Skip to main content

New-Scale Security Operations PlatformNew-Scale Security Operations Platform Release Notes

February 2025

The New-Scale Security Operations Platform includes the following addressed features and new features for February 2025.

Attack Surface Insights

This release does not include new features for Attack Surface Insights.

Automation Management

Feature

Description

New Region Support for the UK

Support for Automation Management now extends to the UK region. You can now access and use Automation Management in the UK.

Cloud Collectors

Feature

Description

Cisco Meraki Cloud Collector

The Cisco Meraki Cloud Collector is now available as part of Cloud Collectors to facilitate data collection from security events, alerts, configuration changes, and networks from Cisco Meraki APIs.

Mimecast Cloud Collector

The Mimecast Cloud Collector is now available as part of Cloud Collectors Early Access program to facilitate data collection from the data sources Archive Search Logs, TTP Attachment Protection Logs, TTP Impersonation Protect Logs, TTP URL Logs, SIEM Logs, Archive Message View Logs, and Audit Events..

The early access program offers you an opportunity to gain access to the latest cloud collectors before their official release. To participate, see Sign Up for the Early Access Program.

REST API Cloud Collector

The REST API Cloud Collector is now available as part of Cloud Collectors Early Access program to facilitate data collection from REST API endpoints from a broad range of vendors and products.

The early access program offers you an opportunity to gain access to the latest cloud collectors before their official release. To participate, see Sign Up for the Early Access Program.

Sophos Cloud Collector

The Sophos Cloud Collector is now available as part of Cloud Collectors Early Access program to facilitate data collection from the data sources alerts and events.

The early access program offers you an opportunity to gain access to the latest cloud collectors before their official release. To participate, see Sign Up for the Early Access Program.

Context Management

This release does not include new features for Context Management.

Correlation Rules

Feature

Description

Stopped and Testing Statuses

You can now better understand the state of a correlation rule with two new statuses: Stopped and Testing.

The Stopped status indicates that the rule has triggered more than 50 times in five minutes and has automatically been disabled.

The Testing status indicates that the rule is enabled in test mode and its outcomes are suppressed.

A correlation rule with Testing status.

You can also filter correlation rules by the new statuses.

The Status filters for correlation rules.

Select Outcomes Enhancements

When you create or edit a correlation rule, the step to Select Outcomes now clearly explains what happens when a rule triggers and the possible outcomes:

  • Designating outcomes for a rule is optional.

  • An event is created every time a rule triggers, even in test mode. If a rule triggers and isn't in test mode, the activity type of the event is rule-trigger. If a rule triggers in test mode, the activity type of the event is rule-trigger-test.

  • If you have a license that supports Threat Center, Threat Center may also create an alert when a rule triggers, depending on whether the rule is in test mode. If the rule triggers and isn't in test mode, Threat Center creates an alert. if the rule triggers and is in test mode, Threat Center doesn't create an alert.

Correlation Rule Details Severity Enhancement

When you view correlation rule details, you can now more quickly identify the rule severity:

The details of a correlation rule showing critical severity and a static risk score of 90.
  • The severity value is now positioned first in its section.

  • The severity is now color-coded according to its value: Critical, High, Medium, or Low.

Rule Evaluation Delay Explanation

When you create or edit a correlation rule, the step to configure a rule evaluation delay now clearly explains what rule evaluation delay is and that rules are delayed from evaluating events for seven minutes by default.

The option to edit the rule evaluation delay and an explanation of what rule evaluation delay is: Consider adjusting the rule evaluation delay if the rule relies heavily on the timely arrival of events and late-arriving events can significantly effect its accuracy.
The modal to edit the rule evaluation delay with information about checking the Log Delay dashboard to help determine the appropriate rule evaluation delay value.

Rule Description Enhancements

You can now add more information to a correlation rule with descriptions.

When you create or edit a correlation rule, you can now add a description about the rule.

The Review & Save step of creating or editing a correlation rule, with the Rule Description field highlighted with a red rectangle.

This description appears in the list of correlation rules and rule details.

A correlation rule in the list with the rule description highlighted with a red rectangle.
Details of a correlation rule with the rule description highlighted in a red rectangle.

If you use a correlation rule template, the correlation rule template description is automatically reused as the description of your new correlation rule.

Triggered Value to Search Navigation

To view all events related to a correlation rule, you can now navigate to Search using a link next to the number times a rule has been triggered. The query automatically entered in Search is rules.rule: "<rule name>".

The link appears in the list of correlation rules:

A correlation rule in the list with its link to Search highlighted with a red rectangle.

The link also appears when you view the correlation rule details:

Correlation rule details with the link to Search highlighted with a red rectangle.

Email Notification Address Change

Email notifications sent as an outcome are now sent from [email protected].

To ensure any rules for filtering emails or creating third-party tickets work properly, ensure they use the new email address.

New Region Support for the UK

Support for Correlation Rules now extends to the UK region. You can now access and use Correlation Rules in the UK.

Dashboards

Feature

Description

Auto-Creating a Threat Center Alert Visualization from a Natural Language Prompt

As part of Exabeam Nova and its set of AI-driven capabilities, the use of the natural language prompt for auto-creating a dashboard visualization has been expanded to an additional data model. You can now use the natural language prompt for the Threat Center Alerts data model. This enhancement means that you can leverage the natural language prompt in the Dashboard application to describe, in plain language, the Threat Center Alerts data you want to visualize. Based on this plain language prompt, the measures, dimensions, filters, and even the chart type are configured automatically.

Note

This auto-create option is currently available to create visualizations only for the Event Store Event data model and the Threat Center Alerts data model. You must be using Threat Center to access the Threat Center Alerts data model.

If the automatically generated visualization does not produce the data you want to visualize, you can modify the visualization settings manually to produce exactly the desired results.

For more information about auto-creating visualizations, see Auto-Create a Visualization from a Natural Language Prompt in the Dashboards Guide.

Log Stream

This release does not include new features for Log Stream.

Multi-Org Management

This release does not include new features for Multi-Org Management.

New-Scale Platform

This release does not include new features for New-Scale Platform.

Outcomes Navigator

This release does not include new features for Outcomes Navigator.

Search

Feature

Description

Support for Device Context Tables

You can now include device context tables in both Basic and Advanced search queries, allowing you to search for information about devices in your environment. Specifically, you can now search for results in the following types of device context tables:

  • Active Directory

  • CrowdStrike

  • Microsoft Entra ID

For more information, see Context Tables in Search in the Search Guide.

Service Health and Consumption

Feature

Description

Export License View Details to PDF

The License View dashboard now includes an option to export all its details as a PDF file.

Improvements for License View

The License View dashboard now provides you with a new section Regions Deployed that displays region name in which the New-Scale Security Operations Platform is deployed, such as US West, US East, Canada, Europe, Switzerland, Saudi Arabia, Singapore, Japan, and Australia.

Site Collectors 2.6

Feature

Description

Kafka Collector

The Kafka Collector is now available as part of Site Collectors to facilitate the collection of logs in any text format from your Kafka server.

Archive Windows Collector

The Archive Windows Collector is now available as part of Site Collectors to facilitate the collection of log events from the following types of archived log files: *.gz, *.tar, *.tar.gz, *.gzip, *.rar, *.7z.

Archive Linux Collector

The Archive Linux Collector is now available as part of Site Collectors to facilitate the collection of log events from archived log sources *.7z, *.arj, *.bzip2, *.cab, *.gzip, *.iso, *.lzh, *.rar, *.gz, *.tar, *.tar.gz, *.z, and *.zip.

Windows File Collector Recovery

You can now update an agent collector from the overview page to recover the collector if it does not collect logs while running. Previously, resolving Windows File Collector log ingestion issues required manual intervention.

Ubuntu 24.04 Support for OVA

Updated the existing Ubuntu 20.04 version to Ubuntu 24.04 for OVA, for better performance, security, and software support.

Threat Center

Feature

Description

Case ID Enhancement

To ensure all cases have a human-readable identifier to which you can refer, all cases are now automatically assigned a unique number as the case ID.

You can view the case ID in the list of cases, in a case, emails sent from the case, and webhook notifications sent from the case. You can also search for a case using its case ID.

Case IDs for existing cases remain the same and won't have new case IDs retroactively assigned to them.

Entity Attribute Enhancements

If a case or alert contains detections grouped by entity, you can now learn more about the entity and view the entity attributes directly in Threat Center:

  • In the case or alert Overview tab, under Grouped By, click View Details to view the entity attributes.

    The Grouped By section of the Overview tab showing source device entity desktop-lp0294.
  • In the list of cases or alerts, under the GROUPED BY column, click the entity to view the entity attributes.

    A case in the list with the associated entity highlighted in a red rectangle.

New Region Support for the UK

Support for Threat Center now extends to the UK region. You can now access and use Threat Center in the UK.

Threat Detection Management

Feature

Description

Correlation Rules Stopped and Testing Statuses

You can now better understand the state of a correlation rule with two new statuses: Stopped and Testing.

The Stopped status indicates that the rule has triggered more than 50 times in five minutes and has automatically been disabled.

The Testing status indicates that the rule is enabled in test mode and its outcomes are suppressed.

A correlation rule with Testing status.

You can also filter correlation rules by the new statuses.

The Status filters for correlation rules.

Apply Analytics Rule Updates Without Training

To immediately apply changes to analytics rules, minimize disruptions to other Exabeam applications, ensure the analytics engine continues to run in real time, and ensure you don't use any of your entitled training days, you can now apply analytics rules changes without training the analytics engine.

When you apply changes to enabled rules in bulk, you now have the option to select Apply Changes Without Training.

Correlation Rules Select Outcomes Enhancement

When you create or edit a correlation rule, the step to Select Outcomes now clearly explains what happens when a rule triggers and the possible outcomes:

  • Designating outcomes for a correlation rule is optional.

  • An event is created every time a correlation rule triggers, even in test mode. If a correlation rule triggers and isn't in test mode, the activity type of the event is rule-trigger. If a correlation rule triggers in test mode, the activity type of the event is rule-trigger-test.

  • If you have a license that supports Threat Center, Threat Center may also create an alert when a correlation rule triggers, depending on whether the correlation rule is in test mode. If the correlation rule triggers and isn't in test mode, Threat Center creates an alert. if the correlation rule triggers and is in test mode, Threat Center doesn't create an alert.

Correlation Rule Details Severity Enhancement

When you view correlation rule details, you can now more quickly identify the correlation rule severity:

The details of a correlation rule showing critical severity and a static risk score of 90.
  • The severity value is now positioned first in its section.

  • The severity is now color-coded according to its value: Critical, High, Medium, or Low.

  • If the correlation rule is assigned a static risk score, the risk score is displayed alongside the severity.

Correlation Rule Evaluation Delay Explanation

When you create or edit a correlation rule, the step to configure a rule evaluation delay now clearly explains what correlation rule evaluation delay is and that correlation rules are delayed from evaluating events for seven minutes by default.

The option to edit the rule evaluation delay and an explanation of what rule evaluation delay is: Consider adjusting the rule evaluation delay if the rule relies heavily on the timely arrival of events and late-arriving events can significantly effect its accuracy.
The modal to edit the rule evaluation delay with information about checking the Log Delay dashboard to help determine the appropriate rule evaluation delay value.

Correlation Rule Description Enhancements

You can now add more information to a correlation rule with descriptions.

When you create or edit a correlation rule, you can now add a description about the correlation rule.

The Review & Save step of creating or editing a correlation rule, with the Rule Description field highlighted with a red rectangle.

This description appears in the list of correlation rules and correlation rule details.

A correlation rule in the list with the rule description highlighted with a red rectangle.
Details of a correlation rule with the rule description highlighted in a red rectangle.

If you use a correlation rule template, the correlation rule template description is automatically reused as the description of your new correlation rule.

Correlation Rule Triggered Value to Search Navigation

To view all events related to a correlation rule, you can now navigate to Search using a link next to the number times a rule has been triggered. The query automatically entered in Search is rules.rule: "<rule name>".

The link appears in the list of correlation rules:

A correlation rule in the list with its link to Search highlighted with a red rectangle.

The link also appears when you view the correlation rule details:

Correlation rule details with the link to Search highlighted with a red rectangle.

Correlation Rule Email Notification Address Change

Email notifications sent as a correlation rule outcome are now sent from [email protected].

To ensure any rules for filtering emails or creating third-party tickets work properly, ensure they use the new email address.

New Region Support for the UK

Support for Threat Detection Management now extends to the UK region. You can now access and use Threat Detection Management in the UK.

Resolved Issues

Search Resolved Issues

ID

Description

NGS-4653

Previously, when using the Search API to retrieve events, the limit parameter accepted a value of -1. This parameter now requires a positive integer to return events when the API runs. The default value is 3,000 events but higher values can be set.

api-limit.png

Site Collectors 2.6 Hot Fixes

Release Number

Hot Fix Description

2.6.6

Improved concurrency in Windows Event Log Collector to optimize overall performance.

2.6.5

Identified and resolved an issue to ensue the upgrade process correctly integrates the dynamic concurrency mechanism for Site Collectors.

2.6.4

Implemented a fix to ensure seamless functionality of multi-template configuration changes in the Windows Archive collector.

2.6.3

Resolved an issue that caused syslog agent collector rename failure.

2.6.2

Implemented enhancements for agent collectors.

2.6.1

Fixed an issue related to Windows management service.

Site Collectors 2.6 CVE Remediations

The following table lists the CVEs remediated for the NiFi container and their severity. For information about the Exabeam commitment to remediating vulnerabilities for Site Collectors, see the Vulnerability Remediation Policy.Vulnerability Remediation Policy

Critical

High

Medium

Low

Total: 0

Total: 0

Total: 4

Total: 1

  • CVE-2025-0395

  • CVE-2022-49043

  • CVE-2024-53164

  • CVE-2024-12254

CVE-2024-34459

Threat Center Resolved Issues

ID

Description

TC-3054

When you built a search using the Assigned to my queue quick search, the query used your role instead of your queue.