What's new in 8.12 #4465
Labels
Effort: Medium
Issues that take moderate but not substantial time to complete
highlights
Priority: High
Issues that are time-sensitive and/or are of high customer importance
v8.12.0
Please add your features and enhancements for
8.12
. Don't forget to include the related PR link!Detections & Response
Rules Management
When Elastic updates a prebuilt detection rule, you can examine the latest version before you update to it. The rule details flyout in Rule Updates displays a side-by-side JSON comparison of the rule’s Base version (what you currently have installed) and the Update version that you can choose to install.
Detection Engine
Alert suppression now supports the threshold detection rule type. You can use it to reduce the number of repeated or duplicate detection alerts created by a threshold rule.
You can now assign users to alerts that you want them to investigate, and manage alert assignees throughout an alert’s lifecycle. Assigned alerts are filterable and you can find assignees by adding the
kibana.alert.workflow_assignee_ids
field to the Alerts table or by opening an alert's details.Threat Hunting
Explore
Investigations
Timeline now opens as a modal, has an option to manually save changes, and has undergone significant UI changes. For example, the query builder is now collapsible, which allows you to have more space for Timeline results.
You can now remove the ES|QL tab by editing your {cloud}/ec-manage-kibana-settings.html#ec-manage-kibana-settings[{kib} user settings] and adding the
xpack.securitySolution.enableExperimental: ["timelineEsqlTabDisabled"]
feature flag.The default query was removed for increased tab performance. (I'm going to follow up with Michael on this next Tuesday to see if he wants this doc'd in What's new and for specific language.)
Generative AI
EDR Workflows/Asset Management
Bidirectional integration response actions (SentinelOne) (Bidirectional integration response actions (SentinelOne) — Classic docs #4593).
Powered by the SentinelOne integration for Elastic Agent, SentinelOne response actions allow you to perform bidirectional actions on protected hosts, such as directing SentinelOne to isolate a suspicious endpoint from your network, without needing to leave the Elastic Security UI.
Event filters and endpoint exceptions support for
matches
anddoes not match
conditions (Addmatches
capabilities to event filter creation (classic docs) #4602).You can now use
matches
anddoes not match
conditions on more fields when configuring event filters and endpoint exceptions. Previously, only thefile.path.text
field was supported.New Osquery query timeout setting ([8.12][ESS] Document Osquery Timeout setting #4611, [DOCS] Documents Osquery Timeout setting kibana#174595).
Allows you to set timeout period, in seconds, after which the query will stop running. Overwriting the default timeout allows you to support queries that require more time to complete. The default and minimum supported value is
60
. The maximum supported value is900
.Cloud Security
Endpoint
Protections Experience
ResponseOps
The text was updated successfully, but these errors were encountered: