What’s new in 8.19

edit
IMPORTANT: This documentation is no longer updated. Refer to Elastic's version policy and the latest documentation.

What’s new in 8.19

edit

Here are the highlights of what’s new and improved in Elastic Security. For detailed information about this release, check out our release notes.

Other versions: 8.18 | 8.17 | 8.16 | 8.15 | 8.14 | 8.13 | 8.12 | 8.11 | 8.10 | 8.9 | 8.8 | 8.7 | 8.6 | 8.5 | 8.4 | 8.3 | 8.2 | 8.1 | 8.0 | 7.17 | 7.16 | 7.15 | 7.14 | 7.13 | 7.12 | 7.11 | 7.10 | 7.9

Generative AI enhancements

edit

Use Elastic Managed LLM in Security AI Assistant

edit

Elastic Managed LLM is now the default large language model connector in AI Assistant. It gives you immediate access to generative AI features without any setup or external model integration.

AI Assistant chat window with Elastic Managed LLM selected

Use prompt tiles in Security AI Assistant

edit

The Security AI Assistant's chat UI now uses prompt tiles instead of default quick prompts. Prompt tiles help you begin structured tasks or investigations into common Elastic Security workflows.

AI Assistant chat window with prompt tiles

Schedule recurring attack discoveries

edit

You can now define recurring schedules to automatically generate attack discoveries without needing manual runs. When discoveries are found, you’ll receive notifications through your configured connectors, such as Slack or email. You can customize the notification content to tailor alert context to your needs.

Create new schedule flyout

View and manage saved attack discoveries

edit

Attack discoveries are now automatically saved whenever they’re generated. You can update their status, share manually generated discoveries with other Kibana users, and perform bulk actions, such as status changes or adding discoveries to cases. Use the search box and filters to quickly find relevant discoveries.

Saved attack discoveries

Automatic Migration is generally available

edit

Automatic Migration is moving from technical preview to general availability. Use this feature to quickly convert SIEM rules from the Splunk Processing Language (SPL) to the Elasticsearch Query Language (ES|QL).

Detection rules and alerts enhancements

edit

Revert a customized prebuilt rule to its original version

edit

After modifying a prebuilt rule, you can restore its original version. To do this, open the rule’s details page, click All actionsRevert to Elastic version, review the modified fields, then click Revert. The original rule version might be unavailable for comparison if you haven’t updated your rules in a while.

Option to revert customized prebuilt rule on rule details page

Modified fields on prebuilt rules are marked with a badge

edit

Modified fields on prebuilt rules are marked with the Modified badge on the rule’s details page. You can compare the original Elastic version and the modified version of the field by clicking on the badge.

Modified field badge on rule details page

Bulk-apply and remove alert suppression from rules

edit

From the Rules table, use the Bulk actions menu to quickly apply or remove alert suppression from multiple rules. Note that threshold rules have a dedicated option for bulk-applying alert suppression.

Bulk alert suppression options on Rules page

Improvements to gap fills

edit

Several enhancements have been made to the gap fill feature:

  • The Gaps table is now generally available and provides you with an option to fill all gaps for a rule.
  • In the panel above the Rules table, the Total rules with gaps field now shows how many rules have unfilled gaps and how many are currently having their gaps filled. The Only rules with gaps: filter has also been renamed to Only rules with unfilled gaps: and now only shows rules that have unfilled gaps. Rules with gaps that are being filled are excluded from the filter results.
  • You can now bulk-fill gaps for multiple rules.
Rules table

Response actions enhancements

edit

Run a script on Microsoft Defender for Endpoint-enrolled hosts

edit

Using Elastic’s Microsoft Defender for Endpoint integration and connector, you can now run a script on Microsoft Defender for Endpoint-enrolled hosts.

Response console

Select saved scripts when using runscript third-party response actions

edit

When using the runscript response action with hosts enrolled in CrowdStrike and Microsoft Defender for Endpoint, you can now select from a list of saved custom scripts. This means you no longer need to type the script name manually.

Investigations enhancements

edit

Customize highlighted fields for alerts

edit

You can now add more fields to an alert’s highlighted fields to display information that’s relevant to your investigations.

Alert details flyout

Access the response console from events

edit

Now, you can access the response console from events, giving you more places to use response actions. You can now also isolate or release a host from events.

Event details flyout

Cloud Security enhancements

edit

New integrations

edit

Elastic Security now supports three new Cloud Security integrations: Rapid7 InsightVM, Tenable Vulnerability Management, and Qualys VMDR.