Skip to main content

Threat CenterThreat Center Release Notes

Table of Contents

Threat Center Features Introduced in 2024

November 2024

This release does not include new features for Threat Center.

October 2024

The following features were introduced in Threat Center in October 2024:

Feature

Description

View All Rules in Rules Triggered Overview

You can now better identify all rules associated with a case or alert. In the Overview tab, under Rules Triggered > View all rules, you can now view all unique rules from which associated detections are created and the number of times a rule created associated detections.

threatcenter-october2024releasenotes-viewallrules.png

Copilot Threat Summary Streaming Text

To better show the AI at work, a new summary for the Copilot Threat Summary now appears progressively as it's generated.

September 2024

This release does not include new features for Threat Center.

August 2024

This release does not include new features for Threat Center.

July 2024

This release does not include new features for Threat Center.

June 2024

The following features were introduced in Threat Center in June 2024:

Feature

Description

Correlation Rule Details

To expedite your triage and investigation for correlation rules detections, you can now view correlation rule details directly in Threat Center under Rule Definition.

May 2024

The following features were introduced in Threat Center in May 2024:

Feature

Description

Case and Alert Overview

To understand the nature of a case or alert, you can now get an overview of core case or alert information in the Overview tab. Core information displayed include the Copilot Threat Summary, case or alert risk score, description, the attribute by which associated detections are grouped, and more. When you open a case or alert, the first thing you see is the Overview tab. The Threat Timeline is now in a separate Threat Timeline tab.

threatcenter-case-overview.png

New Attribute Updating Experience

With the new attribute updating experience, you can now:

  • Quickly update all case attributes in one location. In a case, you can now update the case stage, queue, and assignee alongside other attributes, all at once.

    threatcenter-march2024releasenotes-editcasesummary.png
  • Update case or alert attributes from anywhere in the case or alert using the Edit Case Details or Edit Alert Details buttons.

    threatcenter-case-editcasedetails.png
    threatcenter-alert-editalertdetails.png

New Case Notes Experience

With the new case notes experience, you can now:

  • Easily add, edit, and delete case notes with a simplified chat-like experience.

    threatcenter-may2024releasenotes-casenotes.png
  • Add notes from anywhere in the case using the View Notes button.

    threatcenter-case-viewnotes.png
  • View the latest notes in the Overview tab, under Latest Notes.

    threatcenter-may2024releasenotes-latestnotes.png

Search Timeline View Navigation

To deepen your triage or investigation, you can now navigate directly to the Search timeline from a case or alert to view all events associated with grouped detections using the Open Investigation Timeline button. Search opens in the timeline view and queries for events with the attribute by which the case or alert detections are grouped.

threatcenter-case-openinvestigationtimeline.png

Case Closed Reason in Threat Center Global Notifications

To ensure notification recipients understand why a case was closed, the case closed reason is now included in the Case has been closed. global notification.

Case Closed Reason in Individual Alert and Case Information Sharing

To ensure recipients understand why a case was closed, the case closed reason is now included in the emails and webhook messages you send when you share individual case or alert information.

Search Bar Redesign

The improved search bar experience now extends to Threat Center.

To more easily search for cases and alerts, you can now select from Basic, Advanced, and Natural Language search modes from a Search mode menu. The search bar displays each search mode differently. The search button and time range menu are now inside the search bar.

threatcenter-may2024releasenotes-searchbarredesign.png

You can now also easily read search queries in Advanced search mode:

  • You can use white space characters, like spaces, tabs, and line breaks, between query syntax terms.

  • For queries with multiple lines, each line is numbered.

  • Warnings and syntax validation errors are displayed per line.

  • Syntax elements are color coded so you can easily recognize them.

April 2024

The following features were introduced in Threat Center in April 2024:

Feature

Description

Custom Queues

You now have more flexibility in defining queues. With custom queues:

  • Queues are decoupled from Exabeam Security Operations Platform user roles. You can now create queues that reflect any configuration of users.

  • You can use three new pre-built queues: Tier 1, Tier 2, and Tier 3.

  • Your existing queues based on user roles have been converted into new queues.

threatcenter-april2024releasenotes-customqueues.png

Custom Case Stages

You can now better convey where you are in your case response with custom stages that reflect your organization's response workflow. For example, if your workflow requires you to isolate affected entities, you can create a custom stage called Containment.

threatcenter-april2024releasenotes-customstages.png

Copilot Natural Language Search

Copilot Natural Language Search now extends to Threat Center. To quickly create complex searches without knowing Exabeam Query Language, you can now enter a search prompt in natural language. After you enter your natural language search prompt, Threat Center uses AI to convert it into Exabeam Query Language syntax.

threatcenter-april2024releasenotes-naturallanguagesearch.png

Copilot Threat Summary Enhancements

You can now view a more accurate overview of a case or alert with optimizations to the query sent to the language learning model.

March 2024

The following features were introduced in Threat Center in March 2024:

Feature

Description

Copilot Analyst Assistant

You can now quickly learn and get answers to questions about a case or alert using a security-trained AI assistant. Prompt Copilot Analyst Assistant with a message or query, and it interprets case or alert information to generate a natural language response.

The Copilot Analyst Assistant with the default prompt, "Explain this threat in the greatest detail possible," entered.

Copilot Threat Summary

To help you quickly make sense of a case or alert without reviewing all the details, you can now get an overview of a threat described in a case or alert with an AI-generated summary. In the Threat Timeline tab, Copilot Threat Summary uses case or alert information to summarize the case or alert and recommend next steps for addressing the case or alert.

The Copilot Threat Summary with the following case summary: Overview: On Mar 21, 2024 at 3:27 PM, a rule was triggered because more than 5 events were observed in 10 minutes. Possible Threats: This could indicate a denial-of-service attack, a port scan, or another type of malicious activity. Next Steps: The analyst should investigate the events that triggered the rule to determine if they are malicious. If they are, the analyst should take steps to mitigate the threat.

Data Retention Changes

You can now access 365 days of data, including case and alert attributes, detections and related events, case notes, attachments, and case and alert history, by default.

Case Closed Reason

You can now ensure everyone working on a case understands why a case was closed. When you change the case stage to Closed, you must document why you're closing the case.

A window for entering a reason to close 10 cases.

Case and Alert Deletion

To clear out obsolete cases and alerts, you can now delete cases and alerts.

A list of selected cases with the delete option highlighted with a red rectangle.

Bulk Case Close

You can now quickly close multiple cases at once.

A list of selected cases with the close option highlighted with a red rectangle.

Case and Alert History Enhancements

You can now track relevant detection grouping and Automation Management activity in the case or alert history. You can now see when a detection grouping rule adds a detection to a case or alert and when an Automation Management playbook executes an action that affects a case or alert.

The history of a case showing a detection grouping rule adding detections to the case and modifying the risk score and an Automation Management playbook creating the case.

Detection Grouping Rule History

You can now track changes made to a detection grouping rule. In the detection grouping rule history, see what changes were made, who made the change, and when the change was made.

The history of a detection grouping rule showing Barbara Salazar modifying a detection grouping rule.

Advanced Analytics Detections

If you have an Exabeam Fusion license, you can now investigate triggered Advanced Analytics rules in Threat Center as detections.

February 2024

The following features were introduced in Threat Center in February 2024:

Feature

Description

Threat Center Renaming

Alert and Case Management is now renamed Threat Center.

Detection Grouping Rules

You can now ensure alerts and cases contain all relevant evidence with detection grouping rules. By default, detections are grouped according to six pre-built detection grouping rules. You can also create your own detection grouping rules.

Threat Center Notifications

You can now automatically get notified about important alert and case changes. You can send notifications to Microsoft Teams or Slack using global notifications settings or to email addresses or webhooks using an Automation Management playbook.

Individual Alert and Case Information Sharing

You can now share alert or case information with third-party systems or people who can't access Threat Center. You can send alert or case information directly from that alert or case to an email address or webhook.

The action menu expanded with the Send to webhook and Send email options highlighted with a red rectangle.

Detection Summary Titles

You can now quickly understand the threat a detection represents using the detection title. The detection title now summarizes and describes the risky activity it represents in a single sentence.

A detection with title "barbara.salazar failed activity user.mfa.okta_verify.deny_push in application OKTA from 15.56.75.34"

Condensed User and Endpoint Summaries

You can now better understand which users and endpoints are associated with a case or alert. In a case or alert summary, related host names and IP addresses are now displayed as one endpoint, and related user names and email addresses are now displayed as one user.

A summary of users and endpoints for a given alert.

January 2024

This release does not include new features for Alert and Case Management.