Skip to main content

New-Scale Security Operations PlatformNew-Scale Security Operations Platform Release Notes

July 2025

The New-Scale Security Operations Platform includes the following addressed features and new features for July 2025.

Attack Surface Insights

This release does not include new features for Attack Surface Insights.

Automation Management

This release does not include new features for Automation Management.

Cloud Collectors

Feature

Description

Anomali Cloud Collector

The Anomali Cloud Collector is now available is now available, as part of Cloud Collectors to facilitate threat intelligence data collection from an Anomali source that supports the STIX/TAXII framework. You can opt to collect data about either IP addresses or domains. You can also opt to automatically generate a corresponding Anomali context table in the Context Management application that will process the data and map it to a standardized set of attributes. The context table will have the same name as the cloud collector.

Authentication Method options to Authenticate via Microsoft Entra ID for Azure EventHub Cloud Collector

In addition to the existing Shared Access Signature (SAS) based connection string authentication method, the Azure EventHub Cloud Collector now supports authentication via Microsoft Entra ID Account for more secure, and centralized identity and access management.

Early Access Collectors

Dropbox Cloud Collector

The Dropbox Cloud Collector is now available as part of Cloud Collectors Early Access program, to facilitate ingestion of team activity logs from Dropbox.

The early access program offers you an opportunity to gain access to the latest cloud collectors before their official release. To participate, see Sign Up for the Early Access Program.

Qualys Cloud Collector

The Qualys Cloud Collector is now available as part of Cloud Collectors Early Access program, to facilitate ingestion of Activity Logs, and Vulnerabilities including VM host detection events from Qualys sources.

The early access program offers you an opportunity to gain access to the latest cloud collectors before their official release. To participate, see Sign Up for the Early Access Program.

Slack Cloud Collector

The Slack Cloud Collector is now available as part of Cloud Collectors Early Access program, to facilitate ingestion of events from the Audit Logs API endpoints.

The early access program offers you an opportunity to gain access to the latest cloud collectors before their official release. To participate, see Sign Up for the Early Access Program.

Context Management

Feature

Description

Anomali Context Tables

Context Management now supports a preconfigured onboarding experience for Anomali context tables. These tables process data that is ingested by a corresponding Anomali cloud collector that supports the STIX/TAXII framework. By default these context tables process a predetermined set of IP or domain attributes from the source collector and then map these attributes to a set of standardized Exabeam target attributes.

For more information, see Anomali Context Tables in the Context Management Guide.

For information about onboarding an Anomali context table via a cloud collector, see Anomali Cloud Collector in the Cloud Collectors Administration Guide.

Delete Records via a New Public API

You can now delete one or more records directly from a custom context table via a new public API. To indicate the records to be deleted, specify the values from the primary key column of the table in the API request body. Note that this API can be used to remove records only from custom context tables.

For more information, see Context Management APIs and look for the following API: DELETE /context-management/v1/ tables/{id}/deleteRecords

Correlation Rules

This release does not include new features for Correlation Rules.

Dashboards

This release does not include new features for Dashboards.

Log Sources

Feature

Description

Log Source Monitoring

Using the Log Source service you can now detect and monitor active and inactive log sources. In addition to granular monitoring of log sources, the Log Source service offers log source policy configuration and discovery, log source status visibility, and export of log sources.

Support for New Log Source Identifiers

While creating a log source policy you can now select unique log source identifiers from a wide range of options to detect and monitor active and inactive log sources.

Log Stream

This release does not include new features for Log Stream.

Multi-Org Management

This release does not include new features for Multi-Org Management

New-Scale Platform

Feature

Description

Global Email Notifications

To extend the ability of notifications for system events, you can now send email notifications to a specific user or a shared distribution list.

For more information, see Manage Global Notifications Preferences in the New-Scale Security Operations Platform Administration Guide.

Outcomes Navigator

Feature

Description

Exabeam Nova Advisor Agent Renaming

The Exabeam Nova Analyst Assistant is now renamed Exabeam Nova Advisor Agent.

Search

This release does not include new features for Search.

Service Health and Consumption

This release does not include new features for Service Health and Consumption.

Site Collectors 2.11 (July 2025)

Feature

Description

Support for Additional Ports for Syslog Collector Configuration

In addition to the supported port range 1024 - 49151, the port numbers 514 and 515 of the Syslog server are now supported for configuration of Syslog and Fortinet Collectors.

Threat Center

Feature

Description

Enhanced Search Timeline Navigation

You can more easily navigate to the Search timeline view from Threat Center to view all detections related to the attribute or entity by which they are grouped.

From the cases and alerts lists, you can now navigate directly to the Search timeline view by clicking Two circles connected by two curved lines with a right angle in the center.:

The Cases tab with the column to navigate to the Search timeline view highlighted in a red rectangle.
The Alerts tab with the column to navigate to the Search timeline view highlighted in a red rectangle.

In cases and alerts, you can now navigate directly to the Search timeline view by clicking Timeline:

A case with the Timeline button highlighted in a red rectangle.

The query automatically generated in Search has been enhanced to show detections only and in the same time range applied in Threat Center search.

Threat Detection Management

Feature

Description

Custom Analytics Rules

To detect unique security threats not addressed with pre-built analytics rules or correlation rules, you can now create your own analytics rule.

To create an analytics rule, you define the analytics rule in JSON format, then import the JSON file into Threat Detection Management. An imported analytics rule is initially disabled. To activate it and allow it to trigger in your environment, you must enable it and apply the change to your environment.

After you create a custom analytics rule, you can export and delete it.

Custom analytics rules are available with an add-on to a New-Scale Security Operations porfolio license.

Resolved Issues

Attack Surface Insights Resolved Issues

Issue ID

Description

ENG-73607

When you selected all entities matching a search query, the action to edit all selected entities was incorrectly made available. You could edit the entities displayed on the page only, not all entities matching the search query. Now, when you select all entities matching a search query, the ability to edit those entities is disabled.

Site Collector 2.11: Security Vulnerabilities Remediated in July 2025

The Site Collectors 2.11 (July 2025) release includes remediated security vulnerabilities. For more information about Exabeam’s commitment to remediating vulnerabilities for Site Collector, see the Vulnerability Remediation PolicyVulnerability Remediation Policy

Known CVE - CVE-2025-48734. This is a NiFi CVE. Site Collector uses the latest NiFi version 2.4.0 and will update to the new version after NiFi provides a fix in an upcoming NiFi release.

Toolkit has been deprecated and is no longer in use hence no security vulnerabilities update is available for that.

The following table lists the CVEs remediated for the Nifi container and their severity.

CVEs for NiFi

Critical

High

Medium

Low

Total: 0

Total: 0

Total: 11

Total: 1

  • CVE-2025-50181

  • CVE-2025-6020

  • CVE-2024-12718

  • CVE-2025-4138

  • CVE-2025-4330

  • CVE-2025-4435

  • CVE-2025-4516

  • CVE-2025-4517

  • CVE-2025-1795

  • CVE-2025-50182

  • CVE-2025-4598

CVE-2024-47081