Skip to content

Commit 4683264

Browse files
[Known Issue] Doc Elastic Defend bug that stopped security events from populating the user.name field (#5786) (#5788)
* First draft * Update docs/release-notes/8.14.asciidoc Co-authored-by: Gabriel Landau <[email protected]> * Update docs/release-notes/8.14.asciidoc Co-authored-by: Gabriel Landau <[email protected]> * Update docs/release-notes/8.14.asciidoc Co-authored-by: Gabriel Landau <[email protected]> * Update docs/release-notes/8.14.asciidoc Co-authored-by: Gabriel Landau <[email protected]> * Update docs/release-notes/8.15.asciidoc Co-authored-by: Gabriel Landau <[email protected]> --------- Co-authored-by: Gabriel Landau <[email protected]> (cherry picked from commit 665ff37) # Conflicts: # docs/release-notes/8.15.asciidoc Co-authored-by: Nastasha Solomon <[email protected]>
1 parent 86717fd commit 4683264

File tree

2 files changed

+265
-0
lines changed

2 files changed

+265
-0
lines changed

docs/release-notes/8.14.asciidoc

Lines changed: 84 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,27 @@
55
[[release-notes-8.14.3]]
66
=== 8.14.3
77

8+
[discrete]
9+
[[known-issue-8.14.3]]
10+
==== Known issues
11+
12+
// tag::known-issue-14686[]
13+
[discrete]
14+
.{elastic-endpoint} does not properly populate the `user.name` field in security events
15+
[%collapsible]
16+
====
17+
*Details* +
18+
{elastic-endpoint} for Windows will not properly populate the `user.name` field with security events.
19+
20+
*Workaround* +
21+
Upgrade to 8.15.1.
22+
23+
*Resolved* +
24+
On September 5, 2024, this issue was resolved.
25+
26+
====
27+
// end::known-issue-14686[]
28+
829
[discrete]
930
[[bug-fixes-8.14.3]]
1031
==== Bug fixes
@@ -15,6 +36,27 @@
1536
[[release-notes-8.14.2]]
1637
=== 8.14.2
1738

39+
[discrete]
40+
[[known-issue-8.14.2]]
41+
==== Known issues
42+
43+
// tag::known-issue-14686[]
44+
[discrete]
45+
.{elastic-endpoint} does not properly populate the `user.name` field in security events
46+
[%collapsible]
47+
====
48+
*Details* +
49+
{elastic-endpoint} for Windows will not properly populate the `user.name` field with security events.
50+
51+
*Workaround* +
52+
Upgrade to 8.15.1.
53+
54+
*Resolved* +
55+
On September 5, 2024, this issue was resolved.
56+
57+
====
58+
// end::known-issue-14686[]
59+
1860
[discrete]
1961
[[bug-fixes-8.14.2]]
2062
==== Bug fixes
@@ -25,6 +67,27 @@ There are no user-facing changes in 8.14.2.
2567
[[release-notes-8.14.1]]
2668
=== 8.14.1
2769

70+
[discrete]
71+
[[known-issue-8.14.1]]
72+
==== Known issues
73+
74+
// tag::known-issue-14686[]
75+
[discrete]
76+
.{elastic-endpoint} does not properly populate the `user.name` field in security events
77+
[%collapsible]
78+
====
79+
*Details* +
80+
{elastic-endpoint} for Windows will not properly populate the `user.name` field with security events.
81+
82+
*Workaround* +
83+
Upgrade to 8.15.1.
84+
85+
*Resolved* +
86+
On September 5, 2024, this issue was resolved.
87+
88+
====
89+
// end::known-issue-14686[]
90+
2891
[discrete]
2992
[[bug-fixes-8.14.1]]
3093
==== Bug fixes
@@ -39,6 +102,27 @@ There are no user-facing changes in 8.14.2.
39102
[[release-notes-8.14.0]]
40103
=== 8.14.0
41104

105+
[discrete]
106+
[[known-issue-8.14.0]]
107+
==== Known issues
108+
109+
// tag::known-issue-14686[]
110+
[discrete]
111+
.{elastic-endpoint} does not properly populate the `user.name` field in security events
112+
[%collapsible]
113+
====
114+
*Details* +
115+
{elastic-endpoint} for Windows will not properly populate the `user.name` field with security events.
116+
117+
*Workaround* +
118+
Upgrade to 8.15.1.
119+
120+
*Resolved* +
121+
On September 5, 2024, this issue was resolved.
122+
123+
====
124+
// end::known-issue-14686[]
125+
42126
[discrete]
43127
[[features-8.14.0]]
44128
==== New features

docs/release-notes/8.15.asciidoc

Lines changed: 181 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,181 @@
1+
[[release-notes-header-8.15.0]]
2+
== 8.15
3+
4+
[discrete]
5+
[[release-notes-8.15.1]]
6+
=== 8.15.1
7+
8+
[discrete]
9+
[[known-issue-8.15.1]]
10+
==== Known issues
11+
12+
// tag::known-issue-189676[]
13+
[discrete]
14+
.Tags appear in Elastic AI Assistant's responses
15+
[%collapsible]
16+
====
17+
*Details* +
18+
On August 1, 2024, it was discovered that Elastic AI Assistant's responses when using Bedrock Sonnet 3.5 may include `<antThinking>` tags, for example `<search_quality_reflection>` ({kibana-issue}189676[#189676]).
19+
20+
21+
====
22+
// end::known-issue-189676[]
23+
24+
[discrete]
25+
[[features-8.15.1]]
26+
==== New features
27+
28+
* Introduces a new feature for {elastic-defend} where Windows Image load events now include process protection status, making it easier to detect both legitimate and malicious PPL activity.
29+
* Allows you to examine Jamf data in the visual event analyzer ({kibana-pull}190965[#190965]).
30+
31+
[discrete]
32+
[[enhancements-8.15.1]]
33+
==== Enhancements
34+
35+
* Improves {elastic-defend} by reducing Malware Protection disk I/O and CPU usage when recently written files are subsequently executed. This update is for Windows endpoints only.
36+
* Makes several improvements to the detection and parsing of log samples uploaded to automatic import ({kibana-pull}190588[#190588], {kibana-pull}191502[#191502], {kibana-pull}190656[#190656], {kibana-pull}190046[#190046]).
37+
* Improves error handling for the Tines connector, and provides an option to use a webhook URL when connecting to the Tines API ({kibana-pull}191263[#191263]).
38+
39+
[discrete]
40+
[[bug-fixes-8.15.1]]
41+
==== Bug fixes
42+
43+
* Fixes an {elastic-defend} bug that affected CPU usage for Windows process events where the same executable is repeatedly launched, for example, during compilation workloads. With this fix, CPU usage is improved.
44+
* Fixes an {elastic-defend} bug that sometimes caused malware scan response actions to crash when they attempted to scan an inaccessible directory.
45+
* Fixes an {elastic-defend} bug that sometimes caused {elastic-endpoint} to report an incorrect version if it used an independent {agent} release.
46+
* Fixes an {elastic-defend} bug where the `process.thread.Ext.call_stack_final_user_module.protection_provenance_path` field might be populated with a non-path value. This fix is for Windows endpoints only.
47+
* Fixes an {elastic-defend} bug that can lead to {elastic-endpoint} reporting `STATUS_ACCESS_DENIED` when attempting to open files for `GENERIC_READ`. {elastic-endpoint} almost always recovered from this issue, but with this fix, it succeeds on the first try. This fix is for Windows endpoints only.
48+
* Fixes an {elastic-defend} regression that was introduced in 8.14.0, where security events did not populate the `user.name` field. This fix is for Windows endpoints only.
49+
* Fixes an {elastic-defend} bug where {elastic-endpoint} sometimes missed file and network events on newer kernels that support eBPF. This only occurred if {elastic-endpoint} failed to enable eBPF probes and fell back to Kprobes. This fix is for Linux endpoints only.
50+
* Fixes a bug that caused errors if you used Azure OpenAI connector for streaming ({kibana-pull}191552[#191552]).
51+
* Fixes a bug that prevented duplicated prebuilt rules from inheriting **Required fields** and **Related integrations** field values ({kibana-pull}191065[#191065]).
52+
* Turns off the option to assign users to an alert if no assignees exist ({kibana-pull}190937[#190937]).
53+
* Fixes a bug that prevented Timeline template settings from being applied to new Timelines that were generated by a rule ({kibana-pull}190511[#190511]).
54+
* Fixes a bug that hid the option to select a connector for Elastic AI Assistant ({kibana-pull}189944[#189944]).
55+
* Removes the option to manually bulk-run multiple rules ({kibana-pull}190781[#190781]).
56+
57+
[discrete]
58+
[[release-notes-8.15.0]]
59+
=== 8.15.0
60+
61+
[discrete]
62+
[[known-issue-8.15.0]]
63+
==== Known issues
64+
65+
// tag::known-issue-189676[]
66+
[discrete]
67+
.Tags appear in Elastic AI Assistant's responses
68+
[%collapsible]
69+
====
70+
*Details* +
71+
On August 1, 2024, it was discovered that Elastic AI Assistant's responses when using Bedrock Sonnet 3.5 may include `<antThinking>` tags, for example `<search_quality_reflection>` ({kibana-issue}189676[#189676]).
72+
73+
74+
====
75+
// end::known-issue-189676[]
76+
77+
// tag::known-issue-5713[]
78+
[discrete]
79+
.The option to manually run multiple rules is available in the bulk actions menu on the Rules page
80+
[%collapsible]
81+
====
82+
*Details* +
83+
On August 20, 2024, it was discovered that the bulk actions menu on the Rules page erroneously had the option to manually run multiple rules.
84+
85+
*Workaround* +
86+
Upgrade to 8.15.1.
87+
88+
*Resolved* +
89+
On September 5, 2024, this issue was resolved.
90+
91+
====
92+
// end::known-issue-5713[]
93+
94+
// tag::known-issue-14686[]
95+
[discrete]
96+
.{elastic-endpoint} does not properly populate the `user.name` field in security events
97+
[%collapsible]
98+
====
99+
*Details* +
100+
{elastic-endpoint} for Windows will not properly populate the `user.name` field with security events.
101+
102+
*Workaround* +
103+
Upgrade to 8.15.1.
104+
105+
*Resolved* +
106+
On September 5, 2024, this issue was resolved.
107+
108+
====
109+
// end::known-issue-14686[]
110+
111+
[discrete]
112+
[[breaking-changes-8.15.0]]
113+
==== Breaking changes
114+
115+
* If you previously created any user-defined quick prompts for Elastic AI Assistant, they will no longer appear after you upgrade to 8.15. To resolve this, copy your existing quick prompts prior to upgrading, then add them again after upgrading. Additionally, in 8.15, quick prompts are shared by all users in your deployment, rather than saved at the user level ({kibana-pull}187040[#187040]).
116+
117+
[discrete]
118+
[[features-8.15.0]]
119+
==== New features
120+
121+
* Introduces Automatic Import, a feature that helps you to quickly parse, ingest, and create ECS mappings for data from sources that don't yet have prebuilt Elastic integrations ({kibana-pull}186304[#186304]).
122+
* Creates an LLM connector for Google Gemini ({kibana-pull}183668[#183668]).
123+
* Adds an API for Elastic AI Assistant ({kibana-pull}184485[#184485]).
124+
* Adds the `scan` action to the response console, which allows you to scan a specific file or directory on a host for malware ({kibana-pull}184723[#184723]).
125+
* Adds an {elastic-defend} integration policy option in Advanced Settings that allows you to opt out of registry event filtering ({kibana-pull}186564[#186564]).
126+
* Allows you to specify additional file and registry paths to monitor for read access ({kibana-pull}181361[#181361]).
127+
* Allows you to use {elastic-sec} to isolate and release hosts running a CrowdStrike agent ({kibana-pull}186801[#186801]).
128+
* Allows you to retrieve files from SentinelOne-enrolled hosts ({kibana-pull}181162[#181162]).
129+
* Allows you to create an event filter that excludes the descendant events of a specific process ({kibana-pull}184947[#184947]).
130+
* Recalculates entity risk scores when asset criticality changes on an individual entity ({kibana-pull}182234[#182234]).
131+
* Adds an **Asset criticality** column to user and host data tables. If asset criticality levels are assigned to your users and hosts, this information appears in the **Asset criticality** column ({kibana-pull}186375[#186375], {kibana-pull}186456[#186456]).
132+
* Adds an API that allows you to perform paginated KQL searches through asset criticality records ({kibana-pull}186568[#186568]).
133+
* Adds public APIs for managing asset criticality ({kibana-pull}186169[#186169]).
134+
* Allows you to edit the `max_signals`, `related_integrations`, and `required_fields` fields for custom rules ({kibana-pull}179680[#179680], {kibana-pull}178295[#178295], {kibana-pull}180682[#180682]).
135+
* Provides help from AI Assistant when you're correcting rule query errors ({kibana-pull}179091[#179091]).
136+
* Allows you to bulk update custom highlighted fields for rules ({kibana-pull}179312[#179312]).
137+
* Adds alert suppression for {ml} and {esql} rules ({kibana-pull}181926[#181926], {kibana-pull}180927[#180927]).
138+
* Provides previews of hosts, users, and alerts that you're examining in the alert details flyout ({kibana-pull}186850[#186850], {kibana-pull}186857[#186857]).
139+
* Enhances Timeline’s data exploration experience by incorporating components from Discover, such as the sidebar and table, which allow you to quickly find fields of interest. Timeline’s overall performance is also improved ({kibana-pull}176064[#176064]).
140+
* Adds an option for toggling row renderers on and off, and moves notes to a new flyout in Timeline ({kibana-pull}186948[#186948]).
141+
* Revamps the Dashboards landing page ({kibana-pull}186465[#186465]).
142+
143+
[discrete]
144+
[[enhancements-8.15.0]]
145+
==== Enhancements
146+
147+
* Allows Attack discovery generation to continue when you navigate to another page, and allows you to run Attack discovery with multiple connectors simultaneously. ({kibana-pull}184949[#184949]).
148+
* Adds notifications to the connector dropdown menu on the Attack discovery page so you know when other connectors have new discoveries ({kibana-pull}186903[#186903], {kibana-pull}187209[#187209]).
149+
* Improves AI Assistant's responses across multiple connectors and in multiple scenarios for streaming and non-streaming use cases ({kibana-pull}182041[#182041], {kibana-pull}187183[#187183]).
150+
* Enables AI Assistant to remember information you ask it to remember ({kibana-pull}184554[#184554], https://github.com/elastic/security-docs/issues/5670[#5670]).
151+
* Updates the default Gemini version to `gemini-1.5-pro-001` and the default Bedrock version to `anthropic.claude-3-5-sonnet-20240620-v1:0` ({kibana-pull}186671[#186671]).
152+
* Simplifies how you enable AI Assistant's knowledge base ({kibana-pull}182763[#182763]).
153+
* Unifies the AI Assistant's settings view ({kibana-pull}184678[#184678]).
154+
* Introduces a new {elastic-endpoint} policy setting that allows you to control whether the kernel reports Windows network events that happened on a local loopback interface ({kibana-pull}181753[#181753]).
155+
* Improves how failure messages for the `scan` action appear in the response console ({kibana-pull}186284[#186284]).
156+
* Improves the risk engine's performance. Now, after you turn on the engine, risk data is available sooner ({kibana-pull}184797[#184797]).
157+
* Enhances the risk engine's normalization accuracy ({kibana-pull}184638[#184638]).
158+
* Updates the copy for bulk assigning asset criticality to multiple entities ({kibana-pull}181390[#181390]).
159+
* Improves visual and logic issues in the Findings table ({kibana-pull}184185[#184185]).
160+
* Enables the expandable alert details flyout by default and replaces the `securitySolution:enableExpandableFlyout` advanced setting with a feature flag that allows you to revert to the old flyout version ({kibana-pull}184169[#184169]).
161+
* Improves the UI design and copy of various places in the alert details flyout ({kibana-pull}187430[#187430], {kibana-pull}187920[#187920]).
162+
* Updates the MITRE ATT&CK framework to version 15.1 ({kibana-pull}183463[#183463]).
163+
* Improves the warning message about rule actions being unavailable after a rule ran ({kibana-pull}182741[#182741]).
164+
* Enables the `xMatters` and `Server Log connectors` rule actions ({kibana-pull}172933[#172933]).
165+
166+
[discrete]
167+
[[bug-fixes-8.15.0]]
168+
==== Bug fixes
169+
170+
* Fixes a bug that prevented Timeline from properly retrieving results after upgrading to 8.14.1 ({kibana-pull}189031[#189031]).
171+
* Fixes a bug that showed that Timeline had been changed, even if it hadn't been ({kibana-pull}188106[#188106]).
172+
* Removes the option to investigate suppressed alerts in Timeline when you're previewing alert details from a rule preview ({kibana-pull}188385[#188385]).
173+
* Fixes the alignment of the page selector dropdown menu on the Shared Exception Lists page ({kibana-pull}187956[#187956]).
174+
* Fixes a rule execution error that occurred when {esql} rules queried source documents with non-ECS compliant sub-fields under the `event.action` field ({kibana-pull}187549[#187549]).
175+
* Fixes a bug that caused the `Enable entity risk scoring` option to display even when you didn't have the correct requirements ({kibana-pull}183517[#183517]).
176+
* Prevents `maxClauseCount` errors from occurring for indicator match rules ({kibana-pull}179748[#179748]).
177+
* Fixes a bug that prevented threat intelligence fields from correctly rendering in the alert details flyout if they had flattened fields ({kibana-pull}179395[#179395]).
178+
* Removes references in the UI that directed users to outdated documentation for the risk scoring feature ({kibana-pull}187585[#187585]).
179+
* Fixes a bug on the Get started page that prevented the correct username from being displayed in the greeting message ({kibana-pull}180670[#180670]).
180+
* Fixes a bug that caused the pagination menu from appearing in the correct place for the Uncommon processes table ({kibana-pull}189201[#189201]).
181+
* Fixes a bug that affected the panel showing the last command details in the Uncommon processes table ({kibana-pull}187848[#187848]).

0 commit comments

Comments
 (0)