Skip to main content

New-Scale Security Operations PlatformNew-Scale Security Operations Platform Release Notes

July 2025

The New-Scale Security Operations Platform includes the following addressed features and new features for July 2025.

Cloud Collectors

Feature

Description

Anomali Cloud Collector

The Anomali Cloud Collector is now available is now available, as part of Cloud Collectors to facilitate threat intelligence data collection from an Anomali source that supports the STIX/TAXII framework. You can opt to collect data about either IP addresses or domains. You can also opt to automatically generate a corresponding Anomali context table in the Context Management application that will process the data and map it to a standardized set of attributes. The context table will have the same name as the cloud collector.

Authentication Method options to Authenticate via Microsoft Entra ID for Azure EventHub Cloud Collector

In addition to the existing Shared Access Signature (SAS) based connection string authentication method, the Azure EventHub Cloud Collector now supports authentication via Microsoft Entra ID Account for more secure, and centralized identity and access management.

Early Access Collectors

Dropbox Cloud Collector

The Dropbox Cloud Collector is now available as part of Cloud Collectors Early Access program, to facilitate ingestion of team activity logs from Dropbox.

The early access program offers you an opportunity to gain access to the latest cloud collectors before their official release. To participate, see Sign Up for the Early Access Program.

Qualys Cloud Collector

The Qualys Cloud Collector is now available as part of Cloud Collectors Early Access program, to facilitate ingestion of Activity Logs, and Vulnerabilities including VM host detection events from Qualys sources.

The early access program offers you an opportunity to gain access to the latest cloud collectors before their official release. To participate, see Sign Up for the Early Access Program.

Slack Cloud Collector

The Slack Cloud Collector is now available as part of Cloud Collectors Early Access program, to facilitate ingestion of events from the Audit Logs API endpoints.

The early access program offers you an opportunity to gain access to the latest cloud collectors before their official release. To participate, see Sign Up for the Early Access Program.

Context Management

Feature

Description

Anomali Context Tables

Context Management now supports a preconfigured onboarding experience for Anomali context tables. These tables process data that is ingested by a corresponding Anomali cloud collector that supports the STIX/TAXII framework. By default these context tables process a predetermined set of IP or domain attributes from the source collector and then map these attributes to a set of standardized Exabeam target attributes.

For more information, see Anomali Context Tables in the Context Management Guide.

For information about onboarding an Anomali context table via a cloud collector, see Anomali Cloud Collector in the Cloud Collectors Administration Guide.

Delete Records via a New Public API

You can now delete one or more records directly from a custom context table via a new public API. To indicate the records to be deleted, specify the values from the primary key column of the table in the API request body. Note that this API can be used to remove records only from custom context tables.

For more information, see Context Management APIs and look for the following API: DELETE /context-management/v1/ tables/{id}/deleteRecords

Log Sources

Feature

Description

Log Source Monitoring

Using the Log Source service you can now detect and monitor active and inactive log sources. In addition to granular monitoring of log sources, the Log Source service offers log source policy configuration and discovery, log source status visibility, and export of log sources.

Support for New Log Source Identifiers

While creating a log source policy you can now select unique log source identifiers from a wide range of options to detect and monitor active and inactive log sources.

New-Scale Platform

Feature

Description

Global Email Notifications

To extend the ability of notifications for system events, you can now send email notifications to a specific user or a shared distribution list.

For more information, see Manage Global Notifications Preferences in the New-Scale Security Operations Platform Administration Guide.

Outcomes Navigator

Feature

Description

Exabeam Nova Advisor Agent Renaming

The Exabeam Nova Analyst Assistant is now renamed Exabeam Nova Advisor Agent.

Site Collectors 2.11 (July 2025)

Feature

Description

Support for Additional Ports for Syslog Collector Configuration

In addition to the supported port range 1024 - 49151, the port numbers 514 and 515 of the Syslog server are now supported for configuration of Syslog and Fortinet Collectors.

Threat Center

Feature

Description

Enhanced Search Timeline Navigation

You can more easily navigate to the Search timeline view from Threat Center to view all detections related to the attribute or entity by which they are grouped.

From the cases and alerts lists, you can now navigate directly to the Search timeline view by clicking Two circles connected by two curved lines with a right angle in the center.:

The Cases tab with the column to navigate to the Search timeline view highlighted in a red rectangle.
The Alerts tab with the column to navigate to the Search timeline view highlighted in a red rectangle.

In cases and alerts, you can now navigate directly to the Search timeline view by clicking Timeline:

A case with the Timeline button highlighted in a red rectangle.

The query automatically generated in Search has been enhanced to show detections only and in the same time range applied in Threat Center search.

Threat Detection Management

Feature

Description

Custom Analytics Rules

To detect unique security threats not addressed with pre-built analytics rules or correlation rules, you can now create your own analytics rule.

To create an analytics rule, you define the analytics rule in JSON format, then import the JSON file into Threat Detection Management. An imported analytics rule is initially disabled. To activate it and allow it to trigger in your environment, you must enable it and apply the change to your environment.

After you create a custom analytics rule, you can export and delete it.

Custom analytics rules are available with an add-on to a New-Scale Security Operations porfolio license.

New and Updated Pre-Built Analytics Rules

This analytics rule update was released on July 23, 2025.

You can now better detect remote access abuse, suspicious process execution, and first time login activities with new and updated pre-built analytics rules.

New pre-built analytics rules include:

  • Fact-PCGoToMyPC-InstalledAgent – The GoToMyPC remote desktop access agent has been installed.

  • Fact-PCGoToMyPC-InstalledService – The GoToMyPC remote desktop access service has been installed.

  • Fact-PCGoToMyPC-StartedService – The GoToMyPC remote desktop access service has been started.

  • Fact-PCLogMeIn-InstalledService – The LogMeIn remote desktop access service has been installed.

  • Fact-PCLogMeIn-InstalledAgent – The LogMeIn remote desktop access agent has been installed.

  • Fact-PCLogMeIn-StartedService – The LogMeIn remote desktop access service has been started.

  • Fact-PC-MshtaScriptExecution – The MsHTA (Microsoft HTML Application) process has been used to execute a script code.

  • Fact-PCTeamViewer-InstalledService – The TeamViewer remote desktop access service has been installed.

  • Fact-PCTeamViewer-InstalledAgent – The TeamViewer remote desktop access agent has been installed.

  • Fact-PCTeamViewer-StartedService – The TeamViewer remote desktop access service has been started.

  • Fact-PCDotNet-CommandLine – This .NET supporting process was created with an URL in the commandline.

  • Prof-GA-Country-O-DCountry – This is the first time an activity has been observed to this country, determined by geolocation lookup.

  • Prof-FWrite-UMWorkerProcess-PN-FN – This is the first time this file was created by the 'umworkerprocess.exe' process.

  • Prof-EL-NTLM-O-SE – This is the first time a successful NTLM login has been observed from this endpoint.

  • Fact-PC-RemoteExecAdminShare – A remote process has been executed and redirected to an admin share. This activity can be related to the execution of Impacket.

  • Prof-GA-Country-DZ-SCountry – This is the first time an activity has been observed from this country to this network zone, determined by geolocation lookup.

  • Prof-GA-Country-SZ-DCountry – This is the first time an activity has been observed to this country for this network zone, determined by geolocation lookup.

  • Fact-PCsvchost-DCOMLaunch – Remote DCOM activation under DcomLaunch service.

  • Prof-PCMsbuild-E-O-DE – This is the first time the 'msbuild.exe' process has been used to build and execute a project on this endpoint.

  • Fact-PCSplashtop-InstalledService – The Splashtop remote desktop access service has been installed.

  • Fact-PCSplashtop-InstalledAgent – The Splashtop remote desktop access agent has been installed.

  • Fact-PCSplashtop-StartedService – The Splashtop remote desktop access service has been started.

Pre-built analytics rules for which detectionReason was updated include:

  • Prof-ELNAC-Loc-U-Loc – This is the first time this user has been observed logging into an endpoint using a network access control platform from this network location.

  • Prof-ELNAC-LT-UD-LT – This is the first time a network access control login type has been observed in login events for users in this department. These events may include both failed and successful logins.

  • Prof-ELNAC-LT-U-LT – This is the first time this network access control login type has been observed in login events for this user. These events may include both failed and successful logins.

  • Prof-ELNAC-LT-O-LT – This is the first time this network access control login type has been observed in login events for the organization. These events may include both failed and successful logins.

  • Prof-ELNAC-E-U-SMac – This is the first a network access control login event has been observed coming from this MAC address for this user. These events may include both failed and successful logins.

  • Prof-EL-HT-U-HT – This is the first time this user has attempted to log into an endpoint of this type (server, workstation...).

  • Prof-EL-EDC-O-SZ – This is the first time an endpoint login event to a domain controller has been observed originating from this network zone for the organization. These events may include both failed and successful logins.

  • Prof-EL-E-UD-DE – This is the first time a user from this department attempted to log into this endpoint. These events may include both failed and successful logins.

  • Prof-EL-E-U-SE – This is the first time this user attempted to login from this endpoint. These events may include both failed and successful logins.

  • Prof-EL-E-U-DE – This is the first time this user attempted to log into this endpoint. These events may include both failed and successful logins.

  • Prof-EL-Acct-U-Acct – This is the first time this user has attempted to log into an endpoint using this domain account. These events may include both failed and successful logins.

  • Prof-AL-E-U-SE – This is the first time this user attempted to log into an application from this endpoint. These events may include both failed and successful logins.

  • Prof-AL-E-O-SE – This is the first time a user in the organization attempted to log into an application from this endpoint. These events may include both failed and successful logins.

  • NumDCP-EL-DEC-O-DE – An abnormal number of unique destination endpoints have been observed in endpoint login events for the organization. These events may include both failed and successful logins.

  • NumDCP-EL-DEC-U-DE – An abnormal number of unique destination endpoints have been observed in endpoint login events for this user. These events may include both failed and successful logins.

  • Prof-EL-EDC-U-SZ – This is the first time an endpoint login event to a domain controller has been observed originating from this network zone for this user. These events may include both failed and successful logins.

Pre-built analytics for which trainOnCondition was updated include:

  • Prof-PC-PPN-PPN-PN – This is the first time this child process has been observed for this matured parent process.

  • Prof-PC-PPN-PN-PPN – This is the first time this parent process has been observed for this matured child process.

Removed pre-built analytics rule include:

  • Fact-DSOW-DCSyn-Attr – The GC (global catalog) and DRS (directory replication service) service principal names have been added to an endpoint. These SPNs are required for the active directory replication process, and can be added to a rogue domain controller to execute a DCShadow attack.

Resolved Issues

Attack Surface Insights Resolved Issues

Issue ID

Description

ENG-73607

When you selected all entities matching a search query, the action to edit all selected entities was incorrectly made available. You could edit the entities displayed on the page only, not all entities matching the search query. Now, when you select all entities matching a search query, the ability to edit those entities is disabled.

Site Collector 2.11: Security Vulnerabilities Remediated in July 2025

The Site Collectors 2.11 (July 2025) release includes remediated security vulnerabilities. For more information about Exabeam’s commitment to remediating vulnerabilities for Site Collector, see the Vulnerability Remediation PolicyVulnerability Remediation Policy

Known CVE - CVE-2025-48734. This is a NiFi CVE. Site Collector uses the latest NiFi version 2.4.0 and will update to the new version after NiFi provides a fix in an upcoming NiFi release.

Toolkit has been deprecated and is no longer in use hence no security vulnerabilities update is available for that.

The following table lists the CVEs remediated for the Nifi container and their severity.

CVEs for NiFi

Critical

High

Medium

Low

Total: 0

Total: 0

Total: 11

Total: 1

  • CVE-2025-50181

  • CVE-2025-6020

  • CVE-2024-12718

  • CVE-2025-4138

  • CVE-2025-4330

  • CVE-2025-4435

  • CVE-2025-4516

  • CVE-2025-4517

  • CVE-2025-1795

  • CVE-2025-50182

  • CVE-2025-4598

CVE-2024-47081