Overview
Support
* sse-support@splunk.com
This release of Splunk Security Essentials included adding the latest Security Content and MITRE ATT&CK Enterprise JSON to Splunk Security Essentials and fixing the following issues:
- Custom Content modal is missing two options for Bookmark status.
- When adding a custom data source, option 1 and 2 in the modal do not work.
- After configuring Data Inventory and later revisiting, it looks like it is incomplete with some searches still outstanding.
- Local searches are missing from the list when adding Custom Content.
- Risk searches are not automatically mapped to local saved searches.
- Local Search mappings edit link directs to the Edit Alert interface rather than Edit Correlation Search.
- Add/Edit Custom Content modal is missing the bottom half.
- False positives in the Detect Credit Card Numbers SPL.
In this release of Splunk Security Essentials, JQuery was migrated to version 3.5.1. This release also included fixes for the following issues:
-Label tooltips not working on Analytics Advisor
-MITRE Platform not updating to the latest values in the Analytics Advisor dropdown
-Automatic Posture Dashboards not being created
-Custom Content generates an error on the Data Inventory page
-Removed deprecated dashboards from Splunk Security Essentials
-Added latest Security Content and ATT&CK Enterprise JSON to the build.
-Added analytic_story as a field on the ES Incident Review page.
Bug Fixes
-Changing bookmark status deletes existing bookmark notes
-MITRE Overview page tabs do not work
-Dropdowns on Security Content page can only be expanded once
-When using the multi-technique search on the Security Content page, the Technique dropdown isn't pre-selected with the entered Technique IDs
-On the Security Content drill down page, the "Line-by-Line SPL Documentation" action is broken
-Changing bookmark status on Showcase page not reflected in GUI
Bug Fixes
- Fixed a bug in Data Introspection if there wasn’t any data available
- Modified export reports to include new fields
- Fixed a permissions issue for the Mission Control dashboard
- Error with MITRE matrix where attack groups would not render an icon on the table
- Fix logic error in local search mapping
- Numerous other small fixes
Bug Fixes
- ATT&CK Sub-Techniques nesting appeared in the wrong order on the ATT&CK Matrix panel.
- Fixed bug with cim_vladiator in the Suggested Apps.
• Mitre ATT&CK Updates - Added support for MITRE ATT&CK Sub-Techniques
• Better Industry Framework Support - Included support for CIS and NIST
• Automatic updates for Security Research Content - Security Content from the Splunk Research team (i.e. ESCU) is now automatically downloaded into SSE using the Splunk Security Content API
•Support for ES 6.3+ Annotations Framework - Enabling detections through SSE will now populate the Annotations Framework with MITRE ATT&CK, Killchain, NIST, CIS and some SSE fields.
• Major UI Improvements for Content Mapping - It's now easier than ever to maintain all your Content in SSE and have it mapped with what is actually enabled in your environment. You can now also map multiple saved searches to a single piece of content in SSE and still have enrichment for Notables and Risk Objects.
• Bug Fixes - As with every release we have squashed numerous bugs.
This release comes with some great new capabilities and a ton of new content:
• MITRE ATT&CK Sub-Techniques in the Analytics Advisor as well as a new and improved look.
• All Security Research Content is now available and we’ve included the actual search string in the SSE UI in the detection showcase page.
• NIST/CIS filtering for the detections.
• More datasources are detected by the Data Inventory (Windows DNS, Windows DHCP, Azure AD Sign-in)
• New Timeline visualization on the “Analyze ES Risk Attributions” dashboard. This will show notables and risk modifiers on a timeline with links to ATT&CK Tactics and Techniques. (Requires the Timeline Viz)
• 4 new native detections and 40+ detections from the Security Research team.
• Plenty of general improvements and bug fixes
Added Data Inventory support for many new data sources that are not linked to CIM data models yet
Azure, GCP, AWS logs
Kubernetes audit logs from Azure, GCP, AWS
Splunk Connect for Kubernetes
Sysmon DNS
Stability improvements for Data Introspection
Added a new filter in the content page for industry mapping
Updated content with the latest content from Splunk Research
Various bug fixes
Added updated content
Few small bug fixes
Fix for mitremap command content_available flag
Fix for loading partner content from external sources
Version 3.0.3 Release Notes:
Hopefully knocked out the last big data introspection bug, which impacted environments with lots of cardinality in the source field. Please see the troubleshooting link below if your system is in an unhappy state.
Also knocked out lots of other bugs!
If your data inventory wouldn't complete successfully with version 3.0.2 or earlier, upgrade to 3.0.3 and then reset your configuration by walking through the steps detailed here: https://docs.splunksecurityessentials.com/technical-details/troubleshooting/#data-inventory-introspection
3.0.2 Release Notes:
Critical Bug Fix for Older Splunk Releases (Linux/OSX 7.0 and earlier, Win maybe all 7.3 and earlier)
Fix for minor error that threw a warning on all releases
* Improved debugging capability
3.0.1 Release Notes
Python3 Compatibility in anticipation of future Splunk releases
Numerous bug fixes
* A Partner Framework
Release Notes:
SSE 3.0 is a huge release! Check https://docs.splunksecurityessentials.com/whatsnew for all the details, and check out https://www.splunksecurityessentials.com/ for the new website!
Here are some of the highlights:
New Home Page and major UX overhaul, with tours showing you how to configure everything in the app
Extensive documentation and detail of UBA and ESCU content
Content recommendation dashboards for MITRE ATT&CK and RBA
Azure and GCP content
Promoting Beta functionality, including the Analytics Advisor dashboards, and Data Inventory
MLTK-powered Data Availability Dashboard
CIM Compliance Check Dashboard
Enough bug fixes to qualify us as entomologists
* Docs site and Web Site! https://www.splunksecurityessentials.com
This release had a ton of contributors. Thank you to all of them! https://docs.splunksecurityessentials.com/release-notes/contributors/
Release Notes:
* 2.5.1 introduced a bug that slowed page load significantly. 2.5.2 undoes that, and also halves earlier page load times!
* Misc other small bug fixes
2.5.1 Release Notes:
- Two important bug fixes related to data introspection (issue with migration from 2.4, and a race condition if you clicked Start Introspection very quickly)
- Ten new sourcetypes auto-detected!
- Modal from the showcase pages for MITRE tactics / techniques / groups. Click on the MITRE buttons to get details and drill-downs.
- Fix for ESCU drilldown if ES was version 5.0 or 5.1
- Fix for auto-update navigation. (Previously would have missed “custom content” and maybe not worked for some edge cases)
Release Notes for 2.5.0:
- Updated Data Inventory Dashboard
- Correlation Search Introspection
- Data Availability Dashboard (MLTK!)
- Inclusion of Phantom Content
- Updates to the Analytics Advisor Content
- MITRE ATT&CK Integration into ES
- Automatic Update of MITRE ATT&CK
- Setup Menu
2.4.2 Release Notes:
Added MITRE Threat Groups as a custom filter on the main contents page! This is based on MITRE ATT&CK Techniques -> Groups, defined in MITRE Enterprise ATT&CK
Several bug fixes:
* One user reported that no content would load across the entire app due to kvstore query issues
* Three users reported that some javascript would not load due to inexplicably requesting files over http instead of https
* Also fixed the cosmetic on-restart warnings created by the sankey app
* Add a check for local default.xml and manually add beta content if present
* Other small fixes
* Added support for users who host Splunk on a custom root endpoint e.g. https://ssloffload/splunk/ (you whacky kids)
SSE 2.4 Release Notes:
Major New Feature (Beta): Data Inventory
Major New Feature (Beta): Analytics Advisor Dashboards
Major Enhancements: Bookmarking
MITRE ATT&CK Technique-level Mapping
Improved the Security Contents local Search Engine
Re-implementation of | sseanalytics search command
Security Data Journey now goes up and to the right!
Numerous bugs fixed
* 2.4.1: Accidental Google Translated Japanese files removed!
See full release notes: https://davidveuve.com/apps/splunk-security-essentials/release-notes/ or the "What's New in 2.4" in the app!
Major thank you to everyone who contributed to this release!
SSE 2.4 Release Notes:
Major New Feature (Beta): Data Inventory
Major New Feature (Beta): Analytics Advisor Dashboards
Major Enhancements: Bookmarking
MITRE ATT&CK Technique-level Mapping
Improved the Security Contents local Search Engine
Re-implementation of | sseanalytics search command
Security Data Journey now goes up and to the right!
Numerous bugs fixed
See full release notes: https://davidveuve.com/apps/splunk-security-essentials/release-notes/ or the "What's New in 2.4" in the app!
Major thank you to everyone who contributed to this release!
2.3.1 Release Notes
Numerous Windows TA 5 bug fixes (missed a specific format before, thank you to those on answers who pointed out the problem!)
Few Bug Fixes for the new 2.3 Dashboarding feature
* The main page no longer says "What's New in 2.2" with outdated info, it now says "What's New in 2.3" with updated info!
Version 2.3 Release:
Dashboard Panels! Not only will you find a collection of dashboard panels on several commonly used examples, but from the Data Source Check you can click the new "Create Posture Dashboards" button and it will guide you through creating a series of dashboards that provide visibility into your environment based on the data sources you already have. Great for those who want to periodically look at dashboards instead of getting alerts!
More complete mapping of Mitre and Kill Chain
* Several bug fixes
Version 2.2 Release Notes:
* 25 New Detections, many focused around Insider Threat, but including two for ES Risk, and that new Microsoft Scheduler Zero-Day reported on twitter!
* Improved Print-to-PDF Export from the Bookmarked Content page!
* Improved integrations with ES and ESCU, and content from UBA, for users who also have those products.
* Many bugs resolved and functionality improved!
Version 2.1.1 Release Notes:
- Splunk 7.1 Compatibility!
- New search bar (type in the name of something you're looking for, such as "lockout" to find everything related to Account Lockouts) courtesy of elasticlunr.js add-in.
- Bookmark "Print" view now dramatically cleaner and better
- Several UI tweaks
- Several bugs squashed
Version 2.1.0 Release Notes:
- New Bookmark Feature! Track content that you would like to implement, and even your implemenation status. Security Essentials is no replacement for a full project tracking system, but we'll help you remember what you care about, and help you get started with building it out!
- Four New Examples:
- Public S3 Buckets (CloudTrail)
- Connection to a new Domain
- Old Passwords in Use
- Unusual AWS Regions
- New Use Case Analytics dashboard (called simply: Overview)
- Expanded GDPR Content (description, screenshots, visualizations, oh my!)
- Many bug fixes and formatting improvements
Major overhaul for Splunk Security Essentials 2.0.
* All content mapped to meaningful use cases. No more looking at log sources, now focus based on Security Monitoring or Insider Threat!
* 10+ Data Onboarding Guides to walk you through getting data in, including the configuration of third party systems
* 40+ new examples, with live and usable searches covering AWS, GDPR, basic Security Monitoring, and Ransomware!
* Integrated mapping of entire Splunk Security ecosystem, including analytics in ES, ESCU, UBA, and Professional Services.
* All examples oriented to a Security Journey, to help you focus on what to do first, second, and after that.
* Complete overhaul of the UI to be more usable and intuitive.
Note: There are a ton of code changes in this release, and sometimes splunkweb gets funny with that. If you do notice any behavior that doesn't seem right, try telling Splunk to use the latest copy by going to /en-US/_bump.
Version 1.4.6 Release Notes:
Fixed a couple of major 7.0 bugs (sorry)
One outstanding issue with saving High Cardinality use cases
Splunk 7.0 Note: There are a couple of big bugs with the app in Splunk 7.0. 1.4.5 doesn't work in 7.0, but 1.4.6 will! It's awaiting review at the moment, and we will have it out shortly.
Version 1.4.5 Release Notes:
* Several small bug fixes, including the pre-requisite checks for the demo data on distributed environments (thank you to tkreiner on answers for the bug report!)
* A checkbox now requires that you acknowledge "I Understand" instead of "I Do Not Understand" before continuing, in one of the most unusual bug reports of my career.
Version 1.4.4 Release Notes:
* Several small bug fixes, including the pre-requisite checks for the demo data on distributed environments (thank you to tkreiner on answers for the bug report!)
* A checkbox now requires that you acknowledge "I Understand" instead of "I Do Not Understand" before continuing, in one of the most unusual bug reports of my career.
1.4.3 Release Notes:
* Now doesn't trigger virus scanners! (Turns out a lot of vbscript can confuse some scanners)
* Adjusted the user for SFDC data to Chris, instead of Chuck
* Few small bug fixes
1.4.2 Release Notes
* Fixed a bug with the Schedule Alert functionality in the Search Based Use Cases where the expected box didn't appear.
1.4.1 Release Notes:
* Added anonymized_box_logs.csv -- this is an orphaned dataset you can use to generate a custom Detect Spikes use case. Go explore, or come to SplunkLive DC this Thursday (03/23) to walk through it with me live.
* Fixed a few live searches, and many pre-req searches that were missing index=* -- thank you {I didn't ask permission to use your name} for reporting that bug on the recent downloader survey!
* Fixed the broken pre-reqs for the Emails with Lookalike Domains use case.
1.4.0 Release Notes
- New Data Source Check dashboard showcased! See what use cases you can run with the data you have today -- explore if there are use cases you can't run that you would like to!
- Added Docs + Support to the Nav Menu
- Wide array of small fixes and adjustments.
1.3.2 Release Notes:
- Added a debug capability to the new Data Source Check dashboard -- just add ?debug=true to the URL (e.g., /app/Splunk_Security_Essentials/data_source_check?debug=true) to get a text box that you can send me to help debug. (SSE Diags are on the roadmap)
- Added docs and support links to the nav -- support just pointing to Splunk Answers
- Small bug fixes to six pre-req searches (Thank you Andreas!)
1.3.1 New Features:
- Six new use cases for Salesforce.com Event Log Format data!
- New Data Check dashboard (currently in beta) that will look through all of your data and then run all of the data source pre-req checks. It's not currently on the dashboard, but if you're interested check out the details page to see more. https://splunkbase.splunk.com/app/3435/#/details
1.3.0 New Features:
- Added Filters that breakdown use cases not just by security domain, but also by data source, alert volume, and the app version when that use case was added.
1.3.1 Release Notes:
- Six new use cases for Salesforce.com Event Log Format data!
- New Application Accessing Salesforce.com API for User
- New High Risk Event Types for Salesforce.com User
- New Tables Queried by Salesforce.com Peer Group
- New Tables Queried by Salesforce.com User
- Spike in Downloaded Documents Per User from Salesforce.com
- Spike in Exported Records Per User from Salesforce.com
- New Data Check dashboard (currently in beta) that will look through all of your data and then run all of the data source pre-req checks. It's not currently on the dashboard, but if you're interested check out the details page to see more. https://splunkbase.splunk.com/app/3435/#/details
- Misc Bug Fixes
Happy #RSAC Everyone!
Version 1.3.0 Release Notes:
- Added Filters that breakdown use cases not just by security domain, but also by data source, alert volume, and the app version when that use case was added.
- Fixed a few small display bugs
- Fixed a bug where the app had an embarrassingly error leading to pre-req checks marked as present when they weren't
1.2.0 Release:
* Four new email use cases centered around phishing victims
* One new use case that detects if a particular sourcetype (e.g., security software) goes offline while the rest of the system is online.
* Major enhancement to the new lookup caching, in the form of the "Create Blank Lookup" button
* Several small bug fixes
1.1.1 Release Notes:
* Changed the Success/Error/Processing for the data checks to icons, so that people won't accidentally miss them!
* Fixed bug with the demo lookup cache, along with a few other small UI bugs.
1.1.0 Release Notes:
* Major New Feature: For First Seen Detections, you can cache historical results in a lookup, allowing searches to run dramatically faster in exchange for disk space. (30x performance improvement would be common)
* Several bugs fixed (thank you to andreasz for finding, and also proposing fixes to a few errors!)
1.0.3 Release Notes:
* Removed two features that weren't actually implemented. Thank you andreasz for the discovery!
1.0.2 Release Notes:
* New Logo
* Enhancement: you can now click Show SPL even if you don't have the data models (or data) present, to make it easy to copy-paste searches into production.
1.0.1 Release Notes:
* Fixed a bug that affected distributed deployments (no impact to the deployment, but prevented the app from working)
* New Logo
Initial Release
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.