Release Notes
Version 5.0.1 (November 2024)
-
Added option to receive the separate cyences digest alert for the common recipients of SOC and Compliance team members. To configure, navigate to Cyences Settings > Cyences App Configuration > Cyences Alerts Configuration section.
-
Enhancements
-
Reduced the scheduled time for the successful login from unusual country alerts.
-
Added macro cs_filter_customer_own_public_ips to filter out the customer own public IPs from the alert.
-
Upgrade Guide from 5.0.0 to 5.0.1
- Configure the SOC and Compliance teams related configs under Cyences Settings > Cyences App Configuration > Cyences Alerts Configuration section. Ignore if it is already configured.
Version 5.0.0 (October 2024)
-
Alert Categorization
- Categorized the alerts into SOC and Compliance teams.
- Added Team filter on Overview dashboard.
- Added team configuration for SOC and Compliance teams under Cyences Settings > Cyences App Configuration > Cyences Alerts Configuration section.
- Updated the alerting logic (for regular and digest alerts) based on the teams.
-
BlockShield Integration
- Removed everything related to honeyDB, blocked IPs.
- Added BlockShield API Configuration section under Cyences Settings > Cyences App Configuration > Cyences Alerts Configuration to configure the blockshield credentials.
- Added IP info panel on Intelligence dashboard to show the IP related information.
-
F5 BIGIP
- Added new dashboard named F5 BIGIP ASM.
- Added new alert named F5 BIGIP - Not Blocked Attacks.
- Added new alerts for the Sophos Firewall:
- Sophos Firewall - Lost Connection to Sophos Central
- Sophos Firewall - VPN Tunnel Down
- Sophos Firewall - Gateway Down
- Sophos Firewall - Advanced Threat Detected
- Added new alerts for MSSQL Database and Oracle Database:
- MSSQL - Database Changes
- MSSQL - Role Changes
- Oracle - Database Changes
- Oracle - Role Changes
- Added new alerts for the Defender ATP:
- Defender ATP - System is Offboarded
- Defender ATP - System is not Connected since a Week
- Added new alert for the Office 365:
- O365 - Risky Login Detected by Microsoft
- Added new alert for the Authentication:
- Authentication - Successful Login for Multiple Users from Same IP
-
Added “Object Type” and “Object Name” filter on MSSQL and Oracle dashboards.
- Removed the following deprecated alerts:
- O365 - Login Failure Outside Home Country Due To Multi Factor Authentication
- O365 - Successful Login Outside Home Country
- Authentication - Successful VPN Login Outside Home Country
- Linux - Change in Sudo Access of Local Linux Account
-
Removed Google Workspace - Suspicious File Shared by External User on Google Drive alert and related panel from Google Workspace dashboard as it contains static lookup causing many false positives.
-
Removed the Splunk Add-on for RWI - Executive Dashboard app dependency.
-
Alert Renaming
- Multiple Alerts have renamed as below, if you have any custom setting like sending email and stuff, that needs to be re-configured.
Old Alert Name | New Alert Name |
---|---|
CrowdStrike - Suspicious Activity or Malware Detected by CrowdStrike | CrowdStrike - Suspicious Activity or Malware Detected |
Defender ATP - Defender ATP Alerts | Defender ATP - Alerts |
Sophos Endpoint Protection - Endpoint Not Protected by Sophos Endpoint Protection | Sophos - Endpoint Not Protected |
Sophos Endpoint Protection - Sophos Endpoint RealTime Protection Disabled | Sophos - Endpoint RealTime Protection Disabled |
Sophos Endpoint Protection - Sophos Endpoint Protection Service is not Running | Sophos - Endpoint Protection Service is Not Running |
Sophos Endpoint Protection - Failed to CleanUp Threat by Sophos Endpoint Protection | Sophos - Failed to CleanUp Threat |
Sophos Endpoint Protection - Failed to CleanUp Potentially Unwanted Application by Sophos | Sophos - Failed to CleanUp Potentially Unwanted Application |
Windows Defender - Endpoint Not Protected by Windows Defender | Windows Defender - Endpoint Not Protected |
Windows Defender - Windows Defender RealTime Protection Disabled or Failed | Windows Defender - RealTime Protection Disabled or Failed |
AWS - IAM AccessKey Creation or Deletion | AWS - IAM Access Key Changes |
AWS - IAM Login Profile Change/Update | AWS - IAM Login Profile Changes |
AWS - IAM User Creation or Deletion | AWS - IAM User Changes |
AWS - IAM Policy Creation or Deletion | AWS - IAM Policy Changes |
AWS - IAM Group Change/Update | AWS - IAM Group Changes |
AWS - IAM Group Membership Change/Update | AWS - IAM Group Membership Changes |
AWS - IAM Role Creation or Deletion | AWS - IAM Role Changes |
AWS - Network Access Control List Creation or Deletion | AWS - Network Access Control List Changes |
AWS - Multi Factor Authentication is Disabled for IAM User | AWS - MFA is Disabled for IAM User |
AWS - Login Failure From Unusual Country Due To Multi Factor Authentication | AWS - Login Failure From Unusual Country Due To MFA |
Google Workspace - User Change/Update | Google Workspace - User Changes |
Google Workspace - Enterprise Group Change/Update | Google Workspace - Group Changes |
Google Workspace - Enterprise Group Membership Change/Update | Google Workspace - Group Membership Changes |
Google Workspace - Role Change/Update | Google Workspace - Role Changes |
Google Workspace - Multiple Password Changes in Short Time Period | Google Workspace - Multiple Password Changes in a Short Period of Time |
O365 - DLP event in Exchange | O365 - DLP Event in Exchange |
O365 - DLP event in SharePoint | O365 - DLP Event in SharePoint |
O365 - O365 Service is not Operational | O365 - O365 Service is Not Operational |
O365 - Azure Active Directory - AuthorizationPolicy Change/Update | Azure AD - AuthorizationPolicy Changes |
O365 - Azure Active Directory - Policy Change/Update | Azure AD - Policy Changes |
O365 - Azure Active Directory - Role Change/Update | Azure AD - Role Changes |
O365 - Azure Active Directory - Group Change/Update | Azure AD - Group Changes |
O365 - Azure Active Directory - GroupMembership Change/Update | Azure AD - GroupMembership Changes |
O365 - Azure Active Directory - User Change/Update | Azure AD - User Changes |
O365 - Azure Active Directory - ServicePrincipal Change/Update | Azure AD - ServicePrincipal Changes |
O365 - Azure Active Directory - Application Change/Update | Azure AD - Application Changes |
O365 - Login Failure Due To Multi Factor Authentication | O365 - Login Failure Due To MFA |
O365 - Login Failure From Unusual Country Due To Multi Factor Authentication | O365 - Login Failure From Unusual Country Due To MFA |
Email - Calculate UpperBound for Spike In Emails | Calculate UpperBound for Spike In Emails |
Email - Hourly Increase In Emails Over Baseline | Hourly Increase In Emails Over Baseline |
Email - Daily Spam Email | Daily Spam Emails |
Network Compromise - Calculate UpperBound for Spike in Network Traffic | Calculate UpperBound for Spike in Network Traffic |
Network Compromise - Calculate UpperBound for Spike in Outbound Network Traffic | Calculate UpperBound for Spike in Outbound Network Traffic |
Network Compromise - DDoS Behavior Detected | DDoS Behavior Detected on the Network |
Network Compromise - Unusual Outbound Traffic | Unusual Outbound Traffic |
Network Compromise - Basic Scanning | Basic Network Scanning |
Network Compromise - Inbound Vulnerable Traffic | Inbound Vulnerable Traffic |
Fortigate Firewall - Network Compromise - Fortigate DNS Sinkhole | Fortigate - DNS Sinkhole |
Fortigate Firewall - Network Compromise - Fortigate High Threats Alert | Fortigate - High Threats Alert |
Fortigate Firewall - Network Compromise - Fortigate High System Alert | Fortigate - High System Alert |
Palo Alto Firewall - Network Compromise - Palo Alto DNS Sinkhole | Palo Alto - DNS Sinkhole |
Palo Alto Firewall - Network Compromise - Palo Alto High Threats Alert | Palo Alto - High Threats Alert |
Palo Alto Firewall - Network Compromise - Palo Alto High System Alert | Palo Alto - High System Alert |
Palo Alto Firewall - Network Compromise - Palo Alto WildFire Alert | Palo Alto - WildFire Alert |
Palo Alto Firewall - Network Compromise - DDoS Attack Prevented | Palo Alto - DDoS Attack Prevented |
Palo Alto Firewall - Network Compromise - Inbound Traffic from Blocked IPs | Palo Alto Firewall - Network Compromise - Inbound Traffic from Blocked IPs |
Palo Alto Firewall - Network Compromise - Outbound Traffic to Blocked IPs | Palo Alto Firewall - Network Compromise - Outbound Traffic to Blocked IPs |
Palo Alto Firewall - Commits | Palo Alto - Commits |
Dynamically Update Blocked IPs with HoneyDB | Dynamically Update Blocked IPs with HoneyDB |
Palo Alto Firewall - Malicious IP List Gen | Palo Alto Firewall - Malicious IP List Gen |
Sophos Firewall - Firewall Lost Connection to Sophos Central | Sophos Firewall - Lost Connection to Sophos Central |
Sophos Firewall - Firewall VPN Tunnel Down | Sophos Firewall - VPN Tunnel Down |
Sophos Firewall - Firewall Gateway Down | Sophos Firewall - Gateway Down |
Vulnerability - Detected Vulnerabilities | Detected New Vulnerabilities |
Windows - Hosts Missing Update | Windows - Host is Missing Windows Updates |
Windows - Endpoint Compromise - Windows Firewall Disabled Event | Windows - Firewall Disabled Event |
Windows - Windows Process Tampering Detected | Windows - Process Tampering Detected |
Windows - Windows Firewall is Disabled | Windows - Firewall is Disabled |
AD - Group Changed | AD - Group Changes |
AD - Group Membership Changed | AD - Group Membership Changes |
AD - Group Policy Changed | AD - Group Policy Changes |
AD - User Changed | AD - User Changes |
AD - Password Change Outside Working Hour | AD - Password Change Outside Working Hours |
AD - Multiple Password Changes in Short Time Period | AD - Multiple Password Changes in a Short Period of Time |
Ransomware - Endpoint Compromise - Fake Windows Processes | Windows - Fake Windows Process |
Ransomware - Endpoint Compromise - Network Compromise - TOR Traffic | TOR Traffic detected by Firewall |
Ransomware - Scheduled tasks used in BadRabbit ransomware | Ransomware - Scheduled Tasks Used in BadRabbit Ransomware |
Ransomware - Endpoint Compromise - USN Journal Deletion on Windows | USN Journal Deletion on Windows |
Ransomware - Windows - Windows Event Log Cleared | Windows Event Log Cleared |
Ransomware - Endpoint Compromise - Windows - WMI Lateral Movement | Windows WMI Lateral Movement |
Credential Compromise - Windows - Credential Dumping through LSASS Access | Windows - Credential Dumping through LSASS Access |
Credential Compromise - Windows - Credential Dumping via Symlink to Shadow Copy | Windows - Credential Dumping via Symlink to Shadow Copy |
Credential Compromise - Windows - Credential Dumping via Copy Command from Shadow Copy | Windows - Credential Dumping via Copy Command from Shadow Copy |
Credential Compromise - Windows - Credential Dump From Registry via Reg exe | Windows - Credential Dump From Registry via Reg exe |
Authentication - VPN Login Attemps Outside Working Hours | Authentication - VPN Login Attempts Outside Working Hours |
Linux - User Added/Updated/Deleted | Linux - User Changes |
Linux - Group Added/Updated/Deleted | Linux - Group Changes |
-
Enhancements
-
Cyences App Configuration UI changes
- Added Cyences Dependencies section to show the dependent app installation status, enable/disable status along with splunk base link.
- Added App Dependecies table for each product present under Products Setup section.
-
Added option to exclude informational vulnerability by default from the Vulnerability dashboard.
-
Enhanced the Vulnerability - Detected Vulnerabilities alert to detect new vulnerabilities in case of delayed ingestion of events.
-
Updated the Network Compromise - Unusual Outbound Traffic alert logic of traffic calculation for each source instead of entire network.
-
Removed failed authentication user related events and unnecessary sourcetypes from the User Inventory - Lookup Gen search.
-
Enhanced the “Data Availability” panel present on each dashboard by generalizing the panel search.
-
Moved the splunk python sdk to the lib folder for better folder structure.
-
Added All Windows Update Events panel to the Window Patch dashboard.
- Updated the severity for the Windows - Certificate is Expiring Soon alert.
-
-
Bug Fixes
-
Fixed the display issue of failure action for the Radius Authentication logs.
-
For Forensics and SOC dashboards, fixed the field display issue which has dot(.) in the field name.
-
Fixed the informational severity typo for the nessus:pro:vuln sourcetype.
-
Fixed the typo in the macro name from cs_authentication_vpn_login_attemps_outside_working_hour_filter to cs_authentication_vpn_login_attempts_outside_working_hour_filter
-
Upgrade Guide from 4.9.0 to 5.0.0
-
After upgrade, only SOC related alerts will be received to existing configured critical emails. To make more changes, configure the SOC and Compliance teams related configs under Cyences Settings > Cyences App Configuration > Cyences Alerts Configuration section.
-
In order to use the sophos firewall alerts, onboard the sophos_events data from Sophos Central Addon for Splunk. For more details, refer Sophos Firewall Data Onboarding
-
Multiple rename has been reconfigured, please find the full list in the above release-notes section.
- Run the below search to find-out any custom email configuration has been setup in your environment to be reconfigured in the new alert.
| rest /servicesNS/-/cyences_app_for_splunk/saved/searches count=0 splunk_server=local | search title IN ("CrowdStrike - Suspicious Activity or Malware Detected by CrowdStrike", "Defender ATP - Defender ATP Alerts", "Sophos Endpoint Protection - Endpoint Not Protected by Sophos Endpoint Protection", "Sophos Endpoint Protection - Sophos Endpoint RealTime Protection Disabled", "Sophos Endpoint Protection - Sophos Endpoint Protection Service is not Running", "Sophos Endpoint Protection - Failed to CleanUp Threat by Sophos Endpoint Protection", "Sophos Endpoint Protection - Failed to CleanUp Potentially Unwanted Application by Sophos", "Windows Defender - Endpoint Not Protected by Windows Defender", "Windows Defender - Windows Defender RealTime Protection Disabled or Failed", "AWS - IAM AccessKey Creation or Deletion", "AWS - IAM Login Profile Change/Update", "AWS - IAM User Creation or Deletion", "AWS - IAM Policy Creation or Deletion", "AWS - IAM Group Change/Update", "AWS - IAM Group Membership Change/Update", "AWS - IAM Role Creation or Deletion", "AWS - Network Access Control List Creation or Deletion", "AWS - Multi Factor Authentication is Disabled for IAM User", "AWS - Login Failure From Unusual Country Due To Multi Factor Authentication", "Google Workspace - User Change/Update", "Google Workspace - Enterprise Group Change/Update", "Google Workspace - Enterprise Group Membership Change/Update", "Google Workspace - Role Change/Update", "Google Workspace - Multiple Password Changes in Short Time Period", "O365 - Login Failure Due To Multi Factor Authentication", "O365 - Login Failure From Unusual Country Due To Multi Factor Authentication", "O365 - DLP event in Exchange", "O365 - DLP event in SharePoint", "O365 - O365 Service is not Operational", "O365 - Azure Active Directory - AuthorizationPolicy Change/Update", "O365 - Azure Active Directory - Policy Change/Update", "O365 - Azure Active Directory - Role Change/Update", "O365 - Azure Active Directory - Group Change/Update", "O365 - Azure Active Directory - GroupMembership Change/Update", "O365 - Azure Active Directory - User Change/Update", "O365 - Azure Active Directory - ServicePrincipal Change/Update", "O365 - Azure Active Directory - Application Change/Update", "Email - Calculate UpperBound for Spike In Emails", "Email - Hourly Increase In Emails Over Baseline", "Email - Daily Spam Email", "Network Compromise - Calculate UpperBound for Spike in Network Traffic", "Network Compromise - Calculate UpperBound for Spike in Outbound Network Traffic", "Network Compromise - DDoS Behavior Detected", "Network Compromise - Unusual Outbound Traffic", "Network Compromise - Basic Scanning", "Network Compromise - Inbound Vulnerable Traffic", "Fortigate Firewall - Network Compromise - Fortigate DNS Sinkhole", "Fortigate Firewall - Network Compromise - Fortigate High Threats Alert", "Fortigate Firewall - Network Compromise - Fortigate High System Alert", "Palo Alto Firewall - Network Compromise - Palo Alto DNS Sinkhole", "Palo Alto Firewall - Network Compromise - Palo Alto High Threats Alert", "Palo Alto Firewall - Network Compromise - Palo Alto High System Alert", "Palo Alto Firewall - Network Compromise - Palo Alto WildFire Alert", "Palo Alto Firewall - Network Compromise - DDoS Attack Prevented", "Palo Alto Firewall - Network Compromise - Inbound Traffic from Blocked IPs", "Palo Alto Firewall - Network Compromise - Outbound Traffic to Blocked IPs", "Palo Alto Firewall - Commits", "Dynamically Update Blocked IPs with HoneyDB", "Palo Alto Firewall - Malicious IP List Gen", "Sophos Firewall - Firewall Lost Connection to Sophos Central", "Sophos Firewall - Firewall VPN Tunnel Down", "Sophos Firewall - Firewall Gateway Down", "Vulnerability - Detected Vulnerabilities", "Windows - Hosts Missing Update", "Windows - Endpoint Compromise - Windows Firewall Disabled Event", "Windows - Windows Process Tampering Detected", "Windows - Windows Firewall is Disabled", "AD - Group Changed", "AD - Group Membership Changed", "AD - Group Policy Changed", "AD - User Changed", "AD - Password Change Outside Working Hour", "AD - Multiple Password Changes in Short Time Period", "Ransomware - Endpoint Compromise - Fake Windows Processes", "Ransomware - Endpoint Compromise - Network Compromise - TOR Traffic", "Ransomware - Scheduled tasks used in BadRabbit ransomware", "Ransomware - Endpoint Compromise - USN Journal Deletion on Windows", "Ransomware - Windows - Windows Event Log Cleared", "Ransomware - Endpoint Compromise - Windows - WMI Lateral Movement", "Credential Compromise - Windows - Credential Dumping through LSASS Access", "Credential Compromise - Windows - Credential Dumping via Symlink to Shadow Copy", "Credential Compromise - Windows - Credential Dumping via Copy Command from Shadow Copy", "Credential Compromise - Windows - Credential Dump From Registry via Reg exe", "Authentication - VPN Login Attemps Outside Working Hours", "Linux - User Added/Updated/Deleted", "Linux - Group Added/Updated/Deleted") | fields title, "action.email*" | where 'action.email'!=0
- Run the below search to find-out any custom email configuration has been setup in your environment to be reconfigured in the new alert.
NOTE: Please go through every section of the Cyences Settings > Cyences App Configuration page to ensure it is configured according to how the user wants the app to behave.