Overview
Support * sse-support@splunk.com
https://docs.splunk.com/Documentation/SSE/3.8.0/ReleaseNotes/Enhancements
We have changed the security content delivery endpoint for ESCU to comply with Splunk guidance. This means that if you have SSE version 3.7.1 or lower, the last supported ESCU version is ESCU 4.22.0. In order to get the latest ESCU version, you will need to upgrade SSE to version 3.8.0.
This release of Splunk Security Essentials included adding the latest Security Content and MITRE ATT&CK Enterprise JSON to Splunk Security Essentials and fixing the following issues:
- Custom Content modal is missing two options for Bookmark status.
- When adding a custom data source, option 1 and 2 in the modal do not work.
- After configuring Data Inventory and later revisiting, it looks like it is incomplete with some searches still outstanding.
- Local searches are missing from the list when adding Custom Content.
- Risk searches are not automatically mapped to local saved searches.
- Local Search mappings edit link directs to the Edit Alert interface rather than Edit Correlation Search.
- Add/Edit Custom Content modal is missing the bottom half.
- False positives in the Detect Credit Card Numbers SPL.
In this release of Splunk Security Essentials, JQuery was migrated to version 3.5.1. This release also included fixes for the following issues:
-Label tooltips not working on Analytics Advisor
-MITRE Platform not updating to the latest values in the Analytics Advisor dropdown
-Automatic Posture Dashboards not being created
-Custom Content generates an error on the Data Inventory page
-Removed deprecated dashboards from Splunk Security Essentials
-Added latest Security Content and ATT&CK Enterprise JSON to the build.
-Added analytic_story as a field on the ES Incident Review page.
Bug Fixes
-Changing bookmark status deletes existing bookmark notes
-MITRE Overview page tabs do not work
-Dropdowns on Security Content page can only be expanded once
-When using the multi-technique search on the Security Content page, the Technique dropdown isn't pre-selected with the entered Technique IDs
-On the Security Content drill down page, the "Line-by-Line SPL Documentation" action is broken
-Changing bookmark status on Showcase page not reflected in GUI
Bug Fixes
- Fixed a bug in Data Introspection if there wasn’t any data available
- Modified export reports to include new fields
- Fixed a permissions issue for the Mission Control dashboard
- Error with MITRE matrix where attack groups would not render an icon on the table
- Fix logic error in local search mapping
- Numerous other small fixes
Bug Fixes
- ATT&CK Sub-Techniques nesting appeared in the wrong order on the ATT&CK Matrix panel.
- Fixed bug with cim_vladiator in the Suggested Apps.
• Mitre ATT&CK Updates - Added support for MITRE ATT&CK Sub-Techniques
• Better Industry Framework Support - Included support for CIS and NIST
• Automatic updates for Security Research Content - Security Content from the Splunk Research team (i.e. ESCU) is now automatically downloaded into SSE using the Splunk Security Content API
•Support for ES 6.3+ Annotations Framework - Enabling detections through SSE will now populate the Annotations Framework with MITRE ATT&CK, Killchain, NIST, CIS and some SSE fields.
• Major UI Improvements for Content Mapping - It's now easier than ever to maintain all your Content in SSE and have it mapped with what is actually enabled in your environment. You can now also map multiple saved searches to a single piece of content in SSE and still have enrichment for Notables and Risk Objects.
• Bug Fixes - As with every release we have squashed numerous bugs.
This release comes with some great new capabilities and a ton of new content:
• MITRE ATT&CK Sub-Techniques in the Analytics Advisor as well as a new and improved look.
• All Security Research Content is now available and we’ve included the actual search string in the SSE UI in the detection showcase page.
• NIST/CIS filtering for the detections.
• More datasources are detected by the Data Inventory (Windows DNS, Windows DHCP, Azure AD Sign-in)
• New Timeline visualization on the “Analyze ES Risk Attributions” dashboard. This will show notables and risk modifiers on a timeline with links to ATT&CK Tactics and Techniques. (Requires the Timeline Viz)
• 4 new native detections and 40+ detections from the Security Research team.
• Plenty of general improvements and bug fixes
Added Data Inventory support for many new data sources that are not linked to CIM data models yet
Azure, GCP, AWS logs
Kubernetes audit logs from Azure, GCP, AWS
Splunk Connect for Kubernetes
Sysmon DNS
Stability improvements for Data Introspection
Added a new filter in the content page for industry mapping
Updated content with the latest content from Splunk Research
Various bug fixes
Added updated content
Few small bug fixes
Fix for mitremap command content_available flag
Fix for loading partner content from external sources
Version 3.0.3 Release Notes:
Hopefully knocked out the last big data introspection bug, which impacted environments with lots of cardinality in the source field. Please see the troubleshooting link below if your system is in an unhappy state.
Also knocked out lots of other bugs!
If your data inventory wouldn't complete successfully with version 3.0.2 or earlier, upgrade to 3.0.3 and then reset your configuration by walking through the steps detailed here: https://docs.splunksecurityessentials.com/technical-details/troubleshooting/#data-inventory-introspection
3.0.2 Release Notes:
Critical Bug Fix for Older Splunk Releases (Linux/OSX 7.0 and earlier, Win maybe all 7.3 and earlier)
Fix for minor error that threw a warning on all releases
* Improved debugging capability
3.0.1 Release Notes
Python3 Compatibility in anticipation of future Splunk releases
Numerous bug fixes
* A Partner Framework
Release Notes:
SSE 3.0 is a huge release! Check https://docs.splunksecurityessentials.com/whatsnew for all the details, and check out https://www.splunksecurityessentials.com/ for the new website!
Here are some of the highlights:
New Home Page and major UX overhaul, with tours showing you how to configure everything in the app
Extensive documentation and detail of UBA and ESCU content
Content recommendation dashboards for MITRE ATT&CK and RBA
Azure and GCP content
Promoting Beta functionality, including the Analytics Advisor dashboards, and Data Inventory
MLTK-powered Data Availability Dashboard
CIM Compliance Check Dashboard
Enough bug fixes to qualify us as entomologists
* Docs site and Web Site! https://www.splunksecurityessentials.com
This release had a ton of contributors. Thank you to all of them! https://docs.splunksecurityessentials.com/release-notes/contributors/
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.