- 2025 Release Notes
- August 2025
- July 2025
- June 2025
- May 2025
- April 2025
- March 2025
- February 2025
- January 2025
- Known Issues
August 2025
The New-Scale Security Operations Platform includes the following addressed features and new features for <Month> 2025.
Attack Surface Insights
Feature | Description |
---|---|
TBD | TBD |
Automation Management
Feature | Description |
---|---|
TBD | TBD |
Cloud Collectors
Feature | Description |
---|---|
TBD | TBD |
Context Management
Feature | Description |
---|---|
Pre-Built Vulnerability Scanners Context Table | Context Management now provides new pre-built correlation rules context tables. The first of these to be made available is the Vulnerability Scanners context table. The correlation rules context tables support the detection activities of correlation rules and are documented along with pre-built New-Scale Analytics and Attack Surface Insights context tables. For more information, see Pre-Built Detection Context Tables. |
Correlation Rules
Feature | Description |
---|---|
TBD | TBD |
Dashboards
Feature | Description |
---|---|
TBD | TBD |
Log Sources
Feature | Description |
---|---|
TBD | TBD |
Outcomes Navigator
Feature | Description |
---|---|
TBD | TBD |
Search
Feature | Description | ||||
---|---|---|---|---|---|
Improvements to Search Results Views and Detail Panels | Search includes the following improvements to certain aspects of the way search results are displayed:
For more information about any of these views or Details panel tabs, see the Search Results section of the Search Guide. | ||||
Associated Events for Detections in the Timeline View | Search has been updated to support the display of all events associated with a detection in the Timeline view. A detection event can be triggered by multiple events and, to keep the display of results in the Timeline view simple and uncluttered, the detection is shown only on the row of the latest chronological event that triggered it. Now, a new Show Associated Events option in the detection box lets you expand a full list of all the events associated with the detection. The list of associated events expands below the original event row and you can interact with the listed events in all the ways you can interact with other events. Alternately, you can opt to open the expanded set of associated events in a new Search tab.
For more information, see Detection in the Timeline in the Search Guide. | ||||
Support for Sort Order in Saved and Exported Searches | The selected sort order information is now persisted in a new Sorting column for both recent and saved searches lists. The column shows which sort order options was selected when the search query ran. For more information, see Saved Searches in the Search Guide. In addition, the sort order selector is now available when exporting search results. It includes options to sort chronologically to show the most recent or the oldest results. For more information, see Export Search Results in the Search Guide. |
Service Health and Consumption
Feature | Description |
---|---|
TBD | TBD |
Site Collectors <x.xx>
Feature | Description |
---|---|
TBD | TBD |
Threat Center
Feature | Description |
---|---|
TBD | TBD |
Threat Detection Management
Feature | Description |
---|---|
TBD | TBD |
Resolved Issues
Search Resolved Issues
ID | Description |
---|---|
ENG-74006 | An issue has been fixed so that when you save a search with a relative time range, the time range remains relative when the saved search is run on subsequent days. Previously, if you defined a query with a relative time range from 10 days ago to now, and you ran the saved search two days later, it returned results from 12 to 2 days ago. This issue is resolved so that a relative search remains relative whenever you run it. |
Site Collectors <x.xx> Resolved Issues
ID | Description |
---|---|
TBD | TBD |
Site Collectors <x.xx> CVE Remediations
The following table lists the CVEs remediated for the NiFi container and their severity. For information about the Exabeam commitment to remediating vulnerabilities for Site Collectors, see the Vulnerability Remediation Policy.
Critical | High | Medium | Low |
---|---|---|---|
Total: 0 | Total: 0 | Total: 0 | Total: 0 |
– | – |
|
|