Skip to content

Commit 4b18cab

Browse files
natasha-moore-elasticgabriellandaunastasha-solomon
authored
[Security] 8.19.0 release notes (#6925)
* [Security] 8.19.0 release notes * Adds Endpoint RNs * minor fixes * Applies Endpoint feedback Co-authored-by: Gabriel Landau <[email protected]> * fix variable formatting * Applies feedback * address RM and DE feedback * Update docs/release-notes/8.19.asciidoc --------- Co-authored-by: Gabriel Landau <[email protected]> Co-authored-by: Nastasha Solomon <[email protected]>
1 parent 3aa4b2d commit 4b18cab

File tree

2 files changed

+96
-0
lines changed

2 files changed

+96
-0
lines changed

docs/release-notes.asciidoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33

44
This section summarizes the changes in each release.
55

6+
* <<release-notes-8.19.0, {elastic-sec} version 8.19.0>>
67
* <<release-notes-8.18.4, {elastic-sec} version 8.18.4>>
78
* <<release-notes-8.18.3, {elastic-sec} version 8.18.3>>
89
* <<release-notes-8.18.2, {elastic-sec} version 8.18.2>>
@@ -89,6 +90,7 @@ This section summarizes the changes in each release.
8990
* <<release-notes-8.0.0, {elastic-sec} version 8.0.0>>
9091
* <<release-notes-8.0.0-rc2, {elastic-sec} version 8.0.0-rc2>>
9192

93+
include::release-notes/8.19.asciidoc[]
9294
include::release-notes/8.18.asciidoc[]
9395
include::release-notes/8.17.asciidoc[]
9496
include::release-notes/8.16.asciidoc[]

docs/release-notes/8.19.asciidoc

Lines changed: 94 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,94 @@
1+
[[release-notes-header-8.19.0]]
2+
== 8.19
3+
4+
[discrete]
5+
[[release-notes-8.19.0]]
6+
=== 8.19.0
7+
8+
[discrete]
9+
[[deprecations-8.19.0]]
10+
==== Deprecations
11+
* Removes default quick prompts from the Security AI Assistant ({kibana-pull}225536[#225536]).
12+
13+
14+
[discrete]
15+
[[features-8.19.0]]
16+
==== New features
17+
* Adds an option to update the `kibana.alert.workflow_status` field for alerts associated with attack discoveries ({kibana-pull}225029[#225029]).
18+
* The rule execution gaps functionality is now generally available ({kibana-pull}224657[#224657]).
19+
* Adds the ability to bulk fill gaps ({kibana-pull}224585[#224585]).
20+
* Automatic migration is now generally available ({kibana-pull}224544[#224544]).
21+
* Adds a name field to the automatic migration UI ({kibana-pull}223860[#223860]).
22+
* Adds the ability to bulk set up and delete alert suppression ({kibana-pull}223090[#223090]).
23+
* Adds the ability to change rule migration execution settings when re-processing a migration ({kibana-pull}222542[#222542]).
24+
* Adds `runscript` response action support for Microsoft Defender for Endpoint–enrolled hosts ({kibana-pull}222377[#222377]).
25+
* Updates automatic migration API schema ({kibana-pull}219597[#219597]).
26+
* Adds automatic saving of attack discoveries, with search and filter capabilities ({kibana-pull}218906[#218906]).
27+
* Adds the ability to edit highlighted fields in the alert details flyout ({kibana-pull}216740[#216740]).
28+
* Adds the XSOAR connector ({kibana-pull}212049[#212049]).
29+
* Adds a custom script selector for choosing scripts to execute when using the `runscript` response action ({kibana-pull}204965[#204965]).
30+
31+
[discrete]
32+
[[enhancements-8.19.0]]
33+
==== Enhancements
34+
* Updates {elastic-sec} Labs Knowledge Base content ({kibana-pull}227125[#227125]).
35+
* Bumps default Gemini model ({kibana-pull}225917[#225917]).
36+
* Groups vulnerabilities by resource and cloud account using IDs instead of names ({kibana-pull}225492[#225492]).
37+
* Adds prompt tiles to the Security AI Assistant ({kibana-pull}224981[#224981]).
38+
* Adds support for collapsible sections in integrations READMEs ({kibana-pull}223916[#223916]).
39+
* Adds advanced policy settings in {elastic-defend} to enable collection of file origin information for File, Process, and DLL (ImageLoad) events ({kibana-pull}222030[#222030], {kibana-pull}223882[#223882]).
40+
* Adds the `ecs@mappings` component to the transform destination index template ({kibana-pull}223878[#223878]).
41+
* Adds the ability to revert a customized prebuilt rule to its original version ({kibana-pull}223301[#223301]).
42+
* Displays which fields are customized for prebuilt rules ({kibana-pull}225939[#225939]).
43+
* Adds an {elastic-defend} advanced policy setting that allows you to enable or disable the Microsoft-Windows-Security-Auditing ETW provider for security events collection ({kibana-pull}222197[#222197]).
44+
* Updates the highlighted fields button styling in the alert details flyout ({kibana-pull}221862[#221862]).
45+
* Expands CVE ID search to all search parameters, not just names ({kibana-pull}221099[#221099]).
46+
* Improves alert searching and filtering by including additional ECS data stream fields ({kibana-pull}220447[#220447]).
47+
* Updates default model IDs for {bedrock} and OpenAI connectors ({kibana-pull}220146[#220146]).
48+
* Adds support for PKI (certificate-based) authentication for the OpenAI **Other** connector providers ({kibana-pull}219984[#219984]).
49+
* Adds pinning and settings to the **Table** tab in the alert and event details flyouts ({kibana-pull}218686[#218686]).
50+
* Adds the Security AI prompts integration ({kibana-pull}216106[#216106]).
51+
* Adds support for grouping multi-value fields in Cloud Security ({kibana-pull}215913[#215913]).
52+
* Limits unassigned notes to a maximum of 100 per document instead of globally ({kibana-pull}214922[#214922]).
53+
* Updates the Detection rule monitoring dashboard to include rule gaps histogram ({kibana-pull}214694[#214694]).
54+
* Adds support for the `MV_EXPAND` command for the {esql} rule type ({kibana-pull}212675[#212675]).
55+
* Adds support for partial results for the {esql} rule type ({kibana-pull}223198[#223198]).
56+
* Updates the data view selector in Timelines ({kibana-pull}210585[#210585]).
57+
* Enables `isolate` and `release` response actions from the event details flyout ({kibana-pull}206857[#206857]).
58+
* Standardizes action triggers in alerts KPI visualizations ({kibana-pull}206340[#206340]).
59+
* Adds {elastic-defend} process event monitoring for `ptrace` and `memfd` activity on Linux (kernel 5.10+) using eBPF.
60+
* Reduces {elastic-defend} CPU usage for ETW events, API events, and behavioral protections. In some cases, this may be a significant reduction.
61+
* {elastic-defend}: Changes the security events source from the Event Log provider to Event Tracing for Windows (Microsoft-Windows-Security Auditing) provider and enriches the events with additional data.
62+
* Reduces {elastic-defend} CPU and memory usage for behavioral protections.
63+
* Improves the resilience of {elastic-defend} in low memory situations.
64+
* Reduces {elastic-defend} CPU usage and improves system responsiveness for malware and memory protections.
65+
* Reduces {elastic-defend} CPU when processing events from the System process, such as IIS network events.
66+
* Improves {elastic-defend} logging of fatal exceptions.
67+
* Improves {elastic-defend} call site analysis logic.
68+
69+
[discrete]
70+
[[bug-fixes-8.19.0]]
71+
==== Fixes
72+
* Fixes a bug where Timelines and investigations did not consistently use the default Security data view ({kibana-pull}226314[#226314]).
73+
* Fixes a bug where opening an alert deeplink didn't correctly load filters on the **Alerts** page ({kibana-pull}225650[#225650]).
74+
* Updates entity links to open in a flyout instead of leaving the current page ({kibana-pull}225381[#225381]).
75+
* Adds a title to the rule gap histogram in the Detection rule monitoring dashboard ({kibana-pull}225274[#225274]).
76+
* Fixes a bug where pressing Escape with an alert details flyout open from a Timeline closed the Timeline instead of the flyout ({kibana-pull}224352[#224352]).
77+
* Fixes a bug where comma-separated `process.args` values didn't wrap properly in the alert details flyout's **Overview** tab ({kibana-pull}223544[#223544]).
78+
* Fixes a bug where cell actions didn't work when opening a Timeline from specific rule types ({kibana-pull}223305[#223305]).
79+
* Fixes wrapping for threat indicator match event renderer ({kibana-pull}223164[#223164]).
80+
* Fixes a z-index issue in the {esql} query editor within Timeline ({kibana-pull}222841[#222841]).
81+
* Fixes incorrect content displaying after tab switching in the integrations section on the **Get started** page.
82+
({kibana-pull}222271[#222271]).
83+
* Fixes the exception flyout to show the correct "Edit rule exception" title and button label when editing an exception item ({kibana-pull}222248[#222248]).
84+
* Retrieves active integrations from the installed integrations API ({kibana-pull}218988[#218988]).
85+
* Updates tooltips in the gap fills table ({kibana-pull}218926[#218926]).
86+
* Fixes AI Assistant prompt updates so UI changes reflect only successful updates ({kibana-pull}217058[#217058]).
87+
* Fixes error callout placement on the **Engine Status** tab of the **Entity Store** page ({kibana-pull}216228[#216228]).
88+
* Generalizes and consolidates custom {fleet} onboarding logic ({kibana-pull}215561[#215561]).
89+
* Fixes an alert grouping re-render issue that caused infinite rendering loops when selecting a group ({kibana-pull}215086[#215086]).
90+
* Fixes a bug in the alert details flyout's **Table** tab where fields displayed duplicate hover actions ({kibana-pull}212316[#212316]).
91+
* Refactors conversation pagination for the Security AI Assistant ({kibana-pull}211831[#211831]).
92+
* Fixes the {elastic-defend} artifact `channel` field and adds `manifest_type` in {elastic-defend} policy responses.
93+
* Fixes a bug in {elastic-defend} where Linux network events would have source and destination byte counts swapped.
94+
* Fixes a memory growth bug in {elastic-defend} on Linux when both **Collect session data** and **Capture terminal output** are enabled.

0 commit comments

Comments
 (0)