What's new in 8.15 #5508
Labels
Docset: ESS
Issues that apply to docs in the Stack release
Effort: Medium
Issues that take moderate but not substantial time to complete
highlights
Priority: High
Issues that are time-sensitive and/or are of high customer importance
v8.15.0
Please add your features and enhancements for
8.15
. Don't forget to include the related PR link!Detections & Response
Rules Management
You can now edit these fields for user-created custom rules:
(Edit
max_signals
field for custom rules in UI [classic] #5106)(Edit required_fields field for custom rules in UI [classic] #5287)
(Edit related_integrations field for custom rules in UI [classic] #5151)
Detection Engine
Threat Hunting
Explore
Investigations
Entity Analytics
Entity risk score is now automatically recalculated when you assign, change, or unassign an individual entity's asset criticality level.
You can now manage asset criticality using the asset criticality API.
Generative AI
New API for Elastic AI Assistant (Security AI Assistant APIs #5620) You can now interact with Elastic AI Assistant via API.
New feature: Automatic Import ([Serverless] Adds auto import page #5560) Automatic Import uses AI to create integrations for your custom data sources.
EDR Workflows/Asset Management
Scan files and folders for malware (Scan response action [ESS] #5563)
Elastic Defend’s new
scan
response action lets you perform on-demand malware scans of a specific file or directory on a host. Scans are based on the malware protection settings configured in your Elastic Defend integration policy.Filter out process descendants (Process descendant filtering in event filters [ESS] #5626)
Create an event filter that excludes the descendant events of a specific process, but still includes the primary process itself. This can help you limit the amount of events ingested into Elastic Security.
Isolate and release CrowdStrike-enrolled hosts (CrowdStrike bidirectional response actions (isolate & release) #5529)
Using Elastic’s CrowdStrike integration and connector, you can now perform response actions on hosts enrolled in CrowdStrike’s endpoint protection system. These actions are available in this release:
Retrieve files from SentinelOne-enrolled hosts (SentinelOne
get-file
response action [classic] #5499)Using Elastic’s SentinelOne integration and connector, you can now retrieve files from SentinelOne-enrolled hosts and download them through Elastic Security.
Cloud Security
Endpoint
Protections Experience
ResponseOps
(@natasha-moore-elastic I pulled these from the Kibana What's new so they're good to insert as is.)
The text was updated successfully, but these errors were encountered: