Stellar Cyber 6.4.0s Release Notes

Software Release Date:
Release Note Updated:

The Stellar Cyber 6.4.0s release strengthens speed, clarity, and confidence across the Open XDR Platform with production-ready Autonomous SOC capabilities, expanded machine learning detections, and enhanced operational workflows.

The release notes are organized into the following sections:

Highlights

Autonomous SOC Features

  • Intelligent Case Analysis and Summary: This feature creates AI-generated narratives within the Case Detail view to accelerate investigations. It automatically generates structured case summaries, investigative hypotheses, timelines, observables, and recommended response actions to accelerate high-severity case analysis.

    To use intelligent case analysis, you must toggle on Enable AI Case Analysis & Summary in System | ORGANIZATION MANAGEMENT | Settings. This is required in 6.4.0s even if you used this feature in the Early Access Program in a previous release.

  • Alert Auto Triage (Add-On): The automated triage of alerts is now available via an add-on license. Alert auto triage uses coordinated AI reasoning to evaluate alerts, assign transparent verdicts, suppress noise, and continuously improve through analyst feedback.

  • Phishing Email Auto Triage (Add-On): The automated triage of suspected email is now available via an add-on license. This feature automates the end-to-end triage of user-reported phishing emails, extracting indicators, correlating context, and classifying threats without manual review.

Detection and Machine Learning

  • SQL Injection Behavior Detection: This machine-learning detection identifies repeated SQL injection payload patterns across HTTP traffic, covering both external web attacks and internal lateral movement scenarios.

  • VPN Login Failure Anomaly Detection: Identity-based anomaly detection now extends to VPN authentication telemetry, identifying abnormal VPN login failure patterns across Fortinet, Check Point, Palo Alto, and other supported platforms.

Dashboard Usability

  • Responsive Dashboard Authoring: The new grid-based, responsive dashboard layout system enables fluid resizing, reordering, and breakpoint-aware views for faster iteration and scalable operational reporting.

Integrations and Data Expansion

  • Expanded Connector Coverage: This expansion introduces several new connectors and multiple content integrations across email security, cloud infrastructure, vulnerability intelligence, and identity risk platforms to broaden ingestion depth and correlation capabilities.

  • Enhanced Parser and Normalization Framework: The enhancement expands parser coverage and normalization depth across endpoint, firewall, cloud, and infrastructure telemetry to improve detection fidelity and cross-source correlation.

Actions Required

There are no actions required in this release.

Behavior Changes

Changes that affect the way users interact with the product or interpret results are listed below.

  • DATA-3179: Updated the VMware ESXi parser to migrate a top-level action field from action to vmware_esxi.action for consistent field semantics within the unixlogs category. Saved searches, dashboards, and detection rules that reference action must be updated to use vmware_esxi.action. Queries that continue to reference action will no longer return expected results.

  • DATA-3155: Updated the Forescout syslog parser to normalize the log_type field by removing the trailing semicolon ( ; ) and refining its extracted value. Saved searches, dashboards, and detection rules that rely on exact matches of previous log_type values that included a trailing semicolon must be updated to reflect the revised format. Queries that reference the prior value with a semicolon will no longer return expected results.

  • DATA-3122: Updated the Check Point Harmony Email Collaboration parser to move the action field from the top-level event structure into a vendor-specific field checkpoint_harmony_email_collaboration.action. Saved searches, dashboards, and correlation rules that reference the top-level action field for this data source must be updated to use checkpoint_harmony_email_collaboration.action. Queries that continue to reference the top-level action will no longer return expected results.

  • DATA-3119: Updated the Forescout parser to classify Network Access Control match and unmatch events with a distinct log_type value. Instead of assigning all events the value "NAC Policy Log:", the parser now sets the value of the log_type field to "NAC Policy Match/Unmatch Event" when the forescout.match field is present. Saved searches, dashboards, and detection rules that filter specifically on log_type:"NAC Policy Log:" must be reviewed and updated if they are intended to include match or unmatch events. Queries that continue to filter exclusively on the previous value will no longer return those events.

Deprecated Features

No features have been deprecated in this release, but the following feature is planned for deprecation in a future version.

  • Upcoming Deprecation: Netskope Connector (API V1) – The Netskope connector supports API V1 and V2, but Netskope has deprecated API V1 so Stellar Cyber will retire the V1 API in a future release. Begin planning to migrate to the V2 API.

Detection/ML

New Features

Improvements

Stellar Cyber Platform

New Features

Improvements

Sensors

New Features

Improvements

Connectors

New Features

Improvements

Parsers

New Features

Improvements

Usability

New Features

Improvements

Early Access Program

If you're interested in testing out new features ahead of general availability, consider joining the Early Access Program (EAP) by contacting your Stellar Cyber Customer Success representative and telling them which EAP feature you want to test. Once you've agreed to the EAP terms and signed up, the EAP feature is unlocked for you.

The purpose of this program is to boost performance and reliability through real-world customer insights, giving you a hands-on role in shaping a Stellar Cyber feature. In return, you'll receive early access to upcoming releases and the chance to guide product development.

The following EAP feature is in this release:

XDR Connect Webhook Ingestion

This is a simple webhook framework that lets you post JSON data directly from any external system into Stellar Cyber, accelerating custom integrations and expanding your visibility across the entire security stack. The XDR Connector is in Public Preview in this release.

Case Management Enhancements

Customizable case queues provide persistent, rule-based case groupings that align with SOC workflows, enabling structured workload segmentation by severity, function, escalation path, customer, or alert characteristics.

Resolved Issues

Upgrading Sensors

Depending on the type of server sensor, you can upgrade your sensors directly to version 6.4.0 from these previous versions:

  • Linux Server Sensors: 6.2.0 or 6.3.0

  • Windows Server Sensors: 5.1.0 through 6.3.0

Upgrade the sensors to version 6.4.0 using the following process:

  1. Prepare for the upgrade.

  2. Upgrade the sensors.

  3. Verify the upgrade.

Prepare for the Upgrade

To prepare for the upgrade:

  • Make sure the sensors are up and running
  • Take note of the ingestion rate for the sensors to be upgraded in the Sensor Details page
  • Make sure the system health indicators in the Sensor Details page all show green.

Upgrade the Sensors

New features, updated ML algorithms, and enhanced configurations may change ingestion and detection patterns. We recommend the following to ensure a smooth upgrade:

  • Upgrade sensors with the Sandbox and IDS features enabled before sensors with the only the Network Traffic feature enabled. Sensors with Network Traffic enabled send data to sensors with Sandbox and IDS enabled for additional processing.
  • Upgrade sensors in batches instead of all at once.
  • For server sensors (agents):
    • Upgrade a small set of sensors that cover non-critical assets.
    • After 24 hours, ensure that your ingestion is as expected, then upgrade a larger set.
    • After 24 hours, ensure that your ingestion is as expected, then upgrade the remaining server sensors.

CentOS 7.1 Prerequisite – Update curl to 7.29.0-59.el7_9.2 or Higher

Before upgrading any Linux Server Sensors running in CentOS 7.1, you must check your curl version and update it to 7.29.0-59.el7_9.2 or higher to use the strong encryption required by the Stellar Cyber Platform.

  1. Check your curl version as shown below:

    yum list installed curl

    \* Loaded plugins: fastestmirror Loading mirror speeds from cached hostfile Installed Packages curl.x86_64 7.29.0-19.el7

  2. If the listed version is lower than 7.29.0-59.el7_9.2 (as it is in the example above), use the following commands to update the curl package:

    yum makecache

    yum install curl

  3. If installation of the curl package fails, it is most likely because CentOS is trying to use a repo that has reached its end of life. Try updating the base URL and then reinstall curl. The following sed command makes the necessary changes for most environments to ensure that the updated curl package can be installed:

    sudo sed -i.bak -e 's|^mirrorlist=|#mirrorlist=|' -e 's|^#baseurl=http://mirror.centos.org/centos/\$releasever|baseurl=http://archive.kernel.org/centos-vault/7.9.2009|' /etc/yum.repos.d/CentOS-Base.repo

To upgrade sensors:

You can upgrade a sensor to the most recent release from the two previous releases. This means that you can upgrade a sensor to the 6.4.0 release from any 6.2.x or 6.3.x release.

If you are upgrading a Windows Server Sensor, complete any pending updates for the host Windows machine before upgrading the Server Sensor.

  1. Select System | DATA SOURCE MANAGEMENT | Sensors | Sensors.

    The Sensor List appears.

  2. Select Manage | Software Upgrade.

    The Sensor Software Upgrade page appears.

  3. Choose the target software version.

  4. Choose the target sensors.

  5. Select Submit.

Verify the Upgrade

To verify that the upgrade was successful:

  • Check the Software Version in the Sensor List.
  • Check the Sensor Status LED in the Sensor List.
  • Check the ingestion rate in the Sensor Details page for upgraded sensors and make sure it is as expected.