELDEV-62696: Enhanced the Microsoft Entra ID connector with Add User to Group action.
Added an Add User to Group action for the Microsoft Entra ID connector. The Add User to Group action requires the GroupMember.ReadWrite.All permission. See Configuring Microsoft Entra ID (formerly Azure Active Directory) Connectors.
-
AELDEV-62608: Enhanced the Proofpoint on Demand connector with responders that use webhook templates.
Enhanced the Proofpoint on Demand connector with responders that use webhook templates that support actions. The webhook actions can be triggered manually or can enhance Automated Threat Hunting (ATH) actions. The actions are: Proofpoint on Demand Add to Org Block List, Proofpoint on Demand Add to Org Safe List, Proofpoint on Demand Delete From Org Block List, and Proofpoint on Demand Delete From Org Safe List. See Configuring Proofpoint on Demand Connectors.
-
AELDEV-62321: Added detections and observables for Microsoft Defender for Endpoint alerts.
Added population of detection fields and observables for Microsoft Defender for Endpoint alerts ingested through the Microsoft Graph Security API connector. The connector maps device evidence fields to standard host fields when processing Microsoft Defender alert events.
-
AELDEV-61588: Added support for Respond actions in Active Directory with Kerberos authentication.
Added support for Respond actions in the Active Directory connector with Kerberos authentication. However, selecting Data Processor in the Run On field in the General tab of the Add Connector screen is not supported. See Configuring Active Directory Connectors.
Parsers
New Features
-
DATA-3249: Introduced a parser for ingesting PostgreSQL logs.
Added a built-in parser for ingesting PostgreSQL logs in RFC 3164 syslog format on port 6083. Normalized fields include
timestamp,severity,process ID,database,user,client address, andmessageto support analytics and correlation. To enable syslog forwarding, configurelog_destinationtosyslogand setlog_line_prefixto include time, process ID, user, database, and host information before forwarding events to the sensor syslog listener. File-based PostgreSQL logs can also be forwarded through a syslog agent to the same listener. The parser supports standard PostgreSQL syslog and default log formats, improving visibility and correlation for database activity and security monitoring. -
DATA-3231: Introduced a parser for ingesting Radware DefenseFlow logs.
Added a built-in parser for ingesting Radware DefenseFlow logs over TCP syslog on port 6082. This parser processes multi-line messages and emits one event per payload segment to prevent data loss and ensure accurate event representation. Normalized fields populate common attributes to support correlation, detection, and reporting across network and security telemetry. To enable ingestion, configure Radware DefenseFlow to forward syslog traffic to the sensor IP address on TCP port 6082. This parser improves visibility into Radware mitigation and traffic events, enabling more reliable analysis and threat detection.
-
DATA-3222: Introduced a parser for ingesting Tait Communications Tait EnableFleet logs.
Added a built-in parser for ingesting Tait Communications Tait EnableFleet logs in RFC 5424 syslog format over TCP on port 6081. This parser normalizes authentication events, user lifecycle changes, role assignments, and configuration updates into consistent fields to support structured analysis. Parsed records populate fields such as
action,initiating_user,target_user,failure_reason,stellar_uuid, andmessageto enable precise filtering and correlation. To enable ingestion, configure EnableFleet to forward RFC 5424 syslog over TCP to the sensor syslog listener on port 6081. This parser improves visibility into identity and configuration activity, enabling stronger auditing, detection, and investigation workflows. -
DATA-3218: Introduced a parser for ingesting Absolute Secure Endpoint logs.
Added a built-in parser for ingesting Absolute Secure Endpoint logs with a custom RFC 5424 syslog header and CEF payload over TCP on port 6078. This parser extracts structured fields such as
eventType,actorType,actorName,actorID,objectType,objectName,objectID,verb,secondaryObjectType,secondaryObjectName,secondaryObjectID, andobjectPropertiesto support detailed activity tracking. To enable ingestion, configure the Absolute Secure Endpoint SIEM connector or a syslog forwarder to send CEF-formatted messages over TCP to the Sensor ingestion IP address on port 6078. Parsed events populate normalized fields and are available for search, correlation, and detection workflows. This parser improves visibility into endpoint activity and administrative actions reported by Absolute Secure Endpoint. -
DATA-3200: Introduced a parser for ingesting HPE Alletra logs.
Added a built-in parser for ingesting HPE Alletra logs in RFC 3164 syslog format on port 6079. This parser normalizes Linux process-related event fields to support consistent indexing and analysis. This parser provides structured visibility into system and process activity, improving search accuracy, correlation, and detection capabilities.
-
DATA-3199: Introduced a parser for ingesting HPE iLO Amplifier Pack logs.
Added a built-in parser for ingesting HPE iLO Amplifier Pack logs in syslog format over TCP on port 6080. This parser enables consistent normalization and reliable device context, enhancing search, correlation, and detection outcomes.
-
DATA-3197: Introduced a parser for ingesting Skyhigh Secure Web Gateway logs.
Added a built-in parser for ingesting Skyhigh Secure Web Gateway logs in RFC 3164 syslog format on port 6076. This parser extracts attributes from
header_first_line, maps native fields to the vendor namespace, and normalizesvirus_nametothreatwhen present to ensure consistent threat classification. This parser enhances visibility into web traffic security events and improves threat detection accuracy for Skyhigh Secure Web Gateway deployments. -
DATA-3190: Introduced a parser for ingesting Tait Communications Tait EnableProtect logs.
Added a built-in parser for ingesting Tait Communications Tait EnableProtect logs in RFC 5424 syslog format on port 6077. The parser normalizes header attributes into fields such as
event_time,severity,host, andapp_name, and extracts the first structured data element to populatevendorandproductfor accurate classification. This parser improves structured visibility into Tait EnableProtect activity and enables consistent filtering and correlation across Tait network management events. -
DATA-3186: Introduced a parser for ingesting Datto AP (Datto Wi-Fi) logs.
Added a built-in parser for ingesting Datto AP (Datto Wi-Fi) logs in RFC 3164 syslog format on port 6075. The parser normalizes
hostapdevents, including association, authentication, deauthentication, and client state transitions. Extracted attributes include MAC address, SSID, access point identifier, and result codes to support structured filtering and correlation. This parser enhances visibility into wireless client activity and access point behavior, enabling more effective monitoring and investigation of Datto wireless environments. -
DATA-3182: Introduced a parser for ingesting Cisco WSA logs.
Added a built-in parser for ingesting Cisco Web Security Appliance (WSA) access logs in RFC 3164 syslog format on port 6074. The parser supports the Squid-format access log field order and extracts
timestamp,client_ip,url,http_method,http_status,bytes_transferred,request_duration,user_name,action, and related proxy attributes. This parser enables consistent normalization of web proxy activity, improving visibility, correlation, and analysis across Cisco WSA deployments. -
DATA-3177: Introduced a parser for ingesting threatER Enforce logs.
Added a built-in parser for ingesting threatER Enforce logs in RFC 5424 syslog format on port 6073. The parser supports octet-counted framing as defined in RFC 6587 and extracts key-value pairs from the message body, mapping fields such as source and destination IP address, source and destination port, protocol, action, direction, reason, and flags to normalized attributes. Parsed events are routed to the Traffic data domain, enabling accurate correlation and analysis of network enforcement activity from threatER Enforce.
-
DATA-3171: Introduced a parser for ingesting AWS CloudWatch logs.
Added a built-in parser for ingesting AWS CloudWatch logs in JSON format on port 6071. This parser supports single-line JSON events from AWS Lambda custom application logs and extracts structured attributes such as
trace_id,timestamp,service_name,environment,execution_time_ms,request,response,error, and nested fields within the events array. Events containing network attributes (srcip,dstip,srcport,dstport,proto) are routed to the Traffic index, and all other events are routed to the Syslog index. This parser improves visibility into AWS Lambda execution activity and enables consistent normalization for cloud application monitoring and analysis. -
DATA-3169: Introduced a parser for ingesting Synology DiskStation Manager (DSM) logs.
Added a built-in parser for ingesting Synology DiskStation Manager (DSM) logs in RFC 3164 and RFC 5424 syslog formats on port 6072. The parser supports DSM version 7.1 and later and normalizes authentication events, file and share access activity, service and package changes, and configuration updates into structured fields. Events containing threat-related attributes are routed to the IDPS/Malware Sandbox Events index, network-related events are routed to the Traffic index, and all other events are routed to the Syslog index. This parser improves visibility into storage system activity and enables detection and correlation of administrative and access-related changes on Synology NAS devices.
-
DATA-3158: Introduced a parser for ingesting CTM360 Data Leakage Protection logs.
Added a built-in parser for ingesting CTM360 Data Leakage Protection logs in RFC 5424 syslog format on port 6084. This parser normalizes credential-leak notifications into structured fields, including
leak_id,website,username,password,computer_name,leak_type,leak_source,status,date_compromised,first_seen,last_seen,created_at,updated_at,validate_at, andremediate_at. Events containing network attributes such assrcip,srcport,dstip,dstport, andprotoare routed to the Traffic index, and all other events are routed to the Syslog index. This parser improves visibility into exposed credential activity and enables consistent correlation and detection of data leakage events across environments. -
DATA-3151: Introduced a parser for ingesting Darktrace alerts in CEF format.
Added a built-in parser for ingesting Darktrace alerts in Common Event Format (CEF) on standard CEF ingestion ports 5143 and 5870. This parser extends CEF processing to normalize Darktrace-specific fields into the Stellar Cyber schema.
The parser maps key fields as follows:
-
cef.severity > event.severity(numeric range 1–10) -
cef.name > event.threat.name -
msg_data[name="dvchost"].strvalue > host.name -
msg_data[name="darktraceurl"].strvalue > darktrace.darktraceurl -
msg_data[name="externalid"].strvalue > darktrace.externalid -
msg_data[name="message"].strvalue > darktrace.message -
hostip_username > user.name -
hostip_usersid > user.id
This normalization ensures that Darktrace alerts are consistently enriched and correlated with other telemetry across the platform.
-
-
DATA-3147: Introduced a parser for ingesting ThreatX logs.
Added a built-in parser for ingesting ThreatX logs in syslog format over TCP on port 6070. The parser extracts HTTP request and response metadata, network context, and action outcomes to support structured analysis of application-layer security events. This parser enhances visibility into web traffic inspection activity and improves correlation and detection capabilities for ThreatX deployments.
-
DATA-3144: Introduced a parser for ingesting Microsoft RDWebAccess logs.
Added a built-in parser for ingesting Microsoft RDWebAccess logs in JSON format on port 6068. This parser supports ingestion of IIS-based Remote Desktop Web Access logs that have been converted to JSON and forwarded through Generic Data Capture or existing TCP listeners. Extracted fields include
timestamp,client_ip,server_ip,http_method,uri,http_status,user_agent, andusernameto provide structured visibility into remote access activity. This parser improves monitoring and investigation of RDWebAccess usage by enabling consistent search, correlation, and analysis of authentication and web session events. -
DATA-3143: Introduced a parser for ingesting Netgear Smart Switch logs.
Added a built-in parser for ingesting Netgear Smart Switch series logs in RFC 3164 syslog format on port 6069. This parser normalizes standard switch event attributes to support structured search, correlation, and detection across Smart Switch environments.
-
DATA-3136: Introduced parsers for ingesting Check Point SmartConsole and SmartDefense logs.
Added built-in parsers for ingesting Check Point SmartConsole and Check Point SmartDefense logs in Common Event Format (CEF) on TCP ports 5143 (standard CEF) and 5870 (octet-counted CEF).
The Check Point SmartConsole parser extracts structured attributes from CEF payloads, including administrator activity fields parsed from the
msg_dataarray such asadministrator,requestcontext,objectname,additional_info, and related event timing and counter values. These fields enable detailed audit reporting of administrative actions, policy changes, and management activity, improving visibility and search accuracy for compliance and operational monitoring.The Check Point SmartDefense parser extracts threat prevention and detection attributes, including rule identifiers such as
cu_rule_id, detection metadata such ascu_detected_by, and additional event context from structured CEF extensions. By normalizing these fields into discrete searchable attributes, the parser improves correlation, reporting, and detection fidelity for SmartDefense security events. -
DATA-3094: Introduced a parser for ingesting Imperva SecureSphere logs.
Added a built-in parser for ingesting Imperva SecureSphere logs in customized Common Event Format (CEF) on port 5143. This parser supports Imperva-specific CEF header variations in which
cef_device_event_class_idcan be optional and ensures continued parsing when the device event class identifier field is omitted. Extracted labeled custom string fieldscs1throughcs5usingcs1Labelthroughcs5Label, mapping them to normalized attributes such aspolicy,servergroup,servicename,applicationname, anddescription, and parsedactasaction. This parser improves normalization accuracy and ensures reliable field extraction for Imperva SecureSphere events, enabling consistent search, filtering, and correlation. -
DATA-3087: Introduced a parser for ingesting Check Point Harmony Mobile logs.
Added a built-in parser for ingesting Check Point Harmony Mobile logs in priority and key-value pair (KVP) syslog format on port 6067. This parser normalizes user identity attributes by mapping
DeviceEmailtouser.nameand populatingusernamewhere applicable, ensuring consistent identity representation across events. It improves correlation and detection accuracy for Harmony Mobile telemetry by aligning user fields with existing normalized identity attributes. -
DATA-3048: Introduced a parser for ingesting HarfangLab EDR logs.
Added a built-in parser for ingesting HarfangLab EDR logs on port 6066 in either RFC 3164 syslog format with JSON payloads or in RFC 5424 syslog format. This parser normalizes endpoint telemetry into the Stellar Cyber schema and classifies anti-malware detections as threat events, routing them to the IDPS/Malware Sandbox Events index. Network-related events populate the Traffic index when source and destination address fields are present, and all other events are routed to the Syslog index. Structured attributes such as
process,host,user,srcip,dstip,srcport,dstport,proto,threat, andthreat_idare extracted into normalized fields to support investigation and analytics. This parser improves visibility into HarfangLab endpoint activity and enables consistent threat detection and reporting across environments. -
DATA-3048: Introduced a parser for ingesting Mage Data Platform logs.
Added a built-in parser for ingesting Mage Data Platform logs in Mage Data custom comma-separated values (CSV) format on port 6085. This parser maps the first 17 columns in order—
INSTANCE_ID,INSTANCE_NAME,JOB_ID,ALERT_JOB_ID,ALERT_NAME,ALERT_TYPE,RETRIEVE_FLAG,ACTION_DATE,USER_NAME,IP_ADDRESS,HOST,PROGRAM,DC_NAME,MODULE,SERVER_NAME,DB_NAME, andPARSER_KEY—into structured fields, and ignores any columns that follow. The value inACTION_DATEsets the event timestamp. This parser improves structured visibility into Mage Data alert activity and enables consistent correlation of data leakage events across environments.
Improvements
-
DATA-3266: Expanded the Oracle Solaris syslog parser to support updated headers and message formats.
Enhanced the Oracle Solaris parser to recognize updated syslog header prefixes and revised message structures. The parser now extracts and normalizes fields including
timestamp,hostname,process,pid,facility,severity, andmessage, while maintaining compatibility with existing Oracle Solaris log sources. This improvement enables more accurate normalization and supports more reliable search, correlation, and detection. -
DATA-3264: Added support for additional VMware ESXi syslog formats and field mappings.
Expanded the VMware ESXi parser to recognize additional syslog header formats and structured data entries without quotation marks. Mapped normalized fields including
timestamp,host,app,proc_id,msg_id, andseverity, and populated key-value pairs in the message body into fields prefixed withkv_. This enhancement improved parsing consistency and ensured accurate normalization across diverse ESXi log formats. -
DATA-3260: Expanded Barracuda Firewall parser support for Barracuda Web Application Firewall syslog.
Enhanced field extraction for Barracuda Web Application Firewall syslog within the Barracuda Firewall parser to improve normalization and detection coverage. When the corresponding data source is enabled in
Detection Management, parsed fields now populate detections that target WAF data, including WAF Internal Attacker. This enhancement improves visibility into WAF activity and strengthens detection accuracy for web application threats. -
DATA-3257: Improved parsing of Fortinet FortiGate performance statistics logs.
Enhanced extraction of performance metrics from Fortinet FortiGate performance log events. Extracted discrete key-value fields from
msg_data, includingcpu,mem,totalsession,disk,bandwidth,setuprate,disklograte,fazlograte,freediskstorage, andsysuptime. The parser retainedwaninfoas a structured string representing interface metrics. These enhancements improved visibility into FortiGate device health and resource utilization. -
DATA-3251: Expanded field coverage for the Check Point CEF parser.
Expanded Check Point Common Event Format (CEF) parsing to normalize additional fields and handle duplicate extensions. The parser maps
csXLabelpluscsXpairs to canonical keys under thecheckpointnamespace. Fields previously emitted asstrvalueinmsg_databecame searchable, includingrule_name,rule_action,layer_uuid,nat_rulenum,service_id,creation_time, andduration. Colons in keys were removed, and when identical keys repeat, only the first populates normalized fields. This enhancement lets you query previously unsearchable Check Point fields using normalized keys, expands structured field coverage, and delivers more consistent parsing for accurate investigations. -
DATA-3245: Improved parsing of Absolute Secure Endpoint object properties.
Enhanced structured extraction of the
objectPropertiesfield in Absolute Secure Endpoint events. The parser now populatesabsolute_secure_endpoint.objectProperties_objas an array of objects containingproperty,old_value, andnew_value, with multi-valued entries represented as ordered arrays. The originalobjectPropertiesstring remains available for backward compatibility and search. You can queryabsolute_secure_endpoint.objectProperties_obj.propertyand filter onabsolute_secure_endpoint.objectProperties_obj.new_valueorabsolute_secure_endpoint.objectProperties_obj.old_value. This enhancement lets you detect and report on configuration changes more precisely by converting unstructured change data into queryable structured fields while maintaining backward compatibility. -
DATA-3243: Enhanced Barracuda Web Application Firewall log parsing.
Enhanced Barracuda Web Application Firewall (WAF) log parsing from the
Log Event Descriptionfield. The parser extracts User-Agent strings, email addresses, and additional key-value pairs as discrete fields for search, correlation, and detection. Existing WAF data sources parse these attributes automatically; no configuration changes are required. Ensure the data source uses theBarracuda WAFproduct type and forwards syslog using the BarracudaExport Log Formatsoutput. -
DATA-3241: Improved parsing of Fortinet FortiWeb log messages.
Enhanced parsing of the msg field in Fortinet FortiWeb logs by mapping
log_idvalues to message patterns and extracting structured fields. The parser now extractsserver_ip,server_port,server_pool, andstatus. To ensure correct ingestion, send FortiWeb logs to the Fortinet FortiWeb parser rather than to the generic Common Event Format parser. -
DATA-3240: Enhanced the F5 BIG-IP Virtual Edition parser to support additional syslog formats.
Enhanced the F5 BIG-IP Virtual Edition parser to support RFC 3164 syslog headers, BIG-IP key-value content, and raw log messages without headers. Parsing now accepts messages with or without a syslog header, normalizes timestamps, and extracts BIG-IP key-value pairs into structured fields for consistent normalization. No additional transformation is required to accommodate different syslog header formats. Logs can be forwarded over syslog with the header preserved or sent as raw BIG-IP log output. This enhancement improves parsing accuracy and ensures consistent field extraction across varied BIG-IP logging configurations.
-
DATA-3234: Enhanced the parser for Kaspersky Security Center logs.
Enhanced field extraction for Kaspersky Security Center events. Parsing recognizes key-value pairs within
syslog_messageand maps them to discrete fields. Values foraction,result,host,user, andapplicationpopulate corresponding normalized fields when present. This enhancement lets you analyze Kaspersky event activity more consistently by converting embedded key-value data into structured, queryable fields. Existing Syslog inputs continue to function without reconfiguration, provided the complete vendor-formatted message is forwarded through Syslog to ensure proper field mapping. -
DATA-3230: Improved parsing of structured request data in F5 Application Security Manager events.
Enhanced parsing of structured JSON content embedded in the
f5.full_requestpayload within F5 Application Security Manager events received in Common Event Format. When valid JSON is present, the parser populatesf5.full_request_objwith extracted fields while preserving native data types. You can query extracted values usingf5.full_request_obj.<field>(for example,f5.full_request_obj.monto). Parsing applies automatically to new events and does not modify existing F5 fields. Stellar Cyber continues to send events that includeattack_typeto the IDPS/Malware Sandbox Events index without requiring any configuration changes. This enhancement lets you analyze structured request payload data directly without relying on raw JSON searches while preserving existing F5 field behavior. -
DATA-3221: Improved parsing for additional Radware DefensePro and DefenseFlow log formats.
Enhanced the Radware DefensePro parser to support log headers that omit the
APP-NAMEfield and to recognize Radware DefenseFlow message patterns. Devices that omitAPP-NAMEor use-now parse consistently. Multi-line DefenseFlow records parse header fields only; message content remains unparsed. Multi-line ingestion is available only over User Datagram Protocol (UDP). To ensure consistent parsing, configure devices to emit Request for Comments (RFC) 5424-compliant headers and prefer single-line messages. Logs that match these formats parse automatically. -
DATA-3217: Improved support for alternative field orders in Internet Information Services log parsing
Added support for alternative field orders in Internet Information Services (IIS) World Wide Web Consortium (W3C) Extended Log File Format logs. Parsing uses a configured mapping and does not read the
#Fieldsheader. When the header is absent, the parser accepts both the configured sequence and a supported alternate sequence. This enhancement corrected the default field list to resolve a key typo and align mappings. -
DATA-3216: Expanded field extraction for Fortinet FortiGate logs.
Mapped additional Fortinet FortiGate log values from
msg_datato dedicated fields. To enable richer filtering and correlation, events now includevirus,viruscat,virusid,filehash,filehashsrc,referralurl,dstuser,dstuuid,srcuuid,dtype,countav,countdns,countssl,countweb,tlsver, andsslaction. The parser normalizesfilenametofile.nameanddstusertodstip_username. Queries, detections, and dashboards can filter, group, and alert on these fields. Parsing applies to newly ingested data; reprocessing is required to update historical events. -
DATA-3195: Added Request for Comments (RFC) 5424 Syslog header support for the Radware Cyber Controller Plus parser.
Added Request for Comments (RFC) 5424 Syslog header support for the Radware Cyber Controller Plus parser. To ensure consistent ingestion of header-prefixed events, the parser recognizes and extracts header fields before parsing the payload. Events with an RFC 5424 header now parse and normalize; the 28-column payload mapping remains unchanged. Parsed records populate
event_type,severity,event_time,src_ip,dst_ip,dst_port,protocol,direction,policy, andevent_id. Previously rejected messages no longer show theUnsupported formaterror. Existing sources require no changes. For new sources, assign the Radware Cyber Controller Plus parser to the data source. -
DATA-3191: Added authentication field parsing for VMware vCenter Single Sign-On log messages.
Added vendor namespace fields for VMware vCenter Single Sign-On authentication events. Logs containing the phrase "Authentication succeeded" now populate
authentication_statuswith "succeeded",tenant_usernamewith the user principal, andtenantwith the tenant domain. The original message remains inlog.event_descriptionfor search and correlation. Parsing applies to syslog messages from the Single Sign-On service that follow the documented format. No new top-level fields are introduced. This enhancement lets you filter and analyze authentication activity by outcome, tenant, and user while preserving the original log content for reference. -
DATA-3179: Expanded VMware ESXi log parsing support.
Enhanced the VMware ESXi parser to support additional log formats and syslog header standards. The parser now accepts Request for Comments 5424 syslog headers and recognizes Envoy Proxy access logs as well as
vpxa,rhttpproxy,hostd-probe, andlocalclimessages. To ensure consistent field semantics in unixlogs, the top-levelactionfield now maps tovmware_esxi.action. Update saved searches, dashboards, and rules that referenceactionto usevmware_esxi.actioninstead. No ingestion changes are required, and supported events parse automatically. This enhancement improves parsing coverage and field consistency across VMware ESXi log sources. -
DATA-3178: Added support for a new header format in Cisco Unified Communications Manager parser.
Added support for a variant syslog header in the Cisco Unified Communications Manager (CUCM) parser. The parser now recognizes headers formatted as
priority,message counter,timestamp,application identifier,severity code,event name, andtagswhile existing header formats remain supported. Configure syslog inputs to use the Cisco CUCM parser to normalize these events, and update any custom pipelines, dashboards, or searches that reference prior field keys to align with the extracted fields. No additional configuration is required for default deployments. -
DATA-3174: Improved parsing of HPE OfficeConnect (1920S/1820) switch logs.
Enhanced parsing of HPE OfficeConnect (1920S/1820) syslog messages to support the modified Request for Comments 3164 header format and user session events. The parser now recognizes
USER_MGRmessages and extractssession_id,event_action,username, andclient_source_ip. No configuration changes are required for existing deployments, and events appear under the HPE Switch data source. This enhancement improves visibility into user session activity on OfficeConnect switches by converting session details into structured, queryable fields. -
DATA-3166: Improved support for time zone timestamps in Cisco router and switch syslog messages.
Enhanced parsing of Cisco router and switch syslog messages that include a time zone in the
timestampfield. Messages now parse correctly and appear in the user interface with accurate time interpretation. Existing syslog forwarding configurations require no changes. This enhancement ensures consistent event timing and accurate analysis across devices configured with time zone–aware timestamps. -
DATA-3164: Added support for Radware Cyber Controller Plus log format variations.
Added support for Radware Cyber Controller Plus log headers and leading field variations. Parsing now recognizes Classless Inter-Domain Routing (CIDR) notation for network ranges and consistently extracts IP addresses. Comma-Separated Values (CSV)-encoded sections parse correctly to prevent field misalignment. Configure the data source as Radware Cyber Controller Plus or assign the corresponding parser to the connector to enable the enhanced parsing.
-
DATA-3162: Improved parsing and normalization of Kaspersky Security Center threat events.
Enhanced parsing and normalization of Kaspersky Security Center event@23668 threat logs. The parser maps source parameters to the following normalized fields:
-
p1>hash.sha256 -
p2>url -
p5>threat.name -
p7>user.name -
hip.host.ipandhostip -
hdn>host.name -
tdn>kaspersky_security_center.component -
et>kaspersky_security_center.event_type -
etdn>kaspersky_security_center.event_type_description -
md5from nestedp9JSON >hash.md5
The message section parses key-value pairs for
process.name,process.executable, andprocess.pid. Parsing supports both legacy and updated layouts and handles events such asGNRL_EV_VIRUS_FOUNDandGNRL_EV_VIRUS_FOUND_AND_BLOCKED. To ensure correct parsing, configure sources to send Request for Comments 5424 messages with structured dataevent@23668. This enhancement improves threat visibility by converting embedded event parameters into consistent, queryable security metadata. -
-
DATA-3155: Improved Forescout syslog parsing for Network Access Control Policy Log and Connection Status events.
Enhanced extraction from Forescout syslog messages for Network Access Control (NAC) Policy Log and Connection Status events. The parser normalizes
log_type,source_ip,rule,details,status, andreasonfor policy entries, andtype,source,target,vendor, andseverityfor connection entries. Parsing covers repeated key-value sections, quoted values, and missing fields to ensure consistent results across varied syslog formats. Coverage activates automatically for existing Forescout syslog sources without needing any configuration changes. -
DATA-3154: Added normalization and enrichment for Palo Alto Networks Prisma Cloud (Compute Edition) events.
Added field normalization and enrichment for the Palo Alto Networks Prisma Cloud (Compute Edition) parser. The
event.threat.namefield derives frompalo_alto_networks_prisma_cloud.incident_category, thenpalo_alto_networks_prisma_cloud.attack_type, thenpalo_alto_networks_prisma_cloud.attack_techniquesin priority order. Theevent.severity_strfield maps frompalo_alto_networks_prisma_cloud.severity. The parser applies automatically when you configure Palo Alto Networks Prisma Cloud (Compute Edition) as the data source. -
DATA-3148: Added normalization for SAP Security Audit parser fields.
Added normalization for the SAP Security Audit parser. Events now map
algusertouser.nameandusername, and mapalgltermtohost.nameandhostname. The originalalguserandalgltermfields remain available for reference. To avoid type conflicts with the nestedhostobject, normalization does not write tohostas a string. No configuration changes are required for existing data sources. -
DATA-3146: Enhanced the McAfee Network Security parser to support customizable syslog field order.
Enhanced the McAfee Network Security parser to support configurable syslog field order as defined in Network Security Manager. The parser processes exclamation mark (
!)–delimited payloads and dynamically maps fields according to the customized message sequence. Parsed values populate attributes such astimestamp,local_header_timestamp,vendor_event_id, normalizedseverity(1–100),srcip,dstip,srcport,dstport,app_name,proto, andthreat_name. Changes to field order in Network Security Manager are recognized automatically without additional parser configuration. This enhancement improves parsing flexibility and ensures accurate normalization across varied McAfee IPS syslog configurations. -
DATA-3142: Added support for Varonis DatAdvantage events in the Common Event Format parser.
Enhanced the Common Event Format parser to recognize Varonis DatAdvantage events. The parser identifies
deviceVendor=VaronisanddeviceProduct=DatAdvantageheaders and maps key extensions to normalized fields, includingaction,event_time,user,host,severity, andexternal_id. Parsing applies to events that include these identifiers in the CEF header. To ensure proper ingestion, send CEF logs to port 5143 or, if necessary, ingest on port 514 with Log Source redirection enabled to the CEF parser. This enhancement improves visibility into Varonis activity by normalizing key event attributes for consistent analysis and detection. -
DATA-3138: Improved parsing support for Ruckus SmartZone Network Controller logs.
Corrected key-value parsing failures in the Ruckus SmartZone Network Controller parser that previously raised an undefined method error. The parser now recognizes Linux syslog events from the Secure Shell daemon and
sudowithin controller logs. Field normalization aligns extracted values tosrc_ip,dst_ip,action,user,facility, andseverity. Existing data sources ingest these events without requiring custom rules. To apply this parser, assign the Ruckus SmartZone Network Controller parser to the appropriate data source in the parser configuration. This enhancement improves parsing reliability and extends visibility into controller authentication and privilege activity. -
DATA-3133: Improved the F5 BIG-IP LTM parser to support CEF logs in syslog headers.
Improved the F5 BIG-IP LTM parser to support Common Event Format (CEF) logs encapsulated in syslog headers. The parser recognizes CEF headers and key-value pairs in F5 HTTP Request events and maps them to normalized fields for analytics and detection. To ensure consistent parsing across deployments, ingestion accepts the encapsulated format and extracts standard attributes, extensions, and message text. Configure the log source to emit CEF over syslog and select the F5 BIG-IP LTM parser in ingestion settings.
-
DATA-3123: Improved parsing of attackers and targets fields in NetScout Omnis Cyber Intelligence logs.
Enhanced parsing of
attackersandtargetsvalues from themsg_datasection of NetScout Systems Omnis Cyber Intelligence events. The parser now populates these values as keys under thevendornamespace for consistent querying and content development. Parsing forresponderIPPortremains unchanged, and destination port mapping continues to require a valid numeric value from the sender configuration. This enhancement improves visibility into attacker and target relationships by converting embedded event details into structured, queryable fields while preserving existing port-handling behavior. -
DATA-3122: Improved field normalization for Check Point Harmony Email Collaboration logs.
Moved the
actionfield from the top-level event fields into a vendor-specific namespace for Check Point Harmony Email Collaboration events. To prevent conflicts with firewallactionsemantics, the parser no longer populates a globalactionfield for this data source. Therefore, you must update searches, correlation rules, and dashboards that previously referenced the top-levelactionfield to use the vendor-scoped field instead. JSON validation enforces the expected event structure. This enhancement improves field consistency and eliminates ambiguity between email and firewall action semantics. -
DATA-3119: Added classification for Forescout Network Access Control events.
Enhanced Forescout log parsing for Network Access Control (NAC) events. Parsing assigns the
log_typevalue "NAC Policy Log:" or "NAC Policy Match/Unmatch Event" based on the presence offorescout.match. The parser handles concise and extended formats, including these optional fields:details,forescout.rule,forescout.device, andforescout.source. No configuration changes are required. -
DATA-3115: Enhanced the Trend Micro TippingPoint parser to support SMS 2.5 syslog.
Expanded parsing for Trend Micro TippingPoint to support Security Management System (SMS) 2.5 syslog format and to extract structured attributes from
log.event_description. The parser now mapssrc_ip,dst_ip,src_port,dst_port,protocol,signature,severity,policy, andactioninto discrete normalized fields to improve search, correlation, and detection accuracy. Configure the data source in Data Sources | Add Data Source | Trend Micro TippingPoint and enable syslog ingestion from the SMS. Existing deployments using earlier SMS formats continue to parse without modification, ensuring backward compatibility while extending visibility for newer SMS 2.5 environments. -
DATA-3102: Improved validation and normalization of the action field in the Zscaler ZIA Firewall parser.
Enhanced validation and normalization of the
actionfield for Zscaler Internet Access Firewall logs. The parser now promotes only recognized values to the top-levelaction, includingallowed,passed,log,alerted,warning,blocked,block,deny,drop,reject, andalert. While the parser continues to useblockedfor Web Application Firewall logs, it now normalizesblockedtoblockfor firewall logs and no longer populates the top-level action field with unrecognized values. As a result, you must update saved searches and dashboards that referenceaction = blockfor firewall events. This enhancement improves field consistency and ensures reliable filtering and correlation based on validated firewall action values. -
DATA-3100: Improved Palo Alto Networks parser for Audit events.
Enhanced the Palo Alto Networks parser to support Audit log events. Audit events now parse and normalize correctly, including entries with quoted values and embedded delimiters, eliminating previous unsupported type errors. This enhancement improves visibility into administrative activity by ensuring Audit events are consistently parsed and available for analysis and correlation.
Existing Palo Alto Networks syslog sources require no changes. As long as Audit logging is enabled on the firewalls, they continue forwarding logs using the existing configuration.
-
DATA-3013: Expanded VPN event normalization in the FortiGate CEF parser.
Enhanced normalization of FortiGate Common Event Format logs to identify changes to VPN connections, disconnections, authentication successes or failures, and tunnel states. The parser populates
event_type,category,src_ip,dst_ip,user,action,result, andsession_idfor these events. This enhancement enables consistent evaluation and correlation of VPN activity across data sources. -
DATA-2516: Improved time zone handling in the Fortinet FortiAnalyzer parser.
Enhanced parsing of the
event_timefield in Fortinet FortiAnalyzer logs to incorporate thetz(time zone) value when present. Previously, only thedateandtimefields were used to constructevent_time, which could result in incomplete time interpretation. The parser now recognizes supportedtzformats and includes the time zone when deriving the event timestamp. This enhancement ensures more accurate event timing and consistent correlation across time zone-aware deployments. -
DATA-2368: Enhanced the EfficientIP SOLIDserver parser to normalize DNS query names.
Enhanced the EfficientIP SOLIDserver parser to populate the standard
dns.question.namefield with DNS query values. The vendor-specificdns_queryfield remains available for backward compatibility. This change enables consistent DNS search, detection, and correlation across data sources that use normalized DNS fields.
Usability
New Features
-
AELDEV-65673: Improved dashboard authoring with a reusable, responsive, grid-based layout and improved usability controls.
Enhanced the dashboard layout editor with a reusable, responsive, grid-based system that supports drag-and-drop repositioning, dynamic adjustments of surrounding dashboard components, and breakpoint-aware views. The updated authoring experience greatly improves ease of use, streamlines dashboard customization, and enables faster iteration for operational reporting.
-
AELDEV-65401: Added a match any operator for the relationship between queries in correlation rules.
Added a match any operator that returns a match when any word in the results from one query appears in those of the other, using a logical OR evaluation. To do this, use matches any on the relationship between two correlated queries to find partial matches between returned values, and use match when all words must be present in the values returned from both queries. This enhancement increases flexibility in cross-event comparisons and improves correlation rule precision.
-
AELDEV-63686: Updated the Resources page in the UI with standardized controls and improved accessibility.
Updated the System | DATA MANAGEMENT | Resources page to use standardized table controls, including search, filters, column selection, pagination, and bulk selection. Primary actions now appear under Add Resource and row-level Actions menus with consistent confirmation dialogs. In addition, keyboard navigation and screen reader labeling improve accessibility, and layouts adapt to different screen sizes.
-
AELDEV-61719: Improved the Role-Based Access Control management interface.
Improved the Role-Based Access Control (RBAC) management interface to present roles, permissions, and user assignments in a consolidated view. You can access the updated pages at System | ORGANIZATION MANAGEMENT | Role-Based Access Control and create and edit roles, assign permissions, and review effective access within a unified workflow. Enhanced filtering and sorting help you locate roles and permissions more efficiently, and consistent field labels and actions improve clarity and usability.
-
AELDEV-61703: Updated the Log Filters page in the UI for improved organization and usability.
Updated the System | DATA SOURCE MANAGEMENT| Data Filters | Log Filters page with a reorganized interface that streamlines rule management across supported data sources. You can create, edit, enable or disable, and reorder filter rules using the enhanced layout. Existing filter rules remain active and retain their evaluation order, and no action is required to maintain current filtering behavior.
-
AELDEV-61193: Improved pagination performance on Case List pages.
Optimized pagination behavior on Case List pages by eliminating direct navigation to specific page numbers. Navigation uses Previous and Next controls for page movement. This enhancement delivers faster page transitions and a more responsive browsing experience when viewing large case volumes.
-
AELDEV-58267: Added UI support for sensor agent uninstallation.
Added the ability to initiate sensor agent uninstallation directly from the user interface before deregistration. You can select one or more connected sensors and issue an uninstall command as part of the delete workflow. The uninstall option is available only for connected sensors. The workflow displays operation status and records actions for audit and compliance purposes, improving operational control and lifecycle management of deployed agents.
-
AELDEV-54404: Added the ability to configure Case Management Queues.
Added the ability to configure and manage case management queues. You can create, view, and modify case queues directly in the UI to better organize case assignment and workflow handling.
-
AELDEV-53268: Updated SAML single sign-on configuration options in the user interface.
Updated the Security Assertion Markup Language (SAML) single sign-on configuration to improve how identity provider settings are defined and managed. You can configure settings such as Assertion Consumer Service (ACS) URL, Single Logout URL, NameID format, and certificates using X.509 certificate or metadata XML upload within the streamlined configuration workflow. Existing SAML integrations continue to function without changes, ensuring a smoother configuration experience without impacting current deployments.
Improvements
-
AELDEV-62963 / AELDEV-62964: Added Public API endpoints for device and server sensor monitoring rule creation.
Added endpoints to the Public API that let you create sensor monitoring rules for both device and server sensors. All of the sensor monitoring rule types previously available in the System Action Center user interface can now be configured using the Public API, including ingestion changes, data gaps, missed heartbeats, feedback conditions, and status changes. The new endpoints are under
POST /connect/api/v1/rules/device-sensor-monitoringandPOST /connect/api/v1/rules/server-sensor-monitoring. -
AELDEV-67152: Changed default visibility for Threat Hunting charts to hidden.
Changed the default state for Threat Hunting charts to hidden. Selecting Show Charts reveals the panel for the current browser session only. The preference is kept in session storage and does not persist for future sessions. Navigate to Investigate | Threat Hunting and toggle Show Charts to view charts as needed. Closing the tab or ending the session resets the view.
-
AELDEV-66709: Improved Public API security event updates with optional index refresh query parameter.
Added an optional
refreshquery parameter to Public API security event update endpoints to control when updates become visible in search results. By default, the parameter useswait_forto maintain backward compatibility, whilefalsereturns immediately without waiting for an index refresh. This option is available for security event update operations, including status, tag, and comment updates. These enhancements improve performance and throughput during bulk or high-frequency update operations while preserving existing behavior by default. -
AELDEV-65582: Added the software version number for feature walkthroughs in the Resource Center.
Added the software version number in the user interface to support release-specific feature walkthroughs and guidance in the Resource Center. The version is now available as an attribute for walkthroughs, in-app messages, checklists, and related guidance content, letting you associate Resource Center experiences with specific releases or groups of releases. This enhancement ensures that you see guidance relevant to the version you're running.
-
AELDEV-63509: Updated the Case Summary layout and enhanced Kill Chain filtering in Case Details.
Updated the Case Summary to use a double-column layout and repositioned the Kill Chain directly below the summary on the Case Details page. The revised layout improves readability and triage efficiency by optimizing content width and organization. In addition, selecting a Kill Chain stage now filters the related data displayed within the case, helping you focus on relevant activity during investigation. Existing cases automatically display the updated layout, and no configuration changes are required.
-
AELDEV-63292: Moved the Dashboards | Creation link to the top of the Dashboards navigation section.
Moved the entry point for creating dashboards to the top of the Dashboards navigation section to prioritize custom dashboard creation and streamline access. Placing the option at the top of its section reduces navigation effort and improves discoverability when creating new dashboards. Existing dashboards, permissions, and access controls remain unchanged.
-
AELDEV-63291: Added a global navigation search above Favorites in the left navigation panel.
Added a global navigation search in the side navigation above Favorites. Entering a term filters navigation items across sections to surface matching pages. Results reflect permissions for the current user and include only accessible destinations. Select a result to navigate to the target page. The search field is enabled by default and requires no configuration.
-
AELDEV-63249: Enhanced the Case List page with a global time filter, simplified layout, and improved queue visibility.
Updated the Case List page to apply a global time filter at the top of the page, ensuring all cases reflect the selected Created At range. This The chart summary row was removed to improve performance and streamline the layout. Queue navigation now displays approximate counts, with values greater than 1000 shown as 1K+ for readability. In addition, new queues include a default Status filter with values New, In Progress, and Escalated, which you can remove during queue creation if not required. These improvements simplify case navigation and improve performance when working with large case volumes.
-
AELDEV-62974: Revised status labels for machine learning detections in Detection Management.
Revised the Status column for machine learning (ML) detections to better reflect data readiness. The column now displays Ready (green), Initializing (In Training) (orange), No Data (orange), and Error (red). Initializing (In Training) replaces the previous Not Ready status for ML detections. No Data indicates that a detection is enabled and active but has not received recent contributing events. Other detection engines, including rules-based detections, retain the existing status taxonomy. Only the Status column was updated, and no new columns were added.
Early Access Program
If you're interested in testing out new features ahead of general availability, consider joining the Early Access Program (EAP) by contacting your Stellar Cyber Customer Success representative and telling them which EAP feature you want to test. Once you've agreed to the EAP terms and signed up, the EAP feature is unlocked for you.
The purpose of this program is to boost performance and reliability through real-world customer insights, giving you a hands-on role in shaping a Stellar Cyber feature. In return, you'll receive early access to upcoming releases and the chance to guide product development.
The following EAP feature is in this release:
XDR Connect Webhook Ingestion
This is a simple webhook framework that lets you post JSON data directly from any external system into Stellar Cyber, accelerating custom integrations and expanding your visibility across the entire security stack. The XDR Connector is in Public Preview in this release.
Case Management Enhancements
Customizable case queues provide persistent, rule-based case groupings that align with SOC workflows, enabling structured workload segmentation by severity, function, escalation path, customer, or alert characteristics.
Resolved Issues
-
AELDEV-67746: Added authentication for local CLI commands on server sensors.
Added authentication for local CLI requests sent to port 9716 on server sensors. Previously, non-administrative users could log in to the server and run administrative sensor CLI commands on this port. Server sensors now require administrative privileges to run administrative sensor CLI commands. This security enhancement ensures that only authorized administrators perform sensor management tasks and prevents local privilege escalation.
-
AELDEV-67394: Corrected license usage limit notifications for multi-tenant environments.
Corrected how license usage limit alerts report tenant information when rules target multiple tenants. Previously, email and Slack notifications could display incorrect tenant names or missing usage values, even though the alert shown in the UI was accurate. Stellar Cyber now generates tenant-specific summaries that correctly attribute license usage information to each tenant in these notifications. This change ensures that notifications accurately reflect license usage across tenants, helping you understand which tenants exceeded thresholds and respond more effectively.
-
AELDEV-67343: Corrected an issue that prevented complex pre-DPI filters from being applied by sensors.
Corrected a condition in which complex pre-DPI filter expressions were not applied as expected. Previously, when you configured a complex filter, the sensor could fail to apply it, causing traffic that should have been filtered to continue being processed. Stellar Cyber now correctly applies complex pre-DPI filters so the configured filtering rules work as intended. This change ensures that your traffic filtering policies operate reliably and helps you control which traffic Stellar Cyber processes and analyzes.
-
AELDEV-66931: Hardened the password reset process to prevent domain injection in reset emails.
Strengthened validation in the password reset process to prevent domain injection in reset emails. The reset link now derives the domain from the configured web server collection rather than untrusted request headers, blocking domain injection in password reset emails. No configuration change is required, and valid requests continue to function as before.
-
AELDEV-66786: Corrected CPU usage reporting in Windows Server Sensors.
Resolved an issue that caused incorrect CPU utilization readings on high-core Windows systems. On hosts with more than 56 logical processors, Windows Server Sensors sometimes incorrectly reported 100% usage. After upgrading to 6.4.0, dashboards and sensor status views now display accurate CPU utilization.
-
AELDEV-66738: Fixed HTML rendering issues in dashboards.
Resolved an issue where embedded HTML in ingested event fields could trigger unexpected redirects or 404 errors in alert tables. Stellar Cyber now escapes HTML in fields such as description, preventing errors when sorting by Alert Score, filtering results, or opening alert details. This change applies to Operational View dashboards and other alert tables. Sorting and filtering now function correctly across all time ranges.
-
AELDEV-66542: Fixed saved alert filters returning zero results.
Resolved an issue where saved alert filter tests and Query Builder executions could fail due to oversized request headers. In multi-tenant environments, this condition triggered HTTP 431 errors and caused saved filters to return zero results. Saved filter tests now return results consistent with equivalent ad hoc queries in Query Builder.
-
AELDEV-66158: Added detection for Microsoft Entra sign-in failures with error code 53003.
Corrected field typing for
azure_ad.status.errorCodeto support matching on Microsoft Entra sign-in events with error code 53003. The Microsoft Entra Sign-in Failures rule and the Sign-in Failure Due to Conditional Access child rule now evaluate the numeric code directly, ensuring detections trigger as expected. This update applies to newly ingested data. To evaluate historical data, you might need to reindex the affected indices. Ensure Microsoft Entra sign-in log collection remains enabled and that the detection is active to generate alerts. -
AELDEV-66145: Corrected the default behavior for newly observed IP address detection in DNS Tracking.
Corrected the default behavior of newly observed IP address detection within DNS Tracking enrichment. Detection now activates only when DNS Tracking enrichment is enabled and properly configured. Environments with DNS Tracking disabled no longer generate newly observed IP address detections. To use this capability, enable DNS Tracking enrichment and define the domains or IP addresses you want to monitor.
-
AELDEV-66077: Fixed TLS enablement for syslog over TCP 6514.
TLS could not be enabled for secure syslog ingestion on TCP 6514 unless a custom parser file was present. This created an unnecessary dependency that prevented secure log forwarding from working as expected in standard configurations. TLS now activates for the configured ingestion entry without requiring
/etc/td-agent/customer_log.conf. This fix ensures secure syslog ingestion works as expected without additional configuration dependencies. -
AELDEV-65622: Closed external access to the Data Processor node system monitoring service.
Restricted access to the internal system monitoring service that collects operating system performance and health metrics from Data Processor nodes. This service was previously reachable on port 9100 from other machines on the network without authentication. It's now accessible only within the Stellar Cyber Platform; external systems can no longer directly retrieve node monitoring data. This change eliminates unauthenticated exposure of system information and strengthens platform security.
-
AELDEV-65539: Improved alert descriptions for User Data Volume Anomaly alert type.
Clarified the alert descriptions for External and Internal User Data Volume Anomaly to reflect session-based evaluation. Descriptions no longer reference a 5-minute interval and now explain that the detection evaluates
totalbytesacross the entire firewall session. -
AELDEV-65538: Improved the performance of the global text search in Asset Analytics.
Improved global text search performance in Asset Analytics to reduce query latency and return consistent results across asset attributes at scale. Searches now execute more efficiently while maintaining accurate matching across asset data. You can enter keywords in the Search field and optionally apply filters to narrow results by asset type or classification.
-
AELDEV-64402: Fixed the missing name for Microsoft Entra ID Revoke sign-in sessions action.
Resolved an issue where the Microsoft Entra ID Revoke sign-in sessions action name did not display correctly in User Actions and Create User views. The action name now appears consistently in lists, selectors, and related records, ensuring clear identification when reviewing and creating user response actions.
Stellar Cyber Platform System Requirements
You must install the Stellar Cyber Platform in an environment that meets or exceeds minimum system requirements. Refer to the following sections for the minimum system requirements for different target environments:
-
Dedicated VMware ESXi (see below)
System Requirements for Cluster Installation in VMware ESXi
You can install the Stellar Cyber platform on a dedicated ESXi server running VMware ESXi 8.0, 7.0 or 6.7. The target ESXi server must have sufficient resources to support separate virtual machines for the cluster nodes required by your expected daily ingestion volume.
Refer to Stellar Cyber Platform (DP) System Requirements and Capacity Planning for details on the quantities of cluster nodes required for different daily ingestion volumes, as well as the system resources you must provision for their virtual machines.
Keep in mind the following:
-
Each VM must be thick-provisioned.
-
You can install all of the VMs in the same datastore if there is sufficient space for both the VMs and the disk space required for the Data Lake's ElasticSearch data. However, Stellar Cyber recommends that the Data Lake uses a dedicated datastore.
Stellar Cyber supports SSD disks for both the OS and Data Lake drives (SATA, SAS, or NVMe). HDD disks introduce latency and are not supported.
Scaling Up Performance with a DP Cluster
You can configure up to ten DP servers to operate in a cluster to achieve improved Stellar Cyber performance. Stellar Cyber cluster testing indicates the following performance guidelines when adding additional DPs to a cluster:
-
With data replication disabled, the aggregated ingestion throughput grows linearly with the number of DP servers.
-
With data replication enabled (the default), the aggregated ingestion throughput is about 30% lower than the throughput without data replication.
Upgrading the Stellar Cyber Platform
You can upgrade the Stellar Cyber Platform from 6.2.0 or later to 6.4.0. You must:
-
Prepare for the upgrade
-
Upgrade the Stellar Cyber Platform to 6.4.0
-
Upgrade the sensors
-
Verify the upgrade
For more detailed instructions, refer to Upgrading Software.
Due to additional functionality and features, resource utilization (CPU and memory) might increase depending on your usage patterns. You can keep tabs on the platform's CPU and disk usage by clicking the Node List button in the System | Data Management | Data Analyzer page. If necessary, you can scale up your platform by adding DA and DL worker nodes, as described here for AWS, GCP, and OCI.
Important Note for Air-Gapped Environments: The 6.4.0 release requires connectivity to specific external URLs to enable components included in the installation image, such as Early Access Program functionality and various features and fixes. In air-gapped or dark site environments, where external network access is restricted, these components cannot be enabled after installation. Before upgrading to 6.4.0, confirm that the required connectivity to these URLs is available.
Prepare for the Upgrade
To prepare for the upgrade:
- Back up the data and configuration
- Make sure the sensors are up and running
- Take note of the ingestion rate
- Take note of the number of alerts
- Make sure the system health indicator shows
- Run the pre-upgrade check
Upgrade the Stellar Cyber Platform to 6.4.0
-
Select Settings | ORGANIZATION MANAGEMENT | Software Upgrade.
-
Choose 6.4.0.
-
Select START UPGRADE.
Upgrade the Sensors
New features, updated ML algorithms, and enhanced configurations may change ingestion and detection patterns. We recommend the following to ensure a smooth upgrade:
- Upgrade sensors with the Sandbox and IDS features enabled before sensors with the only the Network Traffic feature enabled. Sensors with Network Traffic enabled send data to sensors with Sandbox and IDS enabled for additional processing.
- Upgrade sensors in batches instead of all at once.
- For server sensors (agents):
- Upgrade a small set of sensors that cover non-critical assets.
- After 24 hours, ensure that your ingestion is as expected, then upgrade a larger set.
- After 24 hours, ensure that your ingestion is as expected, then upgrade the remaining server sensors.
CentOS 7.1 Prerequisite – Update curl to 7.29.0-59.el7_9.2 or Higher
Before upgrading any Linux Server Sensors running in CentOS 7.1, you must check your curl version and update it to 7.29.0-59.el7_9.2 or higher to use the strong encryption required by the Stellar Cyber Platform.
-
Check your curl version as shown below:
yum list installed curl
\* Loaded plugins: fastestmirror Loading mirror speeds from cached hostfile Installed Packages curl.x86_64 7.29.0-19.el7
-
If the listed version is lower than
7.29.0-59.el7_9.2(as it is in the example above), use the following commands to update the curl package:yum makecache
yum install curl
-
If installation of the curl package fails, it is most likely because CentOS is trying to use a repo that has reached its end of life. Try updating the base URL and then reinstall curl. The following
sedcommand makes the necessary changes for most environments to ensure that the updated curl package can be installed:sudo sed -i.bak -e 's|^mirrorlist=|#mirrorlist=|' -e 's|^#baseurl=http://mirror.centos.org/centos/\$releasever|baseurl=http://archive.kernel.org/centos-vault/7.9.2009|' /etc/yum.repos.d/CentOS-Base.repo
To upgrade sensors:
Depending on the type of server sensor, upgrade your sensors to version 6.4.0 as follows:
-
Linux Server Sensors: Upgrade directly to 6.4.0 from either of the two previous releases: 6.2.0 or 6.3.0.
-
Windows Server Sensors: Upgrade directly to 6.4.0 from an extended range of previous releases: 5.1.0 through 6.3.0.
If you are upgrading a Windows Server Sensor, complete any pending updates for the host Windows machine before upgrading the sensor.
-
Select System | DATA SOURCE MANAGEMENT | Sensors | Sensors.
The Sensor List appears.
-
Select Manage | Software Upgrade.
The Sensor Software Upgrade page appears.
-
Choose the target software version.
-
Choose the target sensors.
-
Select Submit.
Verify the Upgrade
To verify that the upgrade was successful:
- Check the Current Software Version on the System | ORGANIZATION MANAGEMENT | Software Upgrade page.
- Make sure the sensors are up and running.
- Check the ingestion rate and make sure it is as expected.
- Check the number of alerts and make sure it is as expected.
- Check the system health indicator:
- indicates a perfectly healthy system.
- indicates minor issues. Monitor the system for 30 minutes. If the issues remain, investigate further.
- indicates major issues. Contact Technical Support.
