Chronicle SIEM release notes

This page documents production updates to Chronicle. You can periodically check this page for announcements about new or updated features, bug fixes, known issues, and deprecated functionality.

You can see the latest product updates for all of Google Cloud on the Google Cloud page, browse and filter all release notes in the Google Cloud console, or programmatically access release notes in BigQuery.

To get the latest product updates delivered to you, add the URL of this page to your feed reader, or add the feed URL directly: https://cloud.google.com/feeds/chronicle-release-notes.xml

March 25, 2024

Chronicle Applied Threat Intelligence helps you identify and respond to threats. When enabled, it ingests IOCs curated by Mandiant Threat Intelligence with an IC-Score greater than 80 and generates an error when a match is found. The following are some of the features of Applied Threat Intelligence.

  • Event-level enrichment: All telemetry in Chronicle is enriched with Google Threat Intelligence which is a combination of Mandiant and Virus Total, including all threat intelligence associations like campaigns and actors.

  • Sophisticated indicator matching: Curated out-of-the-box detections that deliver sophisticated indicator matching using augmented prioritization logic, noise reduction based on customer environment context, and other correlation techniques to maximize signal to noise.

  • Active breach alerting: Uses Mandiant's incident response intelligence to alert on potential active breaches delivering on our no patient 1 vision.

  • Curated behavioral detections for emerging threats: To protect against newly emerging risks and tactics, techniques, and procedures (TTPs), Applied Threat Intelligence uses real-time insights.

  • DIY detection engineering and response automation: Access to Fusion intelligence (formerly known as Mandiant Fusion) for the following.

    • Customer authoring of rules
    • Customer development of response playbooks
  • Curated views for Investigation and triage Insights: Applied Threat Intelligence provides curated views that show valuable associations between an indicator and threat actor, threat campaign, or malware, statistics about a threat observed in customer environments. These views are invaluable for all security operations workflows.

For more information about Applied Threat Intelligence, see Applied Threat Intelligence overview.

March 22, 2024

Chronicle has added a new rule set to Cloud Threat Detections , called Serverless Threats, that detects activity associated with potential compromise or abuse of server-less resources in Google Cloud, such as Cloud Run and Cloud Functions.

Chronicle now supports direct ingestion and parsing of reCAPTCHA Enterprise logs from Google Cloud.

March 20, 2024

There is no longer a limit on the number of feeds you can create for the same log type in Feed Management.

March 15, 2024

Chronicle has expanded Cloud Threat Detections to create a detection when findings from Security Command Center Event Threat Detections, Cloud Armor, Sensitive Actions Service, and Custom modules for Event Threat Detection are identified. These detections are available through the following rule sets: CDIR SCC Cloud IDS, CDIR SCC Cloud Armor, CDIR SCC Impact, CDIR SCC Enhanced Persistence, CDIR SCC Enhanced Defense Evasion, and CDIR SCC Custom Module.

March 14, 2024

The following supported default parsers have changed. Each is listed by product name and log_type value, if applicable.

  • Akamai WAF (AKAMAI_WAF)
  • Alcatel Switch (ALCATEL_SWITCH)
  • Arcsight CEF (ARCSIGHT_CEF)
  • Auth0 (AUTH_ZERO)
  • AWS Cloudtrail (AWS_CLOUDTRAIL)
  • AWS Config (AWS_CONFIG)
  • AWS GuardDuty (GUARDDUTY)
  • Azure AD (AZURE_AD)
  • Azure AD Directory Audit (AZURE_AD_AUDIT)
  • Azure App Service (AZURE_APP_SERVICE)
  • Azure Key Vault logging (AZURE_KEYVAULT_AUDIT)
  • BIND (BIND_DNS)
  • Blue Coat Proxy (BLUECOAT_WEBPROXY)
  • Box (BOX)
  • Chrome Management (N/A)
  • Cisco AMP (CISCO_AMP)
  • Cisco Umbrella DNS (UMBRELLA_DNS)
  • Cisco VPN (CISCO_VPN)
  • Citrix Netscaler (CITRIX_NETSCALER)
  • Cloud Audit Logs (N/A)
  • Cloudflare (CLOUDFLARE)
  • Cofense (COFENSE_TRIAGE)
  • Corelight (CORELIGHT)
  • CrowdStrike Falcon (CS_EDR)
  • CSV Custom IOC (CSV_CUSTOM_IOC)
  • Custom Application Access Logs (CUSTOM_APPLICATION_ACCESS)
  • Cybergatekeeper NAC (CYBERGATEKEEPER_NAC)
  • Extreme Wireless (EXTREME_WIRELESS)
  • F5 ASM (F5_ASM)
  • F5 BIGIP LTM (F5_BIGIP_LTM)
  • Falco IDS (FALCO_IDS)
  • FireEye (FIREEYE_ALERT)
  • FireEye ETP (FIREEYE_ETP)
  • ForgeRock Identity Cloud (FORGEROCK_IDENTITY_CLOUD)
  • FortiGate (FORTINET_FIREWALL)
  • GCP_APP_ENGINE (GCP_APP_ENGINE)
  • HP Procurve Switch (HP_PROCURVE)
  • IAM Context (N/A)
  • IBM DB2 (DB2_DB)
  • IBM Mainframe Storage (IBM_MAINFRAME_STORAGE)
  • IBM Security Access Manager (IBM_SAM)
  • Illumio Core (ILLUMIO_CORE)
  • Imperva (IMPERVA_WAF)
  • Infoblox (INFOBLOX)
  • JAMF CMDB (JAMF)
  • KerioControl Firewall (KERIOCONTROL)
  • Microsoft Azure Activity (AZURE_ACTIVITY)
  • Microsoft Azure Resource (AZURE_RESOURCE_LOGS)
  • Microsoft Defender For Cloud (MICROSOFT_DEFENDER_CLOUD_ALERTS)
  • Microsoft Defender for Endpoint (MICROSOFT_DEFENDER_ENDPOINT)
  • Microsoft Exchange (EXCHANGE_MAIL)
  • Microsoft Graph Activity Logs (MICROSOFT_GRAPH_ACTIVITY_LOGS)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • Microsoft IIS (IIS)
  • Microsoft System Center Endpoint Protection (MICROSOFT_SCEP)
  • Mobile Endpoint Security (LOOKOUT_MOBILE_ENDPOINT_SECURITY)
  • Mongo Database (MONGO_DB)
  • Netscout OCI (NETSCOUT_OCI)
  • Netskope (NETSKOPE_ALERT)
  • Netskope Web Proxy (NETSKOPE_WEBPROXY)
  • Network Policy Server (MICROSOFT_NPS)
  • Nutanix Prism (NUTANIX_PRISM)
  • Office 365 (OFFICE_365)
  • Okta (OKTA)
  • OpenCanary (OPENCANARY)
  • Ordr IoT (ORDR_IOT)
  • Palo Alto Cortex XDR Alerts (CORTEX_XDR)
  • Palo Alto Networks Firewall (PAN_FIREWALL)
  • Palo Alto Prisma Cloud (PAN_PRISMA_CLOUD)
  • PerimeterX Bot Protection (PERIMETERX_BOT_PROTECTION)
  • Phishlabs (PHISHLABS)
  • Proofpoint Sendmail Sentrion (PROOFPOINT_SENDMAIL_SENTRION)
  • Pulse Secure (PULSE_SECURE_VPN)
  • RH-ISAC (RH_ISAC_IOC)
  • SailPoint IAM (SAILPOINT_IAM)
  • Salesforce (SALESFORCE)
  • Sap Business Technology Platform (SAP_BTP)
  • Security Command Center Threat (N/A)
  • Sentinelone Alerts (SENTINELONE_ALERT)
  • Shibboleth IDP (SHIBBOLETH_IDP)
  • Sourcefire (SOURCEFIRE_IDS)
  • Splunk Attack Analyzer (SPLUNK_ATTACK_ANALYZER)
  • STIX Threat Intelligence (STIX)
  • Symantec CloudSOC CASB (SYMANTEC_CASB)
  • Symantec DLP (SYMANTEC_DLP)
  • Tanium Asset (TANIUM_ASSET)
  • Thinkst Canary (THINKST_CANARY)
  • Trend Micro Deep Security (TRENDMICRO_DEEP_SECURITY)
  • Vectra Detect (VECTRA_DETECT)
  • Vectra Stream (VECTRA_STREAM)
  • VeridiumID by Veridium (VERIDIUM_ID)
  • Wazuh (WAZUH)
  • Windows Defender ATP (WINDOWS_DEFENDER_ATP)
  • Windows DNS (WINDOWS_DNS)
  • Windows Event (WINEVTLOG)
  • Windows Event (XML) (WINEVTLOG_XML)
  • Windows Local Administrator Password Solution (MICROSOFT_LAPS)
  • wiz.io (WIZ_IO)
  • Workspace Activities (WORKSPACE_ACTIVITY)
  • XAMS by Xiting (XITING_XAMS)
  • Zscaler CASB (ZSCALER_CASB)
  • Zscaler DLP (ZSCALER_DLP)
  • Zscaler Internet Access Audit Logs (ZSCALER_INTERNET_ACCESS)

The following log types, without a default parser, were added. Each is listed by product name and log_type value, if applicable.

  • Aruba Switch (ARUBA_SWITCH)
  • Azure AD Password Protection (AZURE_AD_PASSWORD_PROTECTION)
  • Azure Front Door (AZURE_FRONT_DOOR)
  • Babelforce (BABELFORCE)
  • Cloudaware (CLOUDAWARE)
  • Coalition Control API (COALITION)
  • Crowdstrike Identity Protection Services (CS_IDP)
  • Cymulate (CYMULATE)
  • Dell ECS Enterprise Object Storage (DELL_ECS)
  • Google Cloud NGFW Enterprise (GCP_NGFW_ENTERPRISE)
  • Google Cloud Secure Web Proxy (GCP_SWP)
  • HaveIBeenPwned (HIBP)
  • HPE BladeSystem C7000 (HPE_BLADESYSTEM_C7000)
  • HP OpenView (HP_OPENVIEW)
  • IBM DS8000 Storage (IBM_DS8000)
  • IBM-i Operating System (IBM_I)
  • Multicom Switch (MULTICOM_SWITCH)
  • Nextthink Finder (NEXTTHINK_FINDER)
  • Palo Alto Cortex XDR Management Audit (PAN_XDR_MGMT_AUDIT)
  • PingIdentity Directory Server Logs (PING_DIRECTORY)
  • Prisma SD-WAN (PRISMA_SD_WAN)
  • Redhat Jboss (REDHAT_JBOSS)
  • SafeBreach (SAFEBREACH)
  • Scality Ring Audit (SCALITY_RING_AUDIT)
  • Sendsafely (SENDSAFELY)
  • Solace Pub Sub Cloud (SOLACE_AUDIT)
  • Sonicwall Secure Mobile Access (SONICWALL_SMA)
  • Sonrai Enterprise Cloud Security Solution (SONRAI)
  • Tenemos Journey Manager System Event Publisher (TENEMOS_MANAGER_SYSTEMEVENT)
  • TrueFort Platform (TRUEFORT)
  • Ubiquiti Accesspoint (UBIQUITI_ACCESSPOINT)
  • WithSecure Cloud Protection (WITHSECURE_CLOUD)
  • WithSecure Elements Connector (WITHSECURE_ELEMENTS)
  • YAMAHA ROUTER RTX1200 (YAMAHA_ROUTER)

For a list of supported log types and details about default parser changes, see Supported log types and default parsers.

March 12, 2024

Forwarder troubleshooting guide is now available to help you diagnose and resolve common issues that may arise while using the Chronicle Linux forwarder.

February 23, 2024

Chronicle now supports the timestamp.get_date() function. For more information and example usage, see YARA-L 2.0 language syntax.

February 21, 2024

Fixed an issue that prevents you from using the list, percentile, and percentile_distinct functions when you create a custom measure in your dashboard.

February 20, 2024

Google has added Tokyo (Japan) as a new region for Chronicle customers. Chronicle can now store customer data in this region. This also adds a new regional endpoint for Chronicle APIs at https://asia-northeast1-backstory.googleapis.com.

February 15, 2024

The following supported default parsers have changed. Each is listed by product name and log_type value, if applicable.

  • A10 Load Balancer (A10_LOAD_BALANCER)
  • Anomali (ANOMALI_IOC)
  • Apache (APACHE)
  • Arcsight CEF (ARCSIGHT_CEF)
  • AWS CloudWatch (AWS_CLOUDWATCH)
  • AWS EC2 Hosts (AWS_EC2_HOSTS)
  • AWS EC2 Instances (AWS_EC2_INSTANCES)
  • AWS EC2 VPCs (AWS_EC2_VPCS)
  • Azure AD (AZURE_AD)
  • Azure AD Directory Audit (AZURE_AD_AUDIT)
  • Azure DevOps Audit (AZURE_DEVOPS)
  • Azure Firewall (AZURE_FIREWALL)
  • BIND (BIND_DNS)
  • BloxOne Threat Defense (BLOXONE)
  • Blue Coat Proxy (BLUECOAT_WEBPROXY)
  • Carbon Black (CB_EDR)
  • Cato Networks (CATO_NETWORKS)
  • CENSYS (CENSYS)
  • Check Point (CHECKPOINT_FIREWALL)
  • Chrome Management (N/A)
  • Cisco IronPort (CISCO_IRONPORT)
  • Cisco Meraki (CISCO_MERAKI)
  • Cisco Prime (CISCO_PRIME)
  • Cisco Secure Workload (CISCO_SECURE_WORKLOAD)
  • Citrix Netscaler (CITRIX_NETSCALER)
  • Cloud Audit Logs (N/A)
  • Cloud Load Balancing (GCP_LOADBALANCING)
  • Cloud Run (GCP_RUN)
  • Cloudflare (CLOUDFLARE)
  • CommVault Commcell (COMMVAULT_COMMCELL)
  • Compute Context (N/A)
  • Corelight (CORELIGHT)
  • CrowdStrike Detection Monitoring (CS_DETECTS)
  • CSV Custom IOC (CSV_CUSTOM_IOC)
  • Cybereason EDR (CYBEREASON_EDR)
  • Dataminr Alerts (DATAMINR_ALERT)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • F5 BIGIP LTM (F5_BIGIP_LTM)
  • FireEye ETP (FIREEYE_ETP)
  • Forescout NAC (FORESCOUT_NAC)
  • ForgeRock OpenAM (OPENAM)
  • IBM WebSEAL (IBM_WEBSEAL)
  • Imperva (IMPERVA_WAF)
  • Imperva Database (IMPERVA_DB)
  • Infoblox RPZ (INFOBLOX_RPZ)
  • ISC DHCP (ISC_DHCP)
  • Juniper (JUNIPER_FIREWALL)
  • Linux Sysmon (LINUX_SYSMON)
  • LogonBox (LOGONBOX)
  • ManageEngine ADAudit Plus (ADAUDIT_PLUS)
  • Micro Focus iManager (MICROFOCUS_IMANAGER)
  • Microsoft AD (WINDOWS_AD)
  • Microsoft ATA (MICROSOFT_ATA)
  • Microsoft Azure Activity (AZURE_ACTIVITY)
  • Microsoft Defender For Cloud (MICROSOFT_DEFENDER_CLOUD_ALERTS)
  • Microsoft Exchange (EXCHANGE_MAIL)
  • Microsoft IIS (IIS)
  • Netskope (NETSKOPE_ALERT)
  • Netskope CASB (NETSKOPE_CASB)
  • Ntopng (NTOPNG)
  • Office 365 (OFFICE_365)
  • OpenCanary (OPENCANARY)
  • OpenSSH (OPENSSH)
  • OSSEC (OSSEC)
  • Palo Alto Cortex XDR Alerts (CORTEX_XDR)
  • Palo Alto Networks Firewall (PAN_FIREWALL)
  • Palo Alto Panorama (PAN_PANORAMA)
  • Quest Active Directory (QUEST_AD)
  • Recordia (RECORDIA)
  • Sangfor Next Generation Firewall (SANGFOR_NGAF)
  • SAP SM20 (SAP_SM20)
  • Security Command Center Threat (N/A)
  • SEPPmail Secure Email (SEPPMAIL)
  • ServiceNow CMDB (SERVICENOW_CMDB)
  • Snare System Diagnostic Logs (SNARE_SOLUTIONS)
  • Solaris system (SOLARIS_SYSTEM)
  • STIX Threat Intelligence (STIX)
  • Symantec CloudSOC CASB (SYMANTEC_CASB)
  • Symantec Web Security Service (SYMANTEC_WSS)
  • Trend Micro Deep Security (TRENDMICRO_DEEP_SECURITY)
  • Veritas NetBackup (VERITAS_NETBACKUP)
  • VMware ESXi (VMWARE_ESX)
  • Watchguard EDR (WATCHGUARD_EDR)
  • WindChill (WINDCHILL)
  • Windows Defender AV (WINDOWS_DEFENDER_AV)
  • Windows DNS (WINDOWS_DNS)
  • Windows Event (WINEVTLOG)
  • Windows Event (XML) (WINEVTLOG_XML)
  • wiz.io (WIZ_IO)
  • Zeek JSON (BRO_JSON)
  • Zscaler (ZSCALER_WEBPROXY)
  • Zscaler CASB (ZSCALER_CASB)
  • Zscaler Internet Access Audit Logs (ZSCALER_INTERNET_ACCESS)
  • Zscaler Private Access (ZSCALER_ZPA)

The following log types, without a default parser, were added. Each is listed by product name and log_type value, if applicable.

  • Arista Guardian For Network Identity (ARISTA_AGNI)
  • HPE Aruba Networking Central (ARUBA_CENTRAL)
  • Blackberry Workspaces (BLACKBERRY_WORKSPACES)
  • Barracuda CloudGen Firewall (BARRACUDA_CLOUDGEN_FIREWALL)
  • Blackberry Workspaces (BLACKBERRY_WORKSPACES)
  • Cisco EStreamer (CISCO_ESTREAMER)
  • Cyderes IOC (CYDERES_IOC)
  • Dataiku DSS Logging (DATAIKU_DSS_LOGS)
  • Edgecore Networks (EDGECORE_NETWORKS)
  • Fisglobal Quantum (FISGLOBAL_QUANTUM)
  • ForgeRock Identity Cloud (FORGEROCK_IDENTITY_CLOUD)
  • Forgerock OpenIdM (FORGEROCK_OPENIDM)
  • FS-ISAC IOC (FS_ISAC_IOC)
  • Genetec Audit (GENETEC_AUDIT)
  • HiBob (HIBOB)
  • Imperva Audit Trail (IMPERVA_AUDIT_TRAIL)
  • KerioControl Firewall (KERIOCONTROL)
  • Looker Audit (LOOKER_AUDIT)
  • Mobile Endpoint Security (LOOKOUT_MOBILE_ENDPOINT_SECURITY)
  • ManageEngine PAM360 (MANAGE_ENGINE_PAM360)
  • Melissa (MELISSA)
  • Microsoft CASB Files & Entities (MICROSOFT_CASB_CONTEXT)
  • Windows Local Administrator Password Solution (MICROSOFT_LAPS)
  • Network Policy Server (MICROSOFT_NPS)
  • Power BI Activity Log (MICROSOFT_POWERBI_ACTIVITY_LOG)
  • Nxlog Agent (NXLOG_AGENT)
  • Nxlog Fim (NXLOG_FIM)
  • Opus Codec (OPUS)
  • Oracle NetSuite (ORACLE_NETSUITE)
  • Pega Automation (PEGA)
  • Qualys Knowledgebase (QUALYS_KNOWLEDGEBASE)
  • RealiteQ (REALITEQ)
  • SAP Webdispatcher (SAP_WEBDISP)
  • Serpico (SERPICO)
  • Software House Ccure9000 (SOFTWARE_HOUSE_CCURE9000)
  • Spirion (SPIRION)
  • Spur data feeds (SPUR_FEEDS)
  • Swift (SWIFT)
  • Technitium DNS (TECHNITIUM_DNS)
  • Tetragon Ebpf Audit Logs (TETRAGON_EBPF_AUDIT_LOGS)
  • Trend Micro Email Security Advanced (TRENDMICRO_EMAIL_SECURITY)
  • Tridium Niagara Framework (TRIDIUM_NIAGARA_FRAMEWORK)
  • VeridiumID by Veridium (VERIDIUM_ID)
  • Wallarm Webhook Notifications (WALLARM_NOTIFICATIONS)
  • Winscp (WINSCP)
  • XAMS by Xiting (XITING_XAMS)

For a list of supported log types and details about default parser changes, see Supported log types and default parsers.

February 12, 2024

Risk Analytics

Google has introduced Risk Analytics to Chronicle. Risk Analytics looks for patterns of risk across your enterprise, assigning risk scores to all entities and activities. These scores are surfaced in the Risk Analytics dashboard which lets you better understand risk in your environment by visualizing entity risk trends. The dashboard helps you to identify unusual behavior and the potential risk that entities pose to your enterprise. You can specify watchlists of entities you suspect of having greater risk. The watchlists let you more easily monitor risk within your environment.

Risk Analytics also provides both predefined curated detections and YARA-L metric functions for authoring custom rules.

Risk Analytics is available with Enterprise and Enterprise Plus licenses, or as an add-on to a SIEM standalone license.

February 06, 2024

Chronicle requires a minimum Transport Layer Security (TLS) version of 1.2 to maintain security compliance. Ingestion routing connections that use lower TLS versions are automatically blocked. Upgrade any custom ingestion mechanisms to adhere to TLS 1.2 or higher.

When the data ingestion rate for a tenant reaches a certain threshold, Chronicle controls the rate of ingestion for new data feeds to prevent a source with a high ingestion rate from affecting the ingestion rate of another data source. The ingestion volume and tenant's usage history determine the threshold. If the rate of ingestion does not deviate greatly then there is no effect on the ingestion rate.

February 01, 2024

The following log types were added to the Chronicle feed management API to create AWS data feeds. These feeds can be used to get context on AWS resources such as EC2 instances and users in identity and access management (IAM). Each is listed by product name and log_type value, if applicable.

  • AWS EC2 Hosts (AWS_EC2_HOSTS)
  • AWS EC2 Instances (AWS_EC2_INSTANCES)
  • AWS EC2 VPCs (AWS_EC2_VPCS)
  • AWS Identity and Access Management (AWS_IAM)

To view a list of log types that Chronicle supports for third-party APIs, see Configuration by log type.

January 31, 2024

The bi-weekly release of Chronicle parsers will change to a more frequent release schedule to allow for more testing before parser changes automatically take effect in Parser Management.

Beginning on February 1, 2024, new parser updates will be released weekly as pending updates in Parser Management. Every 4 weeks beginning February 15, pending updates will automatically become active when these parser versions are promoted to default.

Any Chronicle tenants with Parser Management disabled do not use the standard Parser Management release process, so weekly parser updates will automatically take effect.

January 25, 2024

The Detection Engine added support for event variable joins on or expressions and function calls. For examples, see Event variable join requirements.

January 24, 2024

Chronicle has expanded Cloud Threat Detections to alert on findings from GCP Security Command Center Event Threat Detections, Virtual Machine Threat Detections, and Container Threat Detections. These passthrough detections are available through the following packs: CDIR SCC Enhanced Exfiltration, CDIR SCC Enhanced Defense Evasion, CDIR SCC Enhanced Malware, CDIR SCC Enhanced Persistence, CDIR SCC Enhanced Privilege Escalation, CDIR SCC Credential Access, CDIR SCC Enhanced Discovery, CDIR SCC Brute Force, CDIR SCC Data Destruction, CDIR SCC Inhibit System Recovery, CDIR SCC Execution, CDIR SCC Initial Access, CDIR SCC Impair Defenses.

January 23, 2024

Chronicle Curated Detections has been enhanced with new detection content for Linux Threats. These new rule sets help identify malware and suspicious activity in Linux environments.

January 19, 2024

The following supported default parsers have changed. Each is listed by product name and log_type value, if applicable.

  • Alcatel Switch (ALCATEL_SWITCH)
  • Awake NDR (AWAKE_NDR)
  • AWS Aurora (AWS_AURORA)
  • Azure AD (AZURE_AD)
  • Azure AD Directory Audit (AZURE_AD_AUDIT)
  • Azure AD Organizational Context (AZURE_AD_CONTEXT)
  • Azure DevOps Audit (AZURE_DEVOPS)
  • Barracuda Email (BARRACUDA_EMAIL)
  • BeyondTrust (BOMGAR)
  • Box (BOX)
  • Cisco Firepower NGFW (CISCO_FIREPOWER_FIREWALL)
  • Cisco Umbrella Audit (CISCO_UMBRELLA_AUDIT)
  • Cisco VPN (CISCO_VPN)
  • Cisco WLC/WCS (CISCO_WIRELESS)
  • Cloud Audit Logs (N/A)
  • Cloudflare (CLOUDFLARE)
  • Compute Context (N/A)
  • Dell Switch (DELL_SWITCH)
  • F5 ASM (F5_ASM)
  • FireEye (FIREEYE_ALERT)
  • FireEye HX (FIREEYE_HX)
  • FireEye PX (FIREEYE_PX)
  • Fortinet Web Application Firewall (FORTINET_FORTIWEB)
  • HP Aruba (ClearPass) (CLEARPASS)
  • Infoblox DHCP (INFOBLOX_DHCP)
  • JumpCloud Directory Insights (JUMPCLOUD_DIRECTORY_INSIGHTS)
  • Kubernetes Audit Azure (KUBERNETES_AUDIT_AZURE)
  • Microsoft Azure Activity (AZURE_ACTIVITY)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • Microsoft IIS (IIS)
  • Nutanix Prism (NUTANIX_PRISM)
  • Office 365 (OFFICE_365)
  • Palo Alto Networks Firewall (PAN_FIREWALL)
  • Quest Change Auditor for EMC (QUEST_CHANGE_AUDITOR_EMC)
  • Quest File Access Audit (QUEST_FILE_AUDIT)
  • RH-ISAC (RH_ISAC_IOC)
  • Riverbed Steelhead (STEELHEAD)
  • SentinelOne Singularity Cloud Funnel (SENTINELONE_CF)
  • Symantec DLP (SYMANTEC_DLP)
  • Synology (SYNOLOGY)
  • Sysdig (SYSDIG)
  • Unix system (NIX_SYSTEM)
  • Vectra Detect (VECTRA_DETECT)
  • Vectra Stream (VECTRA_STREAM)
  • Windows DNS (WINDOWS_DNS)
  • Windows Event (WINEVTLOG)
  • Windows Event (XML) (WINEVTLOG_XML)
  • Windows Sysmon (WINDOWS_SYSMON)
  • Zscaler (ZSCALER_WEBPROXY)

The following log types, without a default parser, were added. Each is listed by product name and log_type value, if applicable.

  • AliCloud Anti DDos (ALICLOUD_ANTI_DDOS)
  • AliCloud WAF (ALICLOUD_WAF)
  • Arista CloudVision Portal (ARISTA_CVP)
  • CypherTrust Manager (CIPHERTRUST_MANAGER)
  • Cybergatekeeper NAC (CYBERGATEKEEPER_NAC)
  • Microsoft Graph Activity Logs (MICROSOFT_GRAPH_ACTIVITY_LOGS)
  • Trend Micro EdgeIPS (TRENDMICRO_EDGEIPS)
  • Vanguard Active Alerts (VANGUARD)

For a list of supported log types and details about default parser changes, see Supported log types and default parsers.

January 17, 2024

The following changes are available in the Unified Data Model.

  • New objects were added:

    • DNSRecord
    • Favicon
    • ThreatVerdict
    • PopularityRank
    • SSLCertificate
    • SSLCertificate.AuthorityKeyId
    • SSLCertificate.CertSignature
    • SSLCertificate.DSA
    • SSLCertificate.EC
    • SSLCertificate.Extension
    • SSLCertificate.PublicKey
    • SSLCertificate.RSA
    • SSLCertificate.Subject
    • SSLCertificate.Validity
    • Tracker
    • Url
    • SecurityResult.AnalyticsMetadata
  • A new field was added to Noun: url_metadata.

  • New fields were added to SecurityResult:

    • ruleset_category_display_name
    • confidence_score
    • analytics_metadata
    • threat_verdict
    • last_discovered_time
  • New fields were added to Domain:

    • last_dns_records
    • categories
    • favicon
    • jarm
    • last_dns_records
    • last_dns_records_time
    • last_https_certificate
    • last_https_certificate_time
    • popularity_ranks
    • tags
    • whois_time
  • New fields were added to File: security_result and main_icon.

  • New fields were added to SecurityResult.Association: sponsor_region, targeted_regions, and tags.

  • New values were added to File.FileType:

    FILE_TYPE_DWG FILE_TYPE_DXF
    FILE_TYPE_THREEDS FILE_TYPE_WEBM
    FILE_TYPE_MKV FILE_TYPE_ONE_NOTE
    FILE_TYPE_OOXML FILE_TYPE_ZST
    FILE_TYPE_LZFSE FILE_TYPE_PYTHON_WHL
    FILE_TYPE_PYTHON_PKG FILE_TYPE_M4
    FILE_TYPE_OBJETIVEC FILE_TYPE_JMOD
    FILE_TYPE_MAKEFILE FILE_TYPE_INI
    FILE_TYPE_CLJ FILE_TYPE_PDB
    FILE_TYPE_SQL FILE_TYPE_NEKO
    FILE_TYPE_WER FILE_TYPE_GOLANG
    FILE_TYPE_SGML FILE_TYPE_JSON
    FILE_TYPE_CSV FILE_TYPE_SQUASHFS
    FILE_TYPE_VHD FILE_TYPE_IPS
    FILE_TYPE_PEM FILE_TYPE_PGP
    FILE_TYPE_CRT FILE_TYPE_PYC

  • New values were added to Metric.Dimension:

    • PRINCIPAL_PROCESS_FILE_PATH
    • PRINCIPAL_PROCESS_FILE_HASH
    • SECURITY_RESULT_RULE_NAME
  • A new value was added to Metric.MetricName: ALERT_EVENT_NAME_COUNT.

  • A new value was added to SecurityResult.ProductSeverity: NONE.

For a list of all fields in the Unified Data Model, and their descriptions, see the Unified Data Model field list.

January 16, 2024

UDM Search for entity investigation

UDM Search now includes a feature that lets you investigate entities (for example, an IP address, user, or asset) in addition to the events and alerts that match the search query terms. UDM Search query conditions can include both UDM fields (for example, principal.hostname="alice") and grouped fields (for example, hostname="alice"). When a search query includes a condition that identifies a specific entity, the search results include details about that entity in addition to UDM events that match the entire search query.

January 03, 2024

The following supported default parsers have changed. Each is listed by product name and log_type value, if applicable.

  • ADVA Fiber Service Platform (ADVA_FSP)
  • Anomali (ANOMALI_IOC)
  • Apache (APACHE)
  • AWS EMR (AWS_EMR)
  • AWS Route 53 DNS (AWS_ROUTE_53)
  • AWS WAF (AWS_WAF)
  • Azure AD Directory Audit (AZURE_AD_AUDIT)
  • Azure Application Gateway (AZURE_GATEWAY)
  • BIND (BIND_DNS)
  • Blue Coat Proxy (BLUECOAT_WEBPROXY)
  • Carbon Black (CB_EDR)
  • Check Point (CHECKPOINT_FIREWALL)
  • Cisco ASA (CISCO_ASA_FIREWALL)
  • Cisco DNA Center Platform (CISCO_DNAC)
  • Cisco Firepower NGFW (CISCO_FIREPOWER_FIREWALL)
  • CrowdStrike Falcon (CS_EDR)
  • Darktrace (DARKTRACE)
  • Deep Instinct EDR (DEEP_INSTINCT_EDR)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • Extreme Networks Switch (EXTREME_SWITCH)
  • F5 ASM (F5_ASM)
  • F5 BIGIP LTM (F5_BIGIP_LTM)
  • Forescout NAC (FORESCOUT_NAC)
  • Fortinet FortiClient (FORTINET_FORTICLIENT)
  • GitHub (GITHUB)
  • GMAIL Logs (GMAIL_LOGS)
  • IBM DB2 (DB2_DB)
  • IBM Guardium (GUARDIUM)
  • Jamf Protect Alerts (JAMF_PROTECT)
  • Juniper (JUNIPER_FIREWALL)
  • Kubernetes Node (KUBERNETES_NODE)
  • Mandiant Custom IOC (MANDIANT_CUSTOM_IOC)
  • Mattermost (MATTERMOST)
  • Microsoft Exchange (EXCHANGE_MAIL)
  • Microsoft IIS (IIS)
  • Microsoft SQL Server (MICROSOFT_SQL)
  • Nutanix Prism (NUTANIX_PRISM)
  • Office 365 (OFFICE_365)
  • Okta (OKTA)
  • Palo Alto Cortex XDR Events (PAN_CORTEX_XDR_EVENTS)
  • Palo Alto Networks Firewall (PAN_FIREWALL)
  • Proofpoint Observeit (OBSERVEIT)
  • RH-ISAC (RH_ISAC_IOC)
  • SAP SAST Suite (SAP_SAST)
  • Security Command Center Threat (N/A)
  • SentinelOne Singularity Cloud Funnel (SENTINELONE_CF)
  • Symantec DLP (SYMANTEC_DLP)
  • Talon (TALON)
  • Tanium Stream (TANIUM_TH)
  • Trend Micro Apex one (TRENDMICRO_APEX_ONE)
  • Windows Event (WINEVTLOG)
  • Windows Event (XML) (WINEVTLOG_XML)
  • wiz.io (WIZ_IO)
  • Zscaler (ZSCALER_WEBPROXY)
  • Zscaler CASB (ZSCALER_CASB)
  • Zscaler Tunnel (ZSCALER_TUNNEL)

The following log types, without a default parser, were added. Each is listed by product name and log_type value, if applicable.

  • Asimily (ASIMILY)
  • Checkpoint Gaia (CHECKPOINT_GAIA)
  • Cisco Cyber Vision (CISCO_CYBER_VISION)
  • Cisco IronPort (CISCO_IRONPORT)
  • Cyber 2.0 IDS (CYBER_2_IDS)
  • CypherTrust Manager (CYPHERTRUST_MANAGER)
  • Duo Trust Monitor (DUO_TRUST_MONITOR)
  • Extreme Wireless (EXTREME_WIRELESS)
  • FireEye PX (FIREEYE_PX)
  • Harfanglab EDR (HARFANGLAB_EDR)
  • ImageNow (IMAGENOW)
  • INFINICO NetWyvern Series Appliance (INFINICO_NETWYVERN)
  • Quest CA Audit (QUEST_CA_AUDIT)
  • Quest Change Auditor for EMC (QUEST_CHANGE_AUDITOR_EMC)
  • Quest File Access Audit (QUEST_FILE_AUDIT)
  • RadiFlow IDS (RADIFLOW_IDS) rigo (SENTRIGO)
  • SEPPmail Secure Email (SEPPMAIL)
  • SpecterX (SPECTERX)
  • ViaControl Server Application (VIACONTROL)
  • WindChill (WINDCHILL)
  • WS Ftp (WS_FTP)

For a list of supported log types and details about default parser changes, see Supported log types and default parsers.

December 22, 2023

When you create a custom measure in a dashboard, you can't use the list, percentile, and percentile_distinct functions.

December 18, 2023

Chronicle Curated Detections has been enhanced with new detection content for Google Cloud threats. These new rule sets detect Kubernetes certificates and Certificate Signing Requests (CSRs) actions that could be used to establish persistence or to escalate privileges.

December 15, 2023

Google has added KSA (Dammam) and India (Mumbai) as new regions for Chronicle customers. Chronicle can now store customer data in these regions. This also adds new regional endpoints for Chronicle APIs at https://me-central2-backstory.googleapis.com and http://asia-south1-backstory.googleapis.com.

December 14, 2023

The following supported default parsers have changed. Each is listed by product name and log_type value, if applicable.

  • Aruba Airwave (ARUBA_AIRWAVE)
  • Atlassian Jira (ATLASSIAN_JIRA)
  • AWS EC2 HOSTS (AWS_EC2_HOSTS)
  • AWS EC2 INSTANCES (AWS_EC2_INSTANCES)
  • AWS EC2 VPCS (AWS_EC2_VPCS)
  • AWS Identity and Access Management (IAM) (AWS_IAM)
  • AWS WAF (AWS_WAF)
  • Azure App Service (AZURE_APP_SERVICE)
  • Blue Coat Proxy (BLUECOAT_WEBPROXY)
  • Box (BOX)
  • Brocade Switch (BROCADE_SWITCH)
  • Cisco ASA (CISCO_ASA_FIREWALL)
  • Cisco Switch (CISCO_SWITCH)
  • Cloud Audit Logs (N/A)
  • Cloud Intrusion Detection System (GCP_IDS)
  • Corelight (CORELIGHT)
  • DomainTools Threat Intelligence (DOMAINTOOLS_THREATINTEL)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • Extreme Networks Switch (EXTREME_SWITCH)
  • F5 ASM (F5_ASM)
  • FireEye (FIREEYE_ALERT)
  • Fortinet FortiClient (FORTINET_FORTICLIENT)
  • GMAIL Logs (GMAIL_LOGS)
  • HCL BigFix (HCL_BIGFIX)
  • Kubernetes Node (KUBERNETES_NODE)
  • Mandiant Custom IOC (MANDIANT_CUSTOM_IOC)
  • Medigate IoT (MEDIGATE_IOT)
  • Microsoft Azure Resource (AZURE_RESOURCE_LOGS)
  • Microsoft CyberX (CYBERX)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • Microsoft IIS (IIS)
  • Microsoft Powershell (POWERSHELL)
  • Neo4j (NEO4J)
  • Netskope Web Proxy (NETSKOPE_WEBPROXY)
  • Onapsis (ONAPSIS)
  • Palo Alto Prisma Cloud Alert payload (PAN_PRISMA_CA)
  • PerimeterX Bot Protection (PERIMETERX_BOT_PROTECTION)
  • Ping Identity (PING)
  • Radware Web Application Firewall (RADWARE_FIREWALL)
  • Remediant SecureONE (REMEDIANT_SECUREONE)
  • SailPoint IAM (SAILPOINT_IAM)
  • SAP SM20 (SAP_SM20)
  • Security Command Center Threat (N/A)
  • Silverfort Authentication Platform (SILVERFORT)
  • Symantec DLP (SYMANTEC_DLP)
  • Thinkst Canary (THINKST_CANARY)
  • Unix system (NIX_SYSTEM)
  • WatchGuard (WATCHGUARD)
  • Windows Defender ATP (WINDOWS_DEFENDER_ATP)
  • Windows DNS (WINDOWS_DNS)
  • Workday Audit Logs (WORKDAY_AUDIT)
  • Workspace Activities (WORKSPACE_ACTIVITY)
  • Zscaler Internet Access Audit Logs (ZSCALER_INTERNET_ACCESS)

The following log types, without a default parser, were added. Each is listed by product name and log_type value, if applicable.

  • Akamai Guardicore (AKAMAI_GUARDICORE)
  • Alcatel Switch (ALCATEL_SWITCH)
  • Ascertia (ASCERTIA)
  • Cohesity Helios (COHESITY_HELIOS)
  • Dtex Intercept (DTEX_INTERCEPT)
  • Evidos Firewall (EVIDOS_FIREWALL)
  • F5 Distributed Cloud Services (F5_DCS)
  • Five9 (FIVE9)
  • JumpCloud Desktop (JUMPCLOUD_DESKTOP)
  • Keepalived Routing software (KEEPALIVED)
  • Mongo Atlas Audit (MONGO_ATLAS_AUDIT)
  • Mosyle (MOSYLE)
  • NetDocuments Solutions (NETDOCUMENTS)
  • Netwrix (NETWRIX)
  • Nozomi Networks Scada Guardian (NOZOMI_GUARDIAN)
  • Netwrix (NETWRIX)
  • Nozomi Networks Scada Guardian (NOZOMI_GUARDIAN)
  • OpenVAS (OPENVAS)
  • Passfort (PASSFORT)
  • Proofpoint DLP (PROOFPOINT_DLP)
  • Rabbit MQ (RABBITMQ)
  • Redis (REDIS)
  • Salesforce Commerce Cloud (SALESFORCE_COMMERCE_CLOUD)
  • Sap Business Technology Platform (SAP_BTP)
  • Syxsense (SYXSENSE)
  • Teramind (TERAMIND)
  • TXOne Stellar (TRENDMICRO_STELLAR)
  • Zscaler NSS Feeds for Alerts (ZSCALER_NSS_FEEDS)
  • Zscaler Tunnel (ZSCALER_TUNNEL)

For a list of supported log types and details about default parser changes, see Supported log types and default parsers.

December 13, 2023

Duet AI in Security Operations

You can now use Duet AI to search your event data using natural language. Duet AI can translate natural language into Chronicle's unified data model, letting you search your event data without having to know YARA-L to craft custom queries.

December 06, 2023

Chronicle Curated Detections has been enhanced with new detection content for Google Cloud threats. These new rule sets help identify anomalous activity in Google Workspace data.

Chronicle now has an additional mechanism to set up the ingestion of Google Workspace Activities logs (WORKSPACE_ACTIVITY). This feature simplifies the configuration steps and provides a more direct data integration with Google Workspace. For more information, see Send Google Workspace data to Chronicle.

November 29, 2023

The following supported default parsers have changed. Each is listed by product name and log_type value, if applicable.

  • AWS Cloudtrail (AWS_CLOUDTRAIL)
  • Azure AD (AZURE_AD)
  • Azure AD Directory Audit (AZURE_AD_AUDIT)
  • Azure AD Organizational Context (AZURE_AD_CONTEXT)
  • Azure Application Gateway (AZURE_GATEWAY)
  • Azure DevOps Audit (AZURE_DEVOPS)
  • Blue Coat Proxy (BLUECOAT_WEBPROXY)
  • Chrome Management (N/A)
  • Cisco ASA (CISCO_ASA_FIREWALL)
  • Cisco ISE (CISCO_ISE)
  • Cisco Wireless IPS (CISCO_WIPS)
  • Citrix Netscaler (CITRIX_NETSCALER)
  • Clearswift (CLEARSWIFT)
  • Cloud Audit Logs (N/A)
  • Cloud Load Balancing (GCP_LOADBALANCING)
  • Cloud SQL (GCP_CLOUDSQL)
  • Cloudflare (CLOUDFLARE)
  • Corelight (CORELIGHT)
  • CrowdStrike Falcon (CS_EDR)
  • Cyberark Privilege Cloud (CYBERARK_PRIVILEGE_CLOUD)
  • Darktrace (DARKTRACE)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • Evision FircoSoft (EVISION_FIRCOSOFT)
  • Fluentd Logs (FLUENTD)
  • FortiGate (FORTINET_FIREWALL)
  • HPE ILO (HPE_ILO)
  • IBM WebSEAL (IBM_WEBSEAL)
  • Jamf Protect Telemetry (JAMF_TELEMETRY)
  • Jenkins (JENKINS)
  • JumpCloud Directory Insights (JUMPCLOUD_DIRECTORY_INSIGHTS)
  • Juniper MX Router (JUNIPER_MX)
  • Kubernetes Node (KUBERNETES_NODE)
  • Linux Auditing System (AuditD) (AUDITD)
  • Mandiant Custom IOC (MANDIANT_CUSTOM_IOC)
  • Microsoft CASB (MICROSOFT_CASB)
  • Microsoft Exchange (EXCHANGE_MAIL)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • Nokia Router (NOKIA_ROUTER)
  • Ntopng (NTOPNG)
  • Office 365 (OFFICE_365)
  • OpenVPN (OPEN_VPN)
  • Opnsense (OPNSENSE)
  • OSQuery (OSQUERY_EDR)
  • OSSEC (OSSEC)
  • Palo Alto Networks Firewall (PAN_FIREWALL)
  • Radware Web Application Firewall (RADWARE_FIREWALL)
  • RH-ISAC (RH_ISAC_IOC)
  • Security Command Center Threat (N/A)
  • Sierra Wireless (SIERRA_WIRELESS)
  • Signal Sciences WAF (SIGNAL_SCIENCES_WAF)
  • Sophos Firewall (Next Gen) (SOPHOS_FIREWALL)
  • Splunk Platform (SPLUNK)
  • Suricata IDS (SURICATA_IDS)
  • Symantec Endpoint Protection (SEP)
  • Teleport Access Plane (TELEPORT_ACCESS_PLANE)
  • Ubiquiti UniFi Switch (UBIQUITI_SWITCH)
  • VMware NSX (VMWARE_NSX)
  • Vsftpd (VSFTPD)
  • WatchGuard (WATCHGUARD)
  • Windows Defender ATP (WINDOWS_DEFENDER_ATP)
  • Windows DHCP (WINDOWS_DHCP)
  • Windows DNS (WINDOWS_DNS)
  • Windows Event (WINEVTLOG)
  • Windows Event (XML) (WINEVTLOG_XML)
  • Windows Sysmon (WINDOWS_SYSMON)
  • Workspace Activities (WORKSPACE_ACTIVITY)
  • Workspace Alerts (WORKSPACE_ALERTS)
  • Workspace ChromeOS Devices (WORKSPACE_CHROMEOS)
  • Workspace Groups (WORKSPACE_GROUPS)
  • Workspace Mobile Devices (WORKSPACE_MOBILE)
  • Workspace Privileges (WORKSPACE_PRIVILEGES)
  • Workspace Users (WORKSPACE_USERS)
  • Zeek JSON (BRO_JSON)
  • Zscaler (ZSCALER_WEBPROXY)

The following log types, without a default parser, were added. Each is listed by product name and log_type value, if applicable.

  • No new log types were added.

For a list of supported log types and details about default parser changes, see Supported log types and default parsers.

November 15, 2023

The following supported default parsers have changed. Each is listed by product name and log_type value, if applicable.

  • Abnormal Security (ABNORMAL_SECURITY)
  • Akamai Enterprise Application Access (AKAMAI_EAA)
  • Atlassian Confluence (ATLASSIAN_CONFLUENCE)
  • Atlassian Jira (ATLASSIAN_JIRA)
  • AWS Aurora (AWS_AURORA)
  • AWS Cloudtrail (AWS_CLOUDTRAIL)
  • Bitwarden Events (BITWARDEN_EVENTS)
  • Check Point Harmony (CHECKPOINT_HARMONY)
  • Cisco Router (CISCO_ROUTER)
  • Cisco Switch (CISCO_SWITCH)
  • Cisco Umbrella DNS (UMBRELLA_DNS)
  • Cloud Audit Logs (N/A)
  • Dell Switch (DELL_SWITCH)
  • Elastic Search (ELASTIC_SEARCH)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • F5 ASM (F5_ASM)
  • FireEye (FIREEYE_ALERT)
  • Firewall Rule Logging (N/A)
  • IBM DataPower Gateway (IBM_DATAPOWER)
  • Infoblox (INFOBLOX)
  • Jamf Protect Alerts (JAMF_PROTECT)
  • Juniper (JUNIPER_FIREWALL)
  • Lacework Cloud Security (LACEWORK)
  • Linux Sysmon (LINUX_SYSMON)
  • Medigate IoT (MEDIGATE_IOT)
  • Microsoft Sentinel (MICROSOFT_SENTINEL)
  • Netskope (NETSKOPE_ALERT)
  • Openpath (OPENPATH)
  • Palo Alto Cortex XDR Alerts (CORTEX_XDR)
  • Proofpoint Observeit (OBSERVEIT)
  • Proofpoint On Demand (PROOFPOINT_ON_DEMAND)
  • Pulse Secure (PULSE_SECURE_VPN)
  • Pulse Secure Virtual Traffic Manager (PULSE_SECURE_VTM)
  • SentinelOne EDR (SENTINEL_EDR)
  • Sophos Firewall (Next Gen) (SOPHOS_FIREWALL)
  • SpyCloud (SPYCLOUD)
  • Stealthbits Defend (STEALTHBITS_DEFEND)
  • Stealthbits PAM (STEALTHBITS_PAM)
  • STIX Threat Intelligence (STIX)
  • Symantec Endpoint Protection (SEP)
  • Symantec Event export (SYMANTEC_EVENT_EXPORT)
  • Tenable Active Directory Security (TENABLE_ADS)
  • Unix system (NIX_SYSTEM)
  • VMware vCenter (VMWARE_VCENTER)
  • Windows Event (XML) (WINEVTLOG_XML)
  • Zscaler (ZSCALER_WEBPROXY)

The following log types, without a default parser, were added. Each is listed by product name and log_type value, if applicable.

  • Aruba Orchestrator (ARUBA_ORCHESTRATOR)
  • AWS Shield (AWS_SHIELD)
  • Azure DNS logs (AZURE_DNS)
  • Backbox (BACKBOX)
  • Bitvise SSHd (BITVISE_SSHD)
  • Cylera IOT (CYLERA_IOT)
  • Druva Backup (DRUVA_BACKUP)
  • Ensono Cloud Mainframe Solution (ENSONO)
  • xtreme Networks ExtremeControl NAC Solution (EXTREME_CONTROL)
  • EzProxy (EZPROXY)
  • GitHub Events (GITHUB_EVENTS)
  • Glean (GLEAN)
  • ISM Xtraction (IVANTI_XTRACTION)
  • Lira (LIRA)
  • LogonBox (LOGONBOX)
  • Mandiant Custom IOC (MANDIANT_CUSTOM_IOC)
  • Monday (MONDAY)
  • Onapsis (ONAPSIS)
  • Opentelemetry (OPENTELEMETRY)
  • Opswat Kiosk (OPSWAT_KIOSK)
  • Outpost24 (OUTPOST24)
  • Pentera Leef (PENTERA_LEEF)
  • Phishlabs (PHISHLABS)
  • Portnix Audit (PORTNOX_AUDIT)
  • Portnix CEF (PORTNOX_CEF)
  • Proofpoint Sendmail Sentrion (PROOFPOINT_SENDMAIL_SENTRION)
  • SAP SM20 (SAP_SM20)
  • Splunk Attack Analyzer (SPLUNK_ATTACK_ANALYZER)
  • Stellar Cyber (STELLAR_CYBER)
  • Talon (TALON)
  • Teradici PCoIP (TERADICI_PCOIP)
  • TrendMicro Apex Central (TRENDMICRO_APEX_CENTRAL)
  • TrendMicro Webproxy DSM (TRENDMICRO_WEBPROXY_DSM)
  • Vonage (VONAGE)
  • Waterfall Data Security Manager (WATERFALL_DSM)
  • Ysoft Data Security Manager (YSOFT_DSM)
  • Zscaler Client Connector (ZSCALER_ZCC)
  • Zscaler ZDX (ZSCALER_ZDX)

For a list of supported log types and details about default parser changes, see Supported log types and default parsers.

November 08, 2023

Detection Engine has added support for rule statuses for Chronicle YARA-L rules running on live data. In addition to being in Enabled or Disabled state, rules can also have Limited or Paused status depending on their resource usage.

November 02, 2023

The following supported default parsers have changed. Each is listed by product name and log_type value, if applicable.

  • Akamai WAF (AKAMAI_WAF)
  • Atlassian Confluence (ATLASSIAN_CONFLUENCE)
  • AWS Cloudtrail (AWS_CLOUDTRAIL)
  • AWS EMR (AWS_EMR)
  • Azure AD Organizational Context (AZURE_AD_CONTEXT)
  • Carbon Black (CB_EDR)
  • Cisco Router (CISCO_ROUTER)
  • Cisco Umbrella Web Proxy (UMBRELLA_WEBPROXY)
  • Cloud Load Balancing (GCP_LOADBALANCING)
  • Cloud SQL (GCP_CLOUDSQL)
  • DNSFilter (DNSFILTER)
  • Duo Auth (DUO_AUTH)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • Evision FircoSoft (EVISION_FIRCOSOFT)
  • ExtraHop RevealX (EXTRAHOP)
  • F5 ASM (F5_ASM)
  • Firewall Rule Logging (N/A)
  • Fortinet FortiClient (FORTINET_FORTICLIENT)
  • GCP_KUBERNETES_CONTEXT (GCP_KUBERNETES_CONTEXT)
  • GitHub (GITHUB)
  • Gitlab (GITLAB)
  • Hashicorp Vault (HASHICORP)
  • IBM DataPower Gateway (IBM_DATAPOWER)
  • IBM DB2 (DB2_DB)
  • IBM Security Verify SaaS (IBM_SECURITY_VERIFY_SAAS)
  • Infoblox (INFOBLOX)
  • JumpCloud Directory Insights (JUMPCLOUD_DIRECTORY_INSIGHTS)
  • Juniper Junos (JUNIPER_JUNOS)
  • Kolide Endpoint Security (KOLIDE)
  • ManageEngine ADAudit Plus (ADAUDIT_PLUS)
  • Microsoft Exchange (EXCHANGE_MAIL)
  • Microsoft IIS (IIS)
  • Office 365 (OFFICE_365)
  • Open Cybersecurity Schema Framework (OCSF) (OCSF)
  • Oracle (ORACLE_DB)
  • Oracle Cloud Infrastructure (ORACLE_CLOUD_AUDIT)
  • Proofpoint On Demand (PROOFPOINT_ON_DEMAND)
  • Qualys VM (QUALYS_VM)
  • Saiwall VPN (SAIWALL_VPN)
  • SentinelOne EDR (SENTINEL_EDR)
  • Slack Audit (SLACK_AUDIT)
  • Unix system (NIX_SYSTEM)
  • Windows Event (WINEVTLOG)
  • Workspace Activities (WORKSPACE_ACTIVITY)
  • Workspace Alerts (WORKSPACE_ALERTS)
  • Workspace ChromeOS Devices (WORKSPACE_CHROMEOS)
  • Zscaler Internet Access Audit Logs (ZSCALER_INTERNET_ACCESS)

The following log types, without a default parser, were added. Each is listed by product name and log_type value, if applicable.

  • Analyst1 IOC (ANALYST1_IOC)
  • Amazon FSx for Windows File Server (AWS_FSX)
  • DealCloud (DEAL_CLOUD)
  • DomainTools Threat Intelligence (DOMAINTOOLS_THREATINTEL)
  • Farsight DNSDB (FARSIGHT_DNSDB)
  • Journald (JOURNALD)
  • Mambu (MAMBU)
  • Mattermost (MATTERMOST)
  • Mitel Communications Director (MITEL_MCD)
  • NordLayer VPN (NORD_LAYER)
  • Paxton Access Control Systems (PAXTON_ACS)

For a list of supported log types and details about default parser changes, see Supported log types and default parsers.

November 01, 2023

Chronicle Curated Detections has been enhanced with new detection content for Google Cloud threats. These new rule sets help identify Kubernetes activity associated with abuse of role-based access controls (RBAC).

October 27, 2023

Google has added Frankfurt (Germany) and Zurich (Switzerland) as new regions for Chronicle customers. Chronicle can now store customer data in these regions. This also adds new regional endpoints for Chronicle APIs at https://europe-west3-backstory.googleapis.com and https://europe-west6-backstory.googleapis.com.

October 18, 2023

The following supported default parsers have changed. Each is listed by product name and log_type value, if applicable.

  • Azure AD Directory Audit (AZURE_AD_AUDIT)
  • Check Point (CHECKPOINT_FIREWALL)
  • Chronicle SOAR Audit (CHRONICLE_SOAR_AUDIT)
  • Cisco Internetwork Operating System (CISCO_IOS)
  • Cisco Meraki (CISCO_MERAKI)
  • Cisco Web Services Manager (CISCO_WSM)
  • Cloud Audit Logs (N/A)
  • Cloudflare (CLOUDFLARE)
  • CrowdStrike Falcon (CS_EDR)
  • ESET Threat Intelligence (ESET_IOC)
  • GitHub (GITHUB)
  • Gitlab (GITLAB)
  • Infoblox DNS (INFOBLOX_DNS)
  • JumpCloud Directory Insights (JUMPCLOUD_DIRECTORY_INSIGHTS)
  • Kolide Endpoint Security (KOLIDE)
  • McAfee ePolicy Orchestrator (MCAFEE_EPO)
  • Microsoft Azure Activity (AZURE_ACTIVITY)
  • Microsoft Azure Resource (AZURE_RESOURCE_LOGS)
  • Microsoft Defender for Endpoint (MICROSOFT_DEFENDER_ENDPOINT)
  • Microsoft SQL Server (MICROSOFT_SQL)
  • Netskope Web Proxy (NETSKOPE_WEBPROXY)
  • OpenSSH (OPENSSH)
  • Palo Alto Cortex XDR Alerts (CORTEX_XDR)
  • Silverfort Authentication Platform (SILVERFORT)
  • Vectra Stream (VECTRA_STREAM)
  • VMware ESXi (VMWARE_ESX)
  • VMware NSX (VMWARE_NSX)
  • Windows Applocker (WINDOWS_APPLOCKER)
  • Windows Defender ATP (WINDOWS_DEFENDER_ATP)
  • Windows DNS (WINDOWS_DNS)
  • Windows Event (WINEVTLOG)
  • Windows Event (XML) (WINEVTLOG_XML)
  • Windows Hyper-V (WINDOWS_HYPERV)
  • Workspace ChromeOS Devices (WORKSPACE_CHROMEOS)
  • Zscaler (ZSCALER_WEBPROXY)
  • ZScaler DNS (ZSCALER_DNS)

The following log types, without a default parser, were added. Each is listed by product name and log_type value, if applicable.

  • ADVA Fiber Service Platform (ADVA_FSP)
  • Bluecat Address Manager (BLUECAT_AM)
  • Fortinet Switch (FORTINET_SWITCH)
  • GCP Google Kubernetes Engine Context (GCP_KUBERNETES_CONTEXT)
  • Kion (KION)
  • Kiteworks (KITEWORKS)
  • Nokia Router (NOKIA_ROUTER)
  • Ntopng (NTOPNG)
  • Opnsense (OPNSENSE)
  • Oracle HCM Human resources platform solution (ORACLE_HCM)
  • MS Powershell Transcript (POWERSHELL_TRANSCRIPT)
  • RAD ETX (RAD_ETX)
  • Spamhaus (SPAMHAUS)
  • UpGuard (UPGUARD)
  • Vsftpd (VSFTPD)

For a list of supported log types and details about default parser changes, see Supported log types and default parsers.

October 16, 2023

The following changes are available in the Unified Data Model.

  • New enum fields were added: SecurityResult.IoCStatsType and SecurityResult.VerdictType.
  • A new field was added to EntityMetadata: feed.
  • A new field was added to Network: ip_subnet_range.
  • New fields were added to SecurityResult: last_updated_time and verdict_info.
  • A new field was added to Label: rbac_enabled.
  • A new field was added to SecurityResult.Association: region_code.
  • New fields were added to User: last_login_time, last_password_change_time, password_expiration_time, account_expiration_time, account_lockout_time, and last_bad_password_attempt_time.
  • A new value was added to the Network.ApplicationProtocol enum: GRPC.
  • The following new values were added to the Resource.ResourceType enum:

    • POD
    • CONTAINER
    • FUNCTION
    • RUNTIME
    • IP_ADDRESS
    • DISK
    • VOLUME
    • IMAGE
    • SNAPSHOT
    • REPOSITORY
    • CREDENTIAL
    • LOAD_BALANCER
    • GATEWAY
    • SUBNET

For a list of all fields in the Unified Data Model, and their descriptions, see the Unified Data Model field list.

October 10, 2023

While creating a custom parser, you can use the preview option to view the UDM output. In the preview, you can use the statedump filter plugin to validate the internal state of a parser. For more information, see Validate data using statedump plugin.

October 05, 2023

The following supported default parsers have changed. Each is listed by product name and log_type value, if applicable.

  • AWS Cloudtrail (AWS_CLOUDTRAIL)
  • Azion (AZION)
  • Azure AD Organizational Context (AZURE_AD_CONTEXT)
  • Blue Coat Proxy (BLUECOAT_WEBPROXY)
  • Cisco ACS (CISCO_ACS)
  • Cisco FireSIGHT Management Center (CISCO_FIRESIGHT)
  • Cisco ISE (CISCO_ISE)
  • Cisco Umbrella DNS (UMBRELLA_DNS)
  • Cloud Intrusion Detection System (GCP_IDS)
  • Cloudflare (CLOUDFLARE)
  • Compute Context (N/A)
  • Corelight (CORELIGHT)
  • Darktrace (DARKTRACE)
  • F5 ASM (F5_ASM)
  • FireEye (FIREEYE_ALERT)
  • HAProxy (HAPROXY)
  • Hashicorp Vault (HASHICORP)
  • HP Procurve Switch (HP_PROCURVE)
  • IBM Security Verify SaaS (IBM_SECURITY_VERIFY_SAAS)
  • Imperva (IMPERVA_WAF)
  • Ionix (IONIX)
  • Microsoft Defender for Endpoint (MICROSOFT_DEFENDER_ENDPOINT)
  • MISP Threat Intelligence (MISP_IOC)
  • Office 365 (OFFICE_365)
  • Oracle Cloud Infrastructure Audit Logs (OCI_AUDIT)
  • Sendmail (SENDMAIL)
  • Tanium Audit (TANIUM_AUDIT)
  • Tanium Stream (TANIUM_TH)
  • Thycotic (THYCOTIC)
  • Unix system (NIX_SYSTEM)
  • VMware ESXi (VMWARE_ESX)
  • VMware NSX (VMWARE_NSX)
  • VMware vCenter (VMWARE_VCENTER)
  • WatchGuard (WATCHGUARD)
  • Windows DNS (WINDOWS_DNS)
  • Windows Event (WINEVTLOG)
  • Workspace Activities (WORKSPACE_ACTIVITY)
  • Workspace Alerts (WORKSPACE_ALERTS)
  • Zeek JSON (BRO_JSON)
  • Zscaler CASB (ZSCALER_CASB)

The following log types, without a default parser, were added. Each is listed by product name and log_type value, if applicable.

  • AWS_EMR (AWS_EMR)
  • Azure Application Gateway (AZURE_GATEWAY)
  • CloudBolt (CLOUDBOLT)
  • DNSFilter (DNSFILTER)
  • GitGuardian Enterprise (GITGUARDIAN_ENTERPRISE)
  • GoAnywhere MFT (GOANYWHERE_MFT)
  • IBM Security Identity Manager (IBM_SIM)
  • Jamf Pro MDM (JAMF_PRO_MDM)
  • MultiPay (MULTIPAY)
  • Palo Alto Networks IoT Security (PAN_IOT)
  • Raritan Dominion SX II (RARITAN_DOMINION)

For a list of supported log types and details about default parser changes, see Supported log types and default parsers.

October 04, 2023

Chronicle Curated Detections has been enhanced with new detection content for Google Cloud threats. These new rule sets help identify reconnaissance and exploitation behavior from open source Kubernetes tools.

The submit_parser command now has an option to skip validation if no logs are found. For more information, see the Chronicle CLI user guide.

October 03, 2023

The Chronicle SIEM user interface has a new top-level navigation to help you access the most commonly used Chronicle SIEM features. It works much the same as the navigation for Chronicle Security Operations. The new navigation menu expands from the left side of the screen, replacing the 9-dot icon at the top right. It is designed to make it easier to find information and resources and to help you work more efficiently. The Chronicle homepage can be accessed by clicking the Chronicle logo at the top left of the page. Reference lists can now be found within the Search page or the Rules Editor page.

September 20, 2023

The following supported default parsers have changed. Each is listed by product name and log_type value, if applicable.

  • Akamai Cloud Monitor (AKAMAI_CLOUD_MONITOR)
  • AWS Cloudtrail (AWS_CLOUDTRAIL)
  • AWS WAF (AWS_WAF)
  • BIND (BIND_DNS)
  • Cisco Email Security (CISCO_EMAIL_SECURITY)
  • Cisco Firepower NGFW (CISCO_FIREPOWER_FIREWALL)
  • Cisco Umbrella Web Proxy (UMBRELLA_WEBPROXY)
  • Cloud DNS (N/A)
  • Cloud SQL (GCP_CLOUDSQL)
  • CSV Custom IOC (CSV_CUSTOM_IOC)
  • Desynova Contido (DESYNOVA_CONTIDO)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • F5 Advanced Firewall Management (F5_AFM)
  • Firewall Rule Logging (N/A)
  • FortiMail Email Security (FORTINET_FORTIMAIL)
  • GCP_KUBERNETES_CONTEXT (GCP_KUBERNETES_CONTEXT)
  • Guardicore Centra (GUARDICORE_CENTRA)
  • IBM Security Access Manager (IBM_SAM)
  • Jamf Protect Telemetry (JAMF_TELEMETRY)
  • Linux Auditing System (AuditD) (AUDITD)
  • Microsoft Azure Activity (AZURE_ACTIVITY)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • Microsoft Powershell (POWERSHELL)
  • Netskope Web Proxy (NETSKOPE_WEBPROXY)
  • Office 365 (OFFICE_365)
  • Oracle Unified Directory (ORACLE_OUD)
  • Palo Alto Networks Firewall (PAN_FIREWALL)
  • SecureLink (SECURELINK)
  • Signal Sciences WAF (SIGNAL_SCIENCES_WAF)
  • Skybox Firewall Assurance (SKYBOX_FIREWALL_ASSURANCE)
  • SOTI MobiControl (SOTI_MOBICONTROL)
  • Stealthbits PAM (STEALTHBITS_PAM)
  • Thinkst Canary (THINKST_CANARY)
  • Unix system (NIX_SYSTEM)
  • Vectra Stream (VECTRA_STREAM)
  • VMware NSX (VMWARE_NSX)
  • VMware Tanzu Kubernetes Grid (VMWARE_TANZU)
  • Windows Defender ATP (WINDOWS_DEFENDER_ATP)
  • Windows Event (XML) (WINEVTLOG_XML)
  • Workspace Activities (WORKSPACE_ACTIVITY)
  • Zscaler (ZSCALER_WEBPROXY)
  • Zscaler CASB (ZSCALER_CASB)
  • ZScaler NGFW (ZSCALER_FIREWALL)

For details about changes in each parser, see Supported default parsers.

September 19, 2023

Chronicle feed management contains the following changes for the Google Cloud Storage source type:

  • To create a new Google Cloud Storage feed, you must use the new service account. You are no longer required to use the following Chronicle global service account: 8911409095528497-0-account@partnercontent.gserviceaccount.com. The Chronicle global service account continues to be in use for existing Google Cloud Storage feeds.
  • In the feed management API, the fetchFeedServiceAccount method has been added to get a Chronicle service account, which you must use when you create a new Google Cloud Storage feed.
  • In the feed management UI, the new field Get service account has been added to get a Chronicle service account, which you must use when you create a new Google Cloud Storage feed.

Chronicle recently disclosed a security vulnerability. For more information, see the GCP-2023-028 security bulletin.

September 14, 2023

You can now change the type of a Chronicle reference list. For more details, see reference lists.

You can now create and manage forwarder configurations using the Chronicle user interface and also through the Chronicle Forwarder Management API.

Chronicle can now directly ingest the following log types from Google Cloud. Each is listed by product name and log_type value:

  • Cloud Intrusion Detection System (GCP_IDS)
  • Cloud Load Balancing (GCP_LOADBALANCING)
  • Cloud SQL (GCP_CLOUDSQL)
  • Windows Event logs (WINEVTLOG)
  • Linux Sysmon (LINUX_SYSMON)
  • Zeek (BRO_JSON)
  • Google Kubernetes Engine (KUBERNETES_NODE)
  • Audit Daemon (auditd) (AUDITD)
  • Apigee (GCP_APIGEE_X)

For more information, see Ingest Google Cloud Data to Chronicle.

September 06, 2023

The following supported default parsers have changed. Each is listed by product name and log_type value, if applicable.

  • Akamai Enterprise Application Access (AKAMAI_EAA)
  • AWS Cloudtrail (AWS_CLOUDTRAIL)
  • AWS CloudWatch (AWS_CLOUDWATCH)
  • Chrome Management (N/A)
  • Cisco ASA (CISCO_ASA_FIREWALL)
  • Cisco Email Security (CISCO_EMAIL_SECURITY)
  • Cloud Audit Logs (N/A)
  • Cloudflare WAF (CLOUDFLARE_WAF)
  • Darktrace (DARKTRACE)
  • Desynova Contido (DESYNOVA_CONTIDO)
  • Duo Telephony Logs (DUO_TELEPHONY)
  • Elastic Audit Beats (ELASTIC_AUDITBEAT)
  • F5 BIGIP LTM (F5_BIGIP_LTM)
  • Fidelis Network (FIDELIS_NETWORK)
  • Gitlab (GITLAB)
  • Imperva FlexProtect (IMPERVA_FLEXPROTECT)
  • Island Browser logs (ISLAND_BROWSER)
  • Juniper (JUNIPER_FIREWALL)
  • Microsoft Azure Resource (AZURE_RESOURCE_LOGS)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • Microsoft Sentinel (MICROSOFT_SENTINEL)
  • Netscout OCI (NETSCOUT_OCI)
  • Netskope Web Proxy (NETSKOPE_WEBPROXY)
  • Office 365 (OFFICE_365)
  • OpenSSH (OPENSSH)
  • Palo Alto Networks Firewall (PAN_FIREWALL)
  • ProofPoint Secure Email Relay (PROOFPOINT_SER)
  • SentinelOne Deep Visibility (SENTINEL_DV)
  • SentinelOne EDR (SENTINEL_EDR)
  • Suricata IDS (SURICATA_IDS)
  • Symantec DLP (SYMANTEC_DLP)
  • Windows Defender ATP (WINDOWS_DEFENDER_ATP)
  • Windows Event (WINEVTLOG)
  • Windows Event (XML) (WINEVTLOG_XML)
  • Workspace Activities (WORKSPACE_ACTIVITY)
  • Workspace Alerts (WORKSPACE_ALERTS)
  • Workspace Users (WORKSPACE_USERS)
  • Zscaler (ZSCALER_WEBPROXY)

For details about changes in each parser, see Supported default parsers.

August 28, 2023

You can now use Cloud Monitoring to customize and receive notifications about ingestion health metrics. For more information, see Ingestion notifications for health metrics.

August 24, 2023

Chronicle has updated the rules engine's YARA-L 2.0 language compiler to report warnings. Warnings flag rules that are syntactically valid but may result in unexpected behavior. You can view and expand warnings in the Rules Editor the same way you view errors. The following warnings are currently supported:

August 23, 2023

The following supported default parsers have changed. Each is listed by product name and log_type value, if applicable.

  • Apigee (GCP_APIGEE_X)
  • AppOmni (APPOMNI)
  • Attivo Networks (ATTIVO)
  • AWS Cloudtrail (AWS_CLOUDTRAIL)
  • AWS CloudWatch (AWS_CLOUDWATCH)
  • AWS GuardDuty (GUARDDUTY)
  • AWS WAF (AWS_WAF)
  • Blue Coat Proxy (BLUECOAT_WEBPROXY)
  • Cisco Internetwork Operating System (CISCO_IOS)
  • Cisco NX-OS (CISCO_NX_OS)
  • Cisco Umbrella Web Proxy (UMBRELLA_WEBPROXY)
  • CrowdStrike Falcon (CS_EDR)
  • Crowdstrike IOC (CROWDSTRIKE_IOC)
  • CyberArk Endpoint Privilege Manager (EPM) (CYBERARK_EPM)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • F5 Advanced Firewall Management (F5_AFM)
  • GMAIL Logs (GMAIL_LOGS)
  • iBoss Proxy (IBOSS_WEBPROXY)
  • Ipswitch MOVEit Transfer (IPSWITCH_MOVEIT_TRANSFER)
  • Juniper Junos (JUNIPER_JUNOS)
  • Kubernetes Audit (KUBERNETES_AUDIT)
  • Kubernetes Node (KUBERNETES_NODE)
  • Microsoft AD FS (ADFS)
  • Microsoft Defender For Cloud (MICROSOFT_DEFENDER_CLOUD_ALERTS)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • Microsoft SQL Server (MICROSOFT_SQL)
  • MISP Threat Intelligence (MISP_IOC)
  • Netskope Web Proxy (NETSKOPE_WEBPROXY)
  • Okta User Context (OKTA_USER_CONTEXT)
  • Palo Alto Prisma Cloud Alert payload (PAN_PRISMA_CA)
  • Peplink Firewall (PEPLINK_FW)
  • Pulse Secure (PULSE_SECURE_VPN)
  • Qualys Virtual Scanner (QUALYS_VIRTUAL_SCANNER)
  • SecureLink (SECURELINK)
  • Security Command Center Threat (N/A)
  • Sentinelone Alerts (SENTINELONE_ALERT)
  • Suricata IDS (SURICATA_IDS)
  • Symantec DLP (SYMANTEC_DLP)
  • Unix system (NIX_SYSTEM)
  • Windows DNS (WINDOWS_DNS)
  • Windows Event (WINEVTLOG)
  • Windows Event (XML) (WINEVTLOG_XML)
  • Workspace Activities (WORKSPACE_ACTIVITY)
  • Zimperium (ZIMPERIUM)
  • Zscaler Internet Access Audit Logs (ZSCALER_INTERNET_ACCESS)

For details about changes in each parser, see Supported default parsers.

August 16, 2023

Chronicle has updated Rules Engine's YARA-L 2.0 language to support float literals. For more information, see Literals.

Enhancements to strings.concat and strings.coalesce

August 14, 2023

Added a new argument get_validation_report to fetch the validation report for a parser or a parser extension. For more information, see Chronicle CLI user guide.

August 10, 2023

UDM Search includes a new feature, called UDM Lookup, that enables you to quickly find a UDM field if you do not know which to include in a UDM Search query. You can search for a field that contains a text string in the name or that stores a specific string value. For more information, see Find a UDM field for search query.

When viewing an event using Event Viewer, each UDM field is labeled with an icon (U or E) that identifies whether the field stores enriched or unenriched data. For more information, see View events in the Event Viewer.

UDM Search behavior has been enhanced. When no search results are returned by a query, the page displays empty panels (Events, Quick Filters, Alerts, etc.) with messages indicating that nothing was found.

August 09, 2023

The following supported default parsers have changed. Each is listed by product name and log_type value, if applicable.

  • Apache (APACHE)
  • AWS Cloudtrail (AWS_CLOUDTRAIL)
  • AWS GuardDuty (GUARDDUTY)
  • Azure AD Directory Audit (AZURE_AD_AUDIT)
  • Cambium Networks (CAMBIUM_NETWORKS)
  • Cisco ASA (CISCO_ASA_FIREWALL)
  • Cisco Firepower NGFW (CISCO_FIREPOWER_FIREWALL)
  • Cisco ISE (CISCO_ISE)
  • CrowdStrike Falcon (CS_EDR)
  • Department of Homeland Security (DHS_IOC)
  • Duo Auth (DUO_AUTH)
  • F5 ASM (F5_ASM)
  • Fortinet FortiEDR (FORTINET_FORTIEDR)
  • GitHub (GITHUB)
  • Imperva (IMPERVA_WAF)
  • Juniper (JUNIPER_FIREWALL)
  • Menlo Security (MENLO_SECURITY)
  • Microsoft AD (WINDOWS_AD)
  • Microsoft Azure Resource (AZURE_RESOURCE_LOGS)
  • Microsoft Defender for Endpoint (MICROSOFT_DEFENDER_ENDPOINT)
  • Neosec (NEOSEC)
  • Net Suite (NET_SUITE)
  • Office 365 (OFFICE_365)
  • Oracle Unified Directory (ORACLE_OUD)
  • Palo Alto Panorama (PAN_PANORAMA)
  • Proofpoint Observeit (OBSERVEIT)
  • Qualys Asset Context (QUALYS_ASSET_CONTEXT)
  • Qualys Virtual Scanner (QUALYS_VIRTUAL_SCANNER)
  • SentinelOne Deep Visibility (SENTINEL_DV)
  • Tanium Threat Response (TANIUM_THREAT_RESPONSE)
  • Thinkst Canary (THINKST_CANARY)
  • TrendMicro Web Proxy (TRENDMICRO_WEBPROXY)
  • Vectra Stream (VECTRA_STREAM)
  • VMware Workspace ONE (VMWARE_WORKSPACE_ONE)
  • Windows Event (WINEVTLOG)
  • Workspace Activities (WORKSPACE_ACTIVITY)

For details about changes in each parser, see Supported default parsers.

July 27, 2023

Direct Chronicle customers will begin to see the new self-service parser management feature enabled in their Chronicle instance. This feature allows you to create and customize parsers. After the feature is enabled, you will also see pre-release versions of default parsers listed on the Parsers page before they are released. The pre-release versions are identified as Pending updates.

For more information, see Overview of log parsing and Manage prebuilt and custom parsers.

July 26, 2023

The following supported default parsers have changed. Each is listed by product name and log_type value, if applicable.

  • Attivo Networks (ATTIVO)
  • AWS Cloudtrail (AWS_CLOUDTRAIL)
  • AWS S3 Server Access (AWS_S3_SERVER_ACCESS)
  • Azure AD (AZURE_AD)
  • Azure AD Directory Audit (AZURE_AD_AUDIT)
  • Azure WAF (AZURE_WAF)
  • Barracuda WAF (BARRACUDA_WAF)
  • Barracuda Web Filter (BARRACUDA_WEBFILTER)
  • CA Access Control (CA_ACCESS_CONTROL)
  • Carbon Black (CB_EDR)
  • Chrome Management (N/A)
  • Cisco ISE (CISCO_ISE)
  • Cisco Meraki (CISCO_MERAKI)
  • Citrix Netscaler (CITRIX_NETSCALER)
  • Cloud Audit Logs (N/A)
  • Cloud Functions Context (GCP_CLOUD_FUNCTIONS_CONTEXT)
  • Cloud SQL Context (GCP_SQL_CONTEXT)
  • CrowdStrike Detection Monitoring (CS_DETECTS)
  • Darktrace (DARKTRACE)
  • Datadog (DATADOG)
  • Dell EMC Isilon NAS (DELL_EMC_NAS)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • F5 BIGIP LTM (F5_BIGIP_LTM)
  • FortiGate (FORTINET_FIREWALL)
  • Fortinet FortiAnalyzer (FORTINET_FORTIANALYZER)
  • Google Cloud Identity Context (CLOUD_IDENTITY_CONTEXT)
  • IAM Context (N/A)
  • IBM z/OS (IBM_ZOS)
  • Imperva Advanced Bot Protection (IMPERVA_ABP)
  • Imperva Database (IMPERVA_DB)
  • Ipswitch MOVEit Transfer (IPSWITCH_MOVEIT_TRANSFER)
  • macOS Endpoint Security (MACOS_ENDPOINT_SECURITY)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • MISP Threat Intelligence (MISP_IOC)
  • Netskope (NETSKOPE_ALERT)
  • Office 365 (OFFICE_365)
  • Okta User Context (OKTA_USER_CONTEXT)
  • Open LDAP (OPENLDAP)
  • Proofpoint Observeit (OBSERVEIT)
  • Qualys Asset Context (QUALYS_ASSET_CONTEXT)
  • Resource Manager Context (GCP_RESOURCE_MANAGER_CONTEXT)
  • Security Command Center Threat (N/A)
  • Sentinelone Alerts (SENTINELONE_ALERT)
  • Tanium Threat Response (TANIUM_THREAT_RESPONSE)
  • TrendMicro Web Proxy (TRENDMICRO_WEBPROXY)
  • Vectra Stream (VECTRA_STREAM)
  • VMware ESXi (VMWARE_ESX)
  • Wazuh (WAZUH)
  • Windows Event (XML) (WINEVTLOG_XML)
  • Workspace Activities (WORKSPACE_ACTIVITY)
  • Workspace Users (WORKSPACE_USERS)

For details about changes in each parser, see Supported default parsers.

July 21, 2023

Chronicle is now supported on the Mozilla Firefox browser. When running Chronicle, be sure to use the latest version of Firefox.

July 12, 2023

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • Absolute Mobile Device Management (ABSOLUTE)
  • AWS Cloudtrail (AWS_CLOUDTRAIL)
  • AWS CloudWatch (AWS_CLOUDWATCH)
  • BIND (BIND_DNS)
  • Check Point (CHECKPOINT_FIREWALL)
  • Chrome Management (N/A)
  • Cisco Meraki (CISCO_MERAKI)
  • Cloud Audit Logs (N/A)
  • Cloud Load Balancing (GCP_LOADBALANCING)
  • Cloudflare Audit (CLOUDFLARE_AUDIT)
  • F5 ASM (F5_ASM)
  • Fortinet FortiEDR (FORTINET_FORTIEDR)
  • IBM Security Verify SaaS (IBM_SECURITY_VERIFY_SAAS)
  • IBM Security Verify SaaS (IBM_SECURITY_VERIFY_SAAS)
  • Imperva FlexProtect (IMPERVA_FLEXPROTECT)
  • Jamf Protect Telemetry (JAMF_TELEMETRY)
  • Juniper Software Defined Wide Area Network (JUNIPER_SDWAN)
  • Microsoft AD (WINDOWS_AD)
  • Microsoft Azure Resource (AZURE_RESOURCE_LOGS)
  • Microsoft CASB (MICROSOFT_CASB)
  • Microsoft Powershell (POWERSHELL)
  • Microsoft SQL Server (MICROSOFT_SQL)
  • MISP Threat Intelligence (MISP_IOC)
  • Netskope (NETSKOPE_ALERT)
  • Okta (OKTA)
  • SecureAuth (SECUREAUTH_SSO)
  • Security Command Center Threat (N/A)
  • SentinelOne EDR (SENTINEL_EDR)
  • Sierra Wireless (SIERRA_WIRELESS)
  • Sourcefire (SOURCEFIRE_IDS)
  • Stormshield Firewall (STORMSHIELD_FIREWALL)
  • Versa Firewall (VERSA_FIREWALL)
  • Windows Event (WINEVTLOG)
  • Workspace Activities (WORKSPACE_ACTIVITY)

For details about changes in each parser, see Supported default parsers.

Chronicle Curated Detections has been enhanced with new detection content for Linux threats. These new rule sets help identify threats in Linux environments using AuditD and Unix System logs.

July 10, 2023

Chronicle provides multiple methods to define how data in original raw logs are parsed and normalized to a Unified Data Model (UDM) record. Using the Self Service Parser Management feature, customers can now create and customize parsers. For more information, see Overview of log parsing and Manage prebuilt and custom parsers.

July 06, 2023

When you create dashboards, you can make use of the following enhancements to UDM Events Explore:

  • Search and navigation improvements. When you navigate or search for events in UDM Events Explore, the results appear instantly and field names are easy to identify.
  • Improvements to field names and descriptions. The field names and path are now consistent with the pattern used in Detection Engine rules and UDM search. For example, the field name Udm Events Principal Hostname now appears as UDM principal.hostname as in documentation. Also, in addition to online help, in-context descriptions are available for UDM fields. For example, deprecated fields are indicated by the suffix [D] in the field name.
  • User experience improvements in UDM Events Explore. When you use UDM Events Explore, user experience is improved by removing unused and rarely used fields. Also, you can filter based on the grouped fields.
  • Field conversion improvements. Added fields that automatically handle conversion of formats. Here are some examples:
    • Enum fields also contain human readable values. For example, the values for the UDM.network.ip_protocol enum also appear as ICMP, TCP, and UDP instead of 1, 2, and 3.
    • Timestamp fields are available in multiple date formats. Previously, timestamp fields were available only in nano and second formats.
    • Location fields are parsed accurately and can be used in maps.
  • Report improvements. Made data in reports up-to-date by using the events table in BigQuery. Also, existing reports that previously used udm_events will use the events table.

July 05, 2023

Enhancements to outcome section in rules:

  • Outcome variables can be used to derive the value of another outcome variable.

  • Arithmetic expressions can include aggregations, unaggregated event fields, constants, and outcome variables as operands.

June 29, 2023

Google has added Israel (Tel Aviv) as a new region for Chronicle customers. Chronicle can now store customer data in this region. This also adds a new regional endpoint for Chronicle APIs at https://me-west1-backstory.googleapis.com.

June 28, 2023

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • AIX system (AIX_SYSTEM)
  • Auth0 (AUTH_ZERO)
  • AWS Cloudtrail (AWS_CLOUDTRAIL)
  • AWS GuardDuty (GUARDDUTY)
  • AWS Security Hub (AWS_SECURITY_HUB)
  • AWS Session Manager (AWS_SESSION_MANAGER)
  • Blue Coat Proxy (BLUECOAT_WEBPROXY)
  • Check Point (CHECKPOINT_FIREWALL)
  • Chrome Management (N/A)
  • Cisco Firepower NGFW (CISCO_FIREPOWER_FIREWALL)
  • Cisco Meraki (CISCO_MERAKI)
  • Cisco NX-OS (CISCO_NX_OS)
  • Cisco Stealthwatch (CISCO_STEALTHWATCH)
  • CrowdStrike Falcon (CS_EDR)
  • Digi modems (DIGI_MODEMS)
  • GitHub (GITHUB)
  • IBM Security Verify SaaS (IBM_SECURITY_VERIFY_SAAS)
  • Imperva (IMPERVA_WAF)
  • Infoblox DNS (INFOBLOX_DNS)
  • Jamf Protect Alerts (JAMF_PROTECT)
  • Jamf Protect Telemetry (JAMF_TELEMETRY)
  • Kisi Access Management (KISI)
  • Kubernetes Audit Azure (KUBERNETES_AUDIT_AZURE)
  • Kubernetes Node (KUBERNETES_NODE)
  • Linux Auditing System (AuditD) (AUDITD)
  • McAfee ePolicy Orchestrator (MCAFEE_EPO)
  • McAfee MVISION CASB (MCAFEE_MVISION_CASB)
  • McAfee Skyhigh CASB (MCAFEE_SKYHIGH_CASB)
  • McAfee Web Gateway (MCAFEE_WEBPROXY)
  • Microsoft AD (WINDOWS_AD)
  • Microsoft AD FS (ADFS)
  • Microsoft Defender for Endpoint (MICROSOFT_DEFENDER_ENDPOINT)
  • Microsoft Exchange (EXCHANGE_MAIL)
  • Netskope Web Proxy (NETSKOPE_WEBPROXY)
  • Office 365 (OFFICE_365)
  • Open Cybersecurity Schema Framework (OCSF) (OCSF)
  • Palo Alto Networks Firewall (PAN_FIREWALL)
  • Security Command Center Threat (N/A)
  • Static IP (ASSET_STATIC_IP)
  • Symantec Web Security Service (SYMANTEC_WSS)
  • ThreatLocker Platform (THREATLOCKER)
  • Tripwire (TRIPWIRE_FIM)
  • VMware NSX (VMWARE_NSX)
  • VMware vRealize Suite (VMWARE_VREALIZE)
  • Windows DNS (WINDOWS_DNS)
  • Windows Event (WINEVTLOG)
  • Zscaler (ZSCALER_WEBPROXY)

For details about changes in each parser, see Supported default parsers.

June 23, 2023

The Chronicle Data in BigQuery feature, including the export pipeline and events table, has been improved. Data for the events table is stored as parquet files in Google Cloud Storage which provides more flexibility for users who want to export data. See Chronicle documentation for more information about data export to BigQuery, the events table, and the BigQuery Access API.

June 22, 2023

You can now share a dashboard file between instances or within an instance between different users. The dashboard can be shared without manually creating copies.

The predefined reference lists for Curated Detections have been replaced by rule exclusions. You will see the following changes:

  • Reference lists are not available in the Cloud Threats and Windows Threats categories and are not displayed in the settings page for these rule sets.
  • Any category-specific reference lists that were currently empty have been deleted.
  • Any category-specific reference lists that were not empty have been migrated to an equivalent rule exclusion.

You can now use rule exclusions to tune the number of alerts returned by Curated Detections.

June 16, 2023

A new Google Cloud Threat Intelligence (GCTI) data source is available, called GCTI Remote Access Tools, that provides additional contextual information when investigating activity in your environment. This data source contains files that have frequently been used by malicious actors. For more information, see Data about remote access tools, and Query data about remote access tools.

June 14, 2023

IOC matching has been changed so that a domain match occurs only if the event timestamp lies within the active time range interval present in the threat intelligence feed. If a threat intelligence feed does not have an active time range interval, an IOC match is returned anytime the domain is identified in feed data. For information about IOC Domain matches, see View IOC matches.

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • Microsoft AD FS (ADFS)
  • Apache (APACHE)
  • Linux Auditing System (AuditD) (AUDITD)
  • AWS Cloudtrail (AWS_CLOUDTRAIL)
  • Azure Firewall (AZURE_FIREWALL)
  • Zeek JSON (BRO_JSON)
  • Cisco ASA (CISCO_ASA_FIREWALL)
  • Cisco Firepower NGFW (CISCO_FIREPOWER_FIREWALL)
  • Cisco ISE (CISCO_ISE)
  • Cisco Meraki (CISCO_MERAKI)
  • Cisco VCS Expressway (CISCO_VCS)
  • Corelight (CORELIGHT)
  • CrowdStrike Detection Monitoring (CS_DETECTS)
  • Digital Guardian DLP (DIGITALGUARDIAN_DLP)
  • F5 BIGIP Access Policy Manager (F5_BIGIP_APM)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • Fluentd Logs (FLUENTD)
  • Forcepoint Proxy (FORCEPOINT_WEBPROXY)
  • Forescout NAC (FORESCOUT_NAC)
  • FortiGate (FORTINET_FIREWALL)
  • Apigee (GCP_APIGEE_X)
  • Cloud SQL (GCP_CLOUDSQL)
  • GitHub (GITHUB)
  • GMAIL Logs (GMAIL_LOGS)
  • Apache Hadoop (HADOOP)
  • Imperva (IMPERVA_WAF)
  • Kemp Load Balancer (KEMP_LOADBALANCER)
  • McAfee Web Gateway (MCAFEE_WEBPROXY)
  • Microsoft Defender for Endpoint (MICROSOFT_DEFENDER_ENDPOINT)
  • Cloud Audit Logs (N/A)
  • Firewall Rule Logging (N/A)
  • Security Command Center Threat (N/A)
  • Netskope (NETSKOPE_ALERT)
  • Netskope Web Proxy (NETSKOPE_WEBPROXY)
  • Office 365 (OFFICE_365)
  • Okta (OKTA)
  • Okta User Context (OKTA_USER_CONTEXT)
  • 1Password (ONEPASSWORD)
  • OSQuery (OSQUERY_EDR)
  • OSSEC (OSSEC)
  • Palo Alto Networks Firewall (PAN_FIREWALL)
  • Proofpoint On Demand (PROOFPOINT_ON_DEMAND)
  • Proofpoint Web Browser Isolation(PROOFPOINT_WEB_BROWSER_ISOLATION)
  • Saviynt Enterprise Identity Cloud (SAVIYNT_EIP)
  • SentinelOne EDR (SENTINEL_EDR)
  • Sentinelone Alerts (SENTINELONE_ALERT)
  • Tripwire (TRIPWIRE_FIM)
  • Windows Defender ATP (WINDOWS_DEFENDER_ATP)
  • Windows Event (WINEVTLOG)
  • WordPress (WORDPRESS_CMS)
  • Workspace Activities (WORKSPACE_ACTIVITY)
  • ZScaler VPN (ZSCALER_VPN)

For details about changes in each parser, see Supported default parsers.

June 09, 2023

UDM Search

You can now search on fields of type bytes in UDM search. Chronicle uses base64 encoding for byte literals. Byte literals must be enclosed in double quotes prefixed with the letter b, as shown in the following examples:

  • network.dhcp.client_identifier = b"7Ixbub6A0KMvugAAAAA"

  • metadata.id = b"AAAAADg51kPYn7Ixbub6A0KMvugAAAAABQAAAAgAAAA="

June 06, 2023

The following changes are available in the Unified Data Model.

New fields were added to Entity, called risk_score and metric.

A new field was added to EntityMetadata, called event_metadata.

The following new types were added to Entity:

  • EntityRisk
  • Metric
  • RiskDelta
  • Metric.Measure

The following new types were added to Event:

  • AttackDetails
  • ExifInfo
  • FileMetadataCodesign
  • FileMetadataPE
  • FileMetadataSignatureInfo
  • PDFInfo
  • SignatureInfo
  • X509
  • AttackDetails.Tactic
  • AttackDetails.Technique
  • SecurityResult.Association
  • SecurityResult.Association.AssociationAlias
  • SecurityResult.Source
  • SecurityResult.ProviderMLVerdict
  • SecurityResult.AnalystVerdict
  • SecurityResult.Verdict

The following new enumerated types were added to Entity:

  • Metric.AggregateFunction
  • Metric.Dimension
  • Metric.MetricName
  • Relation.EntityLabel

The following new enumerated types were added to Event:

  • Process
  • TokenElevationType
  • SecurityResult.VerdictResponse
  • SecurityResult.Association.AssociationType

New field added to Relation, called entity_label.

New value added to EntityMetadata.EntityType, called METRIC.

New fields added to Event.Metadata called log_type, base_labels, enrichment_labels.

New fields added to Noun, called security_result and network.

New fields added to SecurityResult, called risk_score, attack_details, first_discovered_time, associations, campaigns, and verdicts.

New fields added to File, called pe_file, tags, last_analysis_time, embedded_urls, embedded_domains, embedded_ips, exif_info, signature_info, pdf_info.

New field added to Process, called integrity_level_rid and token_elevation_type.

New fields added to SignerInfo, called status, valid_usage, cert_issuer.

The Resource.id field was deprecated. Use resource.name or resource.product_object_id instead.

The following values were added to the EventTypes enumerated type:

  • DEVICE_FIRMWARE_UPDATE
  • DEVICE_CONFIG_UPDATE
  • DEVICE_PROGRAM_UPLOAD
  • DEVICE_PROGRAM_DOWNLOAD

The following additional values were added to the ApplicationProtocol enumerated type:

  • CIP
  • COTP
  • DNP3
  • DICOM
  • GOOSE
  • IEC104
  • MMS
  • PTP
  • SNMP
  • SV

New values added to the Network.IpProtocol enumerated type, called ICMP and SCTP.

For a list of all fields in the Unified Data Model, and their descriptions, see the Unified Data Model field list.

June 05, 2023

Chronicle now links to a customer-supplied Google Cloud Project to integrate more closely with Google Cloud services, such as Cloud IAM, Cloud Monitoring, and Cloud Audit Logs. Customers can now use Cloud IAM and workforce identity federation to authenticate using their existing identity provider.

Chronicle provides an onboarding and migration portal, available via Cloud Console, where new customers are able to provision and configure a new Chronicle SIEM instance, and existing customers can bind their current Chronicle SIEM instance to Google Cloud services.

For more information, see the following documentation:

June 02, 2023

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • Aruba (ARUBA_WIRELESS)
  • AWS Cloudtrail (AWS_CLOUDTRAIL)
  • Azure AD Directory Audit (AZURE_AD_AUDIT)
  • Cato Networks (CATO_NETWORKS)
  • Cisco ISE (CISCO_ISE)
  • Cisco Meraki (CISCO_MERAKI)
  • Cisco PIX Firewall (CISCO_PIX_FIREWALL)
  • Dope Security SWG (DOPE_SWG)
  • F5 BIGIP LTM (F5_BIGIP_LTM)
  • Falco IDS (FALCO_IDS)
  • Fidelis Network (FIDELIS_NETWORK)
  • ForgeRock OpenAM (OPENAM)
  • FortiGate (FORTINET_FIREWALL)
  • FortiMail Email Security (FORTINET_FORTIMAIL)
  • Fortinet Web Application Firewall (FORTINET_FORTIWEB)
  • GMAIL Logs (GMAIL_LOGS)
  • IBM Safenet (IBM_SAFENET)
  • IBM Security Access Manager (IBM_SAM)
  • IBM Security QRadar SIEM (IBM_QRADAR)
  • Microsoft Defender for Endpoint (MICROSOFT_DEFENDER_ENDPOINT)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • Mongo Database (MONGO_DB)
  • Office 365 (OFFICE_365)
  • Okta (OKTA)
  • Oracle Cloud Infrastructure Audit Logs (OCI_AUDIT)
  • Proofpoint Threat Response (PROOFPOINT_TRAP)
  • Pulse Secure (PULSE_SECURE_VPN)
  • Security Command Center Threat (N/A)
  • Sentinelone Alerts (SENTINELONE_ALERT)
  • SentinelOne EDR (SENTINEL_EDR)
  • ServiceNow CMDB (SERVICENOW_CMDB)
  • SonicWall (SONIC_FIREWALL)
  • Strong Swan VPN (STRONGSWAN_VPN)
  • ThreatLocker Platform (THREATLOCKER)
  • VMware vRealize Suite (VMWARE_VREALIZE)
  • VPC Flow Logs (GCP_VPC_FLOW)
  • WatchGuard (WATCHGUARD)
  • Windows DNS (WINDOWS_DNS)
  • Windows Event (WINEVTLOG)
  • Workspace Activities (WORKSPACE_ACTIVITY)

For details about changes in each parser, see Supported default parsers.

June 01, 2023

Updated content to reflect the new Alert view and Alert list. The following changes have been made to Alert view:

  • New Overview and Alert History tabs. The Overview section provides a snapshot of important alert information. This is separate from the History tab to clearly differentiate between alert investigation and audit area.
  • Detection widget now has a view other alerts from this rule button to get fast access to more alerts that came from this rule. Users can pivot to other alerts from this rule.
  • Updated information on how to close an alert and change alert status.
  • Updated information on how to adjust the time range.
  • Updated information on how to apply single and multiple filters.

The following changes have been made to Alert list:

  • Expanded columns to include Risk Score and Tags. This helps users to focus on and prioritize high-risk and critical security findings.
  • Ingestion Time and Last Modified were also added to Alert List.
  • Users can now customize columns in the Alert list, add or remove columns from the table.
  • Expanded filters to include OR and AND operators to allow more complex filtering.
  • Updated information on how to refresh Alert List.

These changes are documented in Investigate an alert and View Alerts and IOCs.

May 26, 2023

Starting June 7, 2023, Chronicle will no longer use reference lists to reduce the number of alerts generated by Curated Detection rule sets. The predefined reference lists for Curated Detections will be replaced by rule exclusions. You will see the following changes:

  • Reference lists will not be available in the Cloud Threats and Windows Threats categories and will not be displayed in the settings page for these rule sets.
  • Any category-specific reference lists that are currently empty will be deleted.
  • Any category-specific reference lists that are not empty will be automatically migrated to an equivalent rule exclusion.

No action is required. Rule set behavior should not be affected because category-specific reference lists will be replaced with rule exclusions.

Going forward, we recommend using rule exclusions to tune the number of alerts returned by Curated Detections.

The end of support process is gradual, and you may see some Curated Detection rule sets in a partial migration state before the process is complete. The process should complete by June 21, 2023.

May 25, 2023

On or after July 1, 2023, the existing udm_events table in Chronicle-managed BigQuery projects will be fully replaced with a new table named events. This new table is currently available for all customers. Chronicle will handle all changes in-product for this new table. Customers issuing queries against the udm_events table through the Cloud console or through the API should fully migrate queries to the new table by July 1 to avoid interruption.

May 24, 2023

Chronicle has updated Rules Engine's YARA-L 2.0 language to support more functionality for handling arrays.

  • A new arrays.length() function has been added. This function returns the number of elements in a repeated field. For more information, see YARA-L 2.0 language syntax.

  • You can now perform array indexing on repeated fields using bracket notation. This lets you access an element of a repeated field at a specific index. For more information, see YARA-L 2.0 language syntax.

Chronicle Curated Detections has been enhanced with the following additional detection content for Cloud threats. A new rule set was added, called Cloud SQL Ransom, that detects activity associated with exfiltration or ransom of data within Cloud SQL databases.

May 23, 2023

Single event rules meeting all of the following conditions have been reclassified as multiple event rules to increase detections:

  • Includes a match section.
  • Includes one or more conditions on outcome variables in the condition section.
  • Includes a simple existence condition on exactly one event variable in the condition section.

Affected rules will be automatically reprocessed to find any missed detections over the next 5 to 6 business days.

May 19, 2023

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • 1Password (ONEPASSWORD)
  • AMD Pensando DSS Firewall (AMD_DSS_FIREWALL)
  • Atlassian Confluence (ATLASSIAN_CONFLUENCE)
  • AWS Network Firewall (AWS_NETWORK_FIREWALL)
  • AWS Route 53 DNS (AWS_ROUTE_53)
  • AWS S3 Server Access (AWS_S3_SERVER_ACCESS)
  • Azure AD Directory Audit (AZURE_AD_AUDIT)
  • Bitdefender (BITDEFENDER)
  • Check Point (CHECKPOINT_FIREWALL)
  • Cisco ASA (CISCO_ASA_FIREWALL)
  • Cisco Firepower NGFW (CISCO_FIREPOWER_FIREWALL)
  • Cisco Firewall Services Module (CISCO_FWSM)
  • Cisco Router (CISCO_ROUTER)
  • Cisco Vision Dynamic Signage Director (CISCO_STADIUMVISION)
  • Cloud DNS (N/A)
  • CrowdStrike Falcon (CS_EDR)
  • Crowdstrike IOC (CROWDSTRIKE_IOC)
  • F5 Advanced Firewall Management (F5_AFM)
  • F5 ASM (F5_ASM)
  • F5 BIGIP LTM (F5_BIGIP_LTM)
  • FireEye HX (FIREEYE_HX)
  • ForgeRock OpenAM (OPENAM)
  • Fortinet FortiAnalyzer (FORTINET_FORTIANALYZER)
  • Fortinet FortiEDR (FORTINET_FORTIEDR)
  • HAProxy (HAPROXY)
  • Juniper (JUNIPER_FIREWALL)
  • Microsoft IIS (IIS)
  • Microsoft SQL Server (MICROSOFT_SQL)
  • Office 365 Message Trace (OFFICE_365_MESSAGETRACE)
  • Okta User Context (OKTA_USER_CONTEXT)
  • OpenSSH (OPENSSH)
  • Oracle Cloud Infrastructure VCN Flow Logs (OCI_FLOW)
  • Proofpoint Observeit (OBSERVEIT)
  • Rapid7 Insight (RAPID7_INSIGHT)
  • SAP Netweaver (SAP_NETWEAVER)
  • Security Command Center Threat (N/A)
  • Splunk Platform (SPLUNK)
  • Teleport Access Plane (TELEPORT_ACCESS_PLANE)
  • Thinkst Canary (THINKST_CANARY)
  • Trend Micro AV (TRENDMICRO_AV)
  • Trustwave webmarshal (WEBMARSHAL)
  • VMware AirWatch (AIRWATCH)
  • WatchGuard (WATCHGUARD)

For details about changes in each parser, see Supported default parsers.

May 10, 2023

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • Aruba EdgeConnect SD-WAN (ARUBA_EDGECONNECT_SDWAN)
  • AWS RDS (AWS_RDS)
  • Cloud Audit Logs (N/A)
  • Cloud DNS (N/A)
  • Cloud Run (N/A)
  • Cloud SQL (N/A)
  • Cofense (COFENSE_TRIAGE)
  • CoSoSys Protector (ENDPOINT_PROTECTOR_DLP)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • Microsoft Defender for Endpoint (MICROSOFT_DEFENDER_ENDPOINT)
  • pfSense (PFSENSE)
  • Qualys VM (QUALYS_VM)
  • SentinelOne EDR (SENTINEL_EDR)
  • VMware AirWatch (AIRWATCH)
  • VMware vRealize Suite (VMWARE_VREALIZE)
  • Windows Event (WINEVTLOG)

For details about changes in each parser, see Supported default parsers.

May 04, 2023

Chronicle made the following changes to the detection engine rules and YARA-L language:

  • Expanded support for arithmetic operations. You can now use multiplication and division in the events section and outcome section of rules. For more information, see Mathematical operations.

  • You can now join an event with an entity, and then check for absence of the event. For more information, see Event and placeholder conditionals.

  • Keywords, such as and, match, or condition in YARA-L 2.0 are now case-insensitive. This change does not affect function names, which are case sensitive. For a list of keywords, see Keywords.

  • A new coalesce() function has been added to the YARA-L syntax. This function returns the first non-empty string passed to it. For more information, see YARA-L 2.0 language syntax.

  • You can now use the nocase keyword when evaluating a reference list to perform case-insensitive matching for both String and Regex reference lists. For more information, see Reference lists syntax.

  • Reference list limits have increased. Chronicle increased the maximum number of lines for Regex type reference lists to 100 and for CIDR type reference lists to 150. In addition, Chronicle increased the maximum number of statements in a rule that evaluate a reference list from 2 to 4.

May 02, 2023

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • 1Password (ONEPASSWORD)
  • Akamai WAF (AKAMAI_WAF)
  • AppOmni (APPOMNI)
  • Arcsight CEF (ARCSIGHT_CEF)
  • Azure AD Directory Audit (AZURE_AD_AUDIT)
  • Blue Coat Proxy (BLUECOAT_WEBPROXY)
  • Check Point (CHECKPOINT_FIREWALL)
  • Cisco ASA (CISCO_ASA_FIREWALL)
  • Cisco Firepower NGFW (CISCO_FIREPOWER_FIREWALL)
  • Cisco ISE (CISCO_ISE)
  • Cisco Switch (CISCO_SWITCH)
  • Cloud Audit Logs (N/A)
  • Cloud Storage Context (N/A)
  • Cloudflare (CLOUDFLARE)
  • CrowdStrike Detection Monitoring (CS_DETECTS)
  • CrowdStrike Falcon (CS_EDR)
  • DigitalArts i-Filter (DIGITALARTS_IFILTER)
  • FireEye HX (FIREEYE_HX)
  • FortiGate (FORTINET_FIREWALL)
  • Hashicorp Vault (HASHICORP)
  • Imperva (IMPERVA_WAF)
  • Imperva SecureSphere Management (IMPERVA_SECURESPHERE)
  • Infoblox DHCP (INFOBLOX_DHCP)
  • JAMF CMDB (JAMF)
  • Linux Auditing System (AuditD) (AUDITD)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • NetApp SAN (NETAPP_SAN)
  • Office 365 (OFFICE_365)
  • Okta (OKTA)
  • Palo Alto Networks Firewall (PAN_FIREWALL)
  • Ping Federate (PING_FEDERATE)
  • Qualys Scan (QUALYS_SCAN)
  • Security Command Center Threat (N/A)
  • SentinelOne EDR (SENTINEL_EDR)
  • Snyk Group level audit Logs (SNYK_SDLC)
  • Symantec Endpoint Protection (SEP)
  • Unix system (NIX_SYSTEM)
  • Vectra Detect (VECTRA_DETECT)
  • Windows DNS (WINDOWS_DNS)
  • Windows Event (WINEVTLOG)
  • Workspace Activities (WORKSPACE_ACTIVITY)
  • Workspace Alerts (WORKSPACE_ALERTS)
  • Workspace ChromeOS Devices (WORKSPACE_CHROMEOS)
  • Workspace Groups (WORKSPACE_GROUPS)
  • Workspace Mobile Devices (WORKSPACE_MOBILE)
  • Workspace Privileges (WORKSPACE_PRIVILEGES)
  • Workspace Users (WORKSPACE_USERS)

For details about changes in each parser, see Supported default parsers.

May 01, 2023

UDM Search Pivot Table

The UDM Search Pivot Table enables you to further analyze your UDM search results, giving you the following capabilities:

  • Group search results by up to five UDM fields.
  • Perform aggregations (sum, count, count distinct, average, stddev, min, and max) on up to to five values within the UDM fields (for example, domains, users, and products).
  • Sort results of the pivot table (ascending, descending)

This feature is being enabled for global customers in a phased manner and is expected to fully roll out over the next month.

April 25, 2023

Chronicle forwarder executable for Windows is deprecated and is scheduled for shutdown on March 31, 2024. To install the Chronicle forwarder on Microsoft Windows, use Chronicle forwarder for Windows on Docker.

You can now install and configure Chronicle forwarder for Windows on Docker. This Docker installation provides better security through isolation and the container distribution mechanism can be private and separate for Google Cloud and customers. This release also includes the following updates:

  • The forwarder signing key will be rotated every 6 months for security. You must update the Chronicle forwarder for Windows on Docker image every 6 months.

  • The minimum batch size for forwarder is now increased to 200KB for better performance.

  • Data compression is now enabled by default. It reduces the network bandwidth consumption by 80%.

  • Hot config loading is now supported and applies configuration changes within 5 minutes without the need to restart the forwarder.

  • Automatic buffering handles spikes in incoming traffic by efficiently using available memory on the host system. This feature is optional.

April 21, 2023

The Chronicle forwarder for Linux has been enhanced with the following changes:

  • After you make a change to a configuration file, either <FORWARDER_NAME>.conf or <FORWARDER_NAME>_auth.conf, the change is automatically applied within 5 minutes. You no longer need to restart the container to apply the configuration changes. For information about changing configuration files, see Customize the configuration files.

  • You can now configure automatic memory buffering which is a dynamically shared buffer used by collectors on a system. You specify the target memory utilization as a percentage of system RAM. For more information, see Configure disk buffering.

  • The forwarder's minimum batch size increased to 200 KB for better performance.

  • Data compression is now enabled by default, which reduces network bandwidth consumption by 80%.

If you have not updated the Chronicle forwarder for Linux Docker image since April 1, 2023, you must update it before October 31, 2023. This ensures that the Forwarder Bundle continues to receive updates.

April 20, 2023

Chronicle enhanced the detection engine so that all rules have a value set to the $risk_score variable. With this change, rules that do not have a $risk_score variable defined in the outcome section will have one of the following default values set:

  • If the rule is configured to generate an alert, then $risk_score is set to 40.
  • If the rule is not configured to generate an alert, then $risk_score is set to 15.

This change applies to all existing rules and new rules that do not have a $risk_score variable defined. The change does not impact rules that define the $risk_score variable in the outcome section of the rule.

For more information about the $risk_score variable, see Outcome section syntax.

April 19, 2023

Chronicle released the following additional data enrichment and precomputed analytic capabilities that can provide additional context during an investigation:

  • Enriched entities with WHOIS data.
  • Enriched entities with VirusTotal relationship data.
  • Enriched events with VirusTotal file metadata.
  • Data from Google Cloud Threat Intelligence curated threat feeds.
  • Precomputed first-seen and last-seen occurrence for domains, IP addresses, and file hashes (SHA256, SHA1, MD5).
  • Precomputed first-seen occurrence for assets and users.

For more information, see the following documents:

April 14, 2023

UDM saved search

The UDM saved search options have been simplified and enhanced. From the UDM Search page, click Save to save your UDM search.

You can now specify placeholder variables in the format $<variable name> using the same format as is used for variables in YARA-L. If you add a variable to a UDM search, you must also include a prompt to help the user to understand what information they need to enter before they run the search. All variables must be populated with values prior to a search being run.

April 13, 2023

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • Akamai WAF (AKAMAI_WAF)
  • Area1 Security (AREA1)
  • Atlassian Confluence (ATLASSIAN_CONFLUENCE)
  • AWS VPC Flow (AWS_VPC_FLOW)
  • Cisco Firepower NGFW (CISCO_FIREPOWER_FIREWALL)
  • Cloud Audit Logs (N/A)
  • Cloud Intrusion Detection System (GCP_IDS)
  • Cloud Load Balancing (GCP_LOADBALANCING)
  • Cloud NAT (N/A)
  • Cloudflare (CLOUDFLARE)
  • F5 ASM (F5_ASM)
  • Security Command Center Threat (N/A)
  • GMAIL Logs (GMAIL_LOGS)
  • JumpCloud Directory Insights (JUMPCLOUD_DIRECTORY_INSIGHTS)
  • Kubernetes Node logs (KUBERNETES_NODE)
  • Linux Auditing System (AuditD) (AUDITD)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • Mimecast (MIMECAST_MAIL)
  • NetApp ONTAP (NETAPP_ONTAP)
  • Office 365 (OFFICE_365)
  • Okta (OKTA)
  • Ping Identity (PING)
  • SentinelOne Deep Visibility (SENTINEL_DV)
  • Sophos Firewall (Next Gen) (SOPHOS_FIREWALL)
  • Symantec Endpoint Protection (SEP)
  • Trustwave SEC MailMarshal (MAILMARSHAL)
  • Unix system (NIX_SYSTEM)

For details about changes in each parser, see Supported default parsers.

April 03, 2023

Google has added Australia (Sydney) as a new region for Chronicle customers. Chronicle can now store customer data in this region. This also adds a new regional endpoint for Chronicle APIs at https://australia-southeast1-backstory.googleapis.com/.

March 30, 2023

UDM Search - Grouped fields

Grouped fields are aliases for groups of related UDM fields. You can use them to query multiple UDM fields at the same time without typing each field individually. For example, you can use the IP address grouped field to search for an IP address across most of the common UDM IP address fields.

You can match a grouped field using a regular expression and using the nocase operator. Reference lists are supported. Grouped fields can be used in combination with regular UDM fields. Grouped fields also have a separate section in Quick Filters.

March 29, 2023

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • Area1 Security (AREA1)
  • AWS Security Hub (AWS_SECURITY_HUB)
  • Azure AD (AZURE_AD)
  • Carbon Black (CB_EDR)
  • Cisco ASA (CISCO_ASA_FIREWALL)
  • Cisco Switch (CISCO_SWITCH)
  • Cloud Audit Logs (N/A)
  • CrowdStrike Falcon (CS_EDR)
  • Darktrace (DARKTRACE)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • Google Chrome Browser Cloud Management (CBCM) (N/A)
  • Hashicorp Vault (HASHICORP)
  • Illumio Core (ILLUMIO_CORE)
  • Linux Auditing System (AuditD) (AUDITD)
  • ManageEngine ADAudit Plus (ADAUDIT_PLUS)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • Netskope (NETSKOPE_ALERT)
  • Office 365 (OFFICE_365)
  • Okta (OKTA)
  • Palo Alto Networks Firewall (PAN_FIREWALL)
  • Seqrite Endpoint Security (EPS) (SEQRITE_ENDPOINT)
  • STIX Threat Intelligence (STIX)
  • Trend Micro Vision One (TRENDMICRO_VISION_ONE)
  • Unix system (NIX_SYSTEM)
  • VMware vRealize Suite (VMWARE_VREALIZE)
  • Windows Event (WINEVTLOG)
  • Windows Event (XML) (WINEVTLOG_XML)
  • Workspace Alerts (WORKSPACE_ALERTS)
  • ZScaler NGFW (ZSCALER_FIREWALL)

For details about changes in each parser, see Supported default parsers.

March 23, 2023

The SentinelOne Alert feed has been enhanced to enable you to configure the feed to ingest both alerts and threats or only threats.

When the Is alert API subscribed checkbox is selected in the application, or when the isAlertApiSubscribed field is set to true in the API request, the feed will ingest both alerts and threats. When the checkbox is deselected, or the isAlertApiSubscribed field is set set to false in the API request, only threats are ingested. This configuration is available when creating a new feed. Existing feeds were enhanced in a previous release to ingest both alerts and threats.

Only configure the feed to ingest both alerts and threats if you have subscribed to alerts in SentinelOne. If you have not subscribed to alerts in SentinelOne, then configure the feed to ingest threats only.

March 15, 2023

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • BloxOne Threat Defense (BLOXONE)
  • Carbon Black (CB_EDR)
  • Cisco Firepower NGFW (CISCO_FIREPOWER_FIREWALL)
  • Cisco ISE (CISCO_ISE)
  • Cisco Meraki (CISCO_MERAKI)
  • CrowdStrike Falcon (CS_EDR)
  • Duo Administrator Logs (DUO_ADMIN)
  • Elastic Audit Beats (ELASTIC_AUDITBEAT)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • F5 BIGIP LTM (F5_BIGIP_LTM)
  • FortiGate (FORTINET_FIREWALL)
  • Imperva CEF (IMPERVA_CEF)
  • Infoblox (INFOBLOX)
  • JAMF CMDB (JAMF)
  • Juniper (JUNIPER_FIREWALL)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • Microsoft IIS (IIS)
  • Nyansa Events (NYANSA_EVENTS)
  • Office 365 (OFFICE_365)
  • Onfido (ONFIDO)
  • Palo Alto Networks Firewall (PAN_FIREWALL)
  • Samba SMBD (SMBD)
  • Sentinelone Alerts (SENTINELONE_ALERT)
  • SentinelOne EDR (SENTINEL_EDR)
  • SonicWall (SONIC_FIREWALL)
  • Symantec VIP Gateway (SYMANTEC_VIP)
  • Tanium Threat Response (TANIUM_THREAT_RESPONSE)
  • Unix system (NIX_SYSTEM)
  • VMware NSX (VMWARE_NSX)
  • Windows Defender ATP (WINDOWS_DEFENDER_ATP)
  • Workspace Activities (WORKSPACE_ACTIVITY)

For details about changes in each parser, see Supported default parsers.

March 10, 2023

The [all namespaces] menu item in Asset view will be removed on July 1, 2023. This change will not impact the ability to view and filter events assigned the default namespace, using the [untagged] menu item, or to view and filter events with custom namespace labels that were assigned to incoming logs.

March 09, 2023

The SentinelOne Alert feed has been enhanced to ingest both alerts and threats. No change is needed to the feed configuration. If data contains both alerts and threats, then both types of data will be ingested.

March 01, 2023

Schedule Chronicle dashboard reports

You can schedule the delivery of Chronicle dashboard reports over email for both the default dashboards and custom dashboards. In addition to setting the time interval, email address, and format to deliver the report, you can also set the pagination details and test the delivery of the report. For more information, see Schedule Chronicle dashboard reports.

Chronicle Feed Management enhanced the support for the Qualys VM log type to include Qualys VM Detections API. See the Feed Management documentation for information.

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • 1Password (ONEPASSWORD)
  • Airlock Digital Application Allowlisting (AIRLOCK_DIGITAL)
  • Apache (APACHE)
  • Atlassian Confluence (ATLASSIAN_CONFLUENCE)
  • AWS Cloudtrail (AWS_CLOUDTRAIL)
  • Azure AD Directory Audit (AZURE_AD_AUDIT)
  • Azure Cosmos DB (AZURE_COSMOS_DB)
  • Cisco Firepower NGFW (CISCO_FIREPOWER_FIREWALL)
  • Compute Engine (GCP_COMPUTE)
  • CrowdStrike Detection Monitoring (CS_DETECTS)
  • CrowdStrike Falcon (CS_EDR)
  • Cybereason EDR (CYBEREASON_EDR)
  • F5 BIGIP LTM (F5_BIGIP_LTM)
  • Forcepoint NGFW (FORCEPOINT_FIREWALL)
  • FortiGate (FORTINET_FIREWALL)
  • Google Chrome Browser Cloud Management (CBCM) (N/A)
  • iBoss Proxy (IBOSS_WEBPROXY)
  • JumpCloud Directory Insights (JUMPCLOUD_DIRECTORY_INSIGHTS)
  • Juniper Mist (JUNIPER_MIST)
  • Kubernetes Node logs (KUBERNETES_NODE)
  • Microsoft Azure Activity (AZURE_ACTIVITY)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • Okta (OKTA)
  • Okta Access Gateway (OKTA_ACCESS_GATEWAY)
  • Palo Alto Networks Firewall (PAN_FIREWALL)
  • pfSense (PFSENSE)
  • Salesforce (SALESFORCE)
  • Sentinelone Alerts (SENTINELONE_ALERT)
  • SentinelOne EDR (SENTINEL_EDR)
  • Signal Sciences WAF (SIGNAL_SCIENCES_WAF)
  • SonicWall (SONIC_FIREWALL)
  • Windows Event (WINEVTLOG)
  • Workspace Activities (WORKSPACE_ACTIVITY)
  • Yubico OTP (YUBICO_OTP)
  • Zscaler Private Access (ZSCALER_ZPA)

For details about changes in each parser, see Supported default parsers.

February 17, 2023

Search API

The query limit for the udmSearch method has been increased from 60 to 120 queries per hour (QPH). The maximum number of events which can be returned using the udmSearch method has been increased from 1,000 to 10,000.

UDM Search

You can now specify single-line comments and block comments in UDM search. You can also now use UDM search to find values of type float (floating point numbers) and bool (boolean).

February 15, 2023

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • 1Password (ONEPASSWORD)
  • Atlassian Jira (ATLASSIAN_JIRA)
  • AWS GuardDuty (GUARDDUTY)
  • Azure AD Directory Audit (AZURE_AD_AUDIT)
  • Azure AD Organizational Context (AZURE_AD_CONTEXT)
  • Carbon Black (CB_EDR)
  • Cisco Stealthwatch (CISCO_STEALTHWATCH)
  • Cisco WLC/WCS (CISCO_WIRELESS)
  • Cloudflare WAF (CLOUDFLARE_WAF)
  • CrowdStrike Detection Monitoring (CS_DETECTS)
  • CrowdStrike Falcon (CS_EDR)
  • Cybereason EDR (CYBEREASON_EDR)
  • DigitalArts i-Filter (DIGITALARTS_IFILTER)
  • F5 ASM (F5_ASM)
  • F5 BIGIP LTM (F5_BIGIP_LTM)
  • Google Chrome Browser Cloud Management (CBCM) (N/A)
  • Imperva (IMPERVA_WAF)
  • Imperva Database (IMPERVA_DB)
  • Ipswitch MOVEit Transfer (IPSWITCH_MOVEIT_TRANSFER)
  • Linux Auditing System (AuditD) (AUDITD)
  • Microsoft AD FS (ADFS)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • Mobileiron (MOBILEIRON)
  • Netskope Web Proxy (NETSKOPE_WEBPROXY)
  • Palo Alto Cortex XDR Events (PAN_CORTEX_XDR_EVENTS)
  • Palo Alto Networks Firewall (PAN_FIREWALL)
  • Samba SMBD (SMBD)
  • Sentinelone Alerts (SENTINELONE_ALERT)
  • SentinelOne Deep Visibility (SENTINEL_DV)
  • SentinelOne EDR (SENTINEL_EDR)
  • SonicWall (SONIC_FIREWALL)
  • Trend Micro AV (TRENDMICRO_AV)
  • VMware vCenter (VMWARE_VCENTER)
  • Windows DNS (WINDOWS_DNS)
  • Windows Event (WINEVTLOG)

For details about changes in each parser, see Supported default parsers.

February 09, 2023

Chronicle has released additional ingestion scripts, written in Python, that can be deployed as Cloud Functions. These scripts ingest data from the following log sources, listed by name and ingestion label:

  • Aruba Central (ARUBA_CENTRAL)
  • Azure Event Hub (configurable log type)
  • Cloud Storage (configurable log type)
  • Proofpoint (configurable log type)
  • Tenable.io (TENABLE_IO)
  • Trend Micro Cloud App Security (configurable log type)
  • Trend Micro Vision One audit logs (TREND_MICRO_VISION_AUDIT)

The scripts can be used as-is or as templates to customize and ingest logs from another product. They are located in the Chronicle GitHub repository. See Use ingestion scripts deployed as Cloud Functions for instructions about how to configure and deploy the scripts in your environment.

YARA-L outcomes

In the outcome section, you can now define up to 20 outcome variables, with arbitrary names. These outcomes will be stored in the detections generated by the rule. Each detection may have different values for the outcomes.

February 01, 2023

The Alerts in Search feature is the newest addition to the UDM Search capability. This new feature allows you to do the following:

  • View and investigate all alerts associated with the search query criteria
  • See which events are associated with one or more alerts
  • See details about alerts in Alert viewer and Alert details
  • Pivot to the new Alert view

This feature is being enabled for global customers in a phased manner and is expected to fully roll out over the next month.

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • 1Password (ONEPASSWORD)
  • Azure AD Organizational Context (AZURE_AD_CONTEXT)
  • Barracuda Email (BARRACUDA_EMAIL)
  • Carbon Black (CB_EDR)
  • Cisco Firepower NGFW (CISCO_FIREPOWER_FIREWALL)
  • Cisco Switch (CISCO_SWITCH)
  • Google Chrome Browser Cloud Management (CBCM) (N/A)
  • IBM Security Verify (IBM_SECURITY_VERIFY)
  • Imperva (IMPERVA_WAF)
  • Infoblox (INFOBLOX)
  • Infoblox DNS (INFOBLOX_DNS)
  • Linux Auditing System (AuditD) (AUDITD)
  • McAfee Web Gateway (MCAFEE_WEBPROXY)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • Microsoft SQL Server (MICROSOFT_SQL)
  • Nutanix Prism (NUTANIX_PRISM)
  • Office 365 (OFFICE_365)
  • Okera Dynamic Access Platform (OKERA_DAP)
  • Palo Alto Networks Firewall (PAN_FIREWALL)
  • Proofpoint Observeit (OBSERVEIT)
  • Qualys VM (QUALYS_VM)
  • Sentinelone Alerts (SENTINELONE_ALERT)
  • SentinelOne EDR (SENTINEL_EDR)
  • Symantec Endpoint Protection (SEP)
  • WatchGuard (WATCHGUARD)
  • Windows Event (WINEVTLOG)
  • Windows Event (XML) (WINEVTLOG_XML)
  • Windows Sysmon (WINDOWS_SYSMON)

For details about changes in each parser, see Supported default parsers.

January 31, 2023

Geolocation enrichment from an IP address

Chronicle provides geolocation data enrichment (GeoIP data) for external IP addresses to enable more powerful rule detections and greater context for investigations. Chronicle uses location data provided by Google to provide an approximate geographic location for an external IP address. For more information, see:

The Chronicle Curated Detections > Cloud Threats policy has been enhanced with the following changes:

  • Admin Action rule set: added a new exclusion list, called gcti__cld__admin_action__network_http_user_agent__exclusion_list that enables you to exclude events based on the HTTP User Agent string.
  • IAM Abuse rule set: added a new exclusion list, called, gcti__cld__iamabuse__network_http_user_agent__exclusion_list that enables you to exclude events based on the HTTP User Agent string.

January 30, 2023

The following changes are available in the Unified Data Model:

  • Added the following fields to the Software object:

    • Software.description
    • Software.vendor_name
  • Deprecated the Location.region_latitude and Location.region_longitude fields. Use the following Location fields instead:

    • Location.region_coordinates.latitude
    • Location.region_coordinates.longitude
  • Deprecated the Noun.ip_location field. Use Noun.ip_geo_artifact.location instead.

  • Added the following fields to the File object, File.stat_mode, File.stat_inode, File.stat_dev, File.stat_nlink, File.stat_flags.

For a list of all fields in the Unified Data Model, and their descriptions, see the Unified Data Model field list.

January 20, 2023

ListCuratedRules and ListCuratedRuleDetections

Two new methods are now available for the Detection Engine API. ListCuratedRules enables you to return a current list of all of the Chronicle rules with detections. ListCuratedRuleDetections enables you to return a list of the detections associated with a specified rule.

The following changes are available in the Unified Data Model:

For a list of all fields in the Unified Data Model, and their descriptions, see the Unified Data Model field list.

January 19, 2023

Chronicle has released a set of ingestion scripts, written in Python, that can be deployed as Cloud Functions. These scripts ingest data from the following log sources, listed by name and ingestion label:

  • Citrix audit logs (CITRIX_MONITOR)
  • Duo Admin (DUO_ADMIN)
  • One Login User Context (ONELOGIN_USER_CONTEXT)
  • MISP (MISP_IOC)
  • Citrix session metadata (CITRIX_SESSION_METADATA)
  • Slack Audit (SLACK_AUDIT)
  • Box (BOX)
  • OneLogin (ONELOGIN_SSO)
  • Google Cloud Pub/Sub
  • STIX/TAXII threat intelligence (STIX)

The scripts can be used as-is or as templates to customize and ingest logs from another product. They are located in the Chronicle GitHub repository. See Use ingestion scripts deployed as Cloud Functions for instructions about how to configure and deploy the scripts in your environment.

January 18, 2023

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • Atlassian Jira (ATLASSIAN_JIRA)
  • Azure AD (AZURE_AD)
  • CrowdStrike Falcon (CS_EDR)
  • ESET AV (ESET_AV)
  • FortiGate (FORTINET_FIREWALL)
  • GitHub (GITHUB)
  • Infoblox (INFOBLOX)
  • Juniper (JUNIPER_FIREWALL)
  • Juniper Junos (JUNIPER_JUNOS)
  • Kubernetes Node logs (KUBERNETES_NODE)
  • McAfee Web Gateway (MCAFEE_WEBPROXY)
  • Microsoft Defender for Endpoint (MICROSOFT_DEFENDER_ENDPOINT)
  • Netskope Web Proxy (NETSKOPE_WEBPROXY)
  • Office 365 (OFFICE_365)
  • Pulse Secure (PULSE_SECURE_VPN)
  • Ruckus Networks (RUCKUS_WIRELESS)
  • Sentinelone Alerts (SENTINELONE_ALERT)
  • SentinelOne EDR (SENTINEL_EDR)
  • Silverfort Authentication Platform (SILVERFORT)
  • VMware vCenter (VMWARE_VCENTER)
  • Windows Event (XML) (WINEVTLOG_XML)
  • Zscaler (ZSCALER_WEBPROXY)

For details about changes in each parser, see Supported default parsers.

January 13, 2023

Chronicle Curated Detections has been enhanced with the following additional detection content for Cloud threats. A new rule set was added, called Resource Masquerading, that detects Google Cloud resources created with names or characteristics of another resource or resource type. This could be used to mask malicious activity carried out by or within the resource, with the intent of appearing legitimate.

January 10, 2023

Multiple enhancements were made to the UDM Search capability, including the additions of search templates and shared searches. You can now do the following in UDM Search:

  • Use Chronicle-provided pre-made search templates in Quick Searches and Search Manager
  • Create, edit, and share searches in Search Manager (an enhancement to Saved Searches)
  • Use reference lists in UDM searches

January 06, 2023

Chronicle Curated Detections has been enhanced with the following additional detection content for Windows-based threats. A new rule set was added, called Anomalous PowerShell, that identifies PowerShell commands containing obfuscation techniques or other anomalous behavior.

January 04, 2023

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • AWS CloudWatch (AWS_CLOUDWATCH)
  • AWS Control Tower (AWS_CONTROL_TOWER)
  • AWS WAF (AWS_WAF)
  • Azure AD (AZURE_AD)
  • Azure AD Organizational Context (AZURE_AD_CONTEXT)
  • Barracuda Email (BARRACUDA_EMAIL)
  • Cisco ASA (CISCO_ASA_FIREWALL)
  • Cisco Email Security (CISCO_EMAIL_SECURITY)
  • Cisco ISE (CISCO_ISE)
  • Cisco Umbrella Web Proxy (UMBRELLA_WEBPROXY)
  • Citrix Monitor (CITRIX_MONITOR)
  • Cloud Audit Logs (N/A)
  • CrowdStrike Falcon (CS_EDR)
  • Digital Guardian EDR (DIGITALGUARDIAN_EDR)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • ExtraHop RevealX (EXTRAHOP)
  • ForgeRock OpenAM (OPENAM)
  • Google Chrome Browser Cloud Management (CBCM) (N/A)
  • Infoblox (INFOBLOX)
  • McAfee ePolicy Orchestrator (MCAFEE_EPO)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • Netscout Arbor Sightline (ARBOR_SIGHTLINE)
  • Office 365 (OFFICE_365)
  • Okta (OKTA)
  • Palo Alto Networks Firewall (PAN_FIREWALL)
  • Rapid7 Insight (RAPID7_INSIGHT)
  • Salesforce (SALESFORCE)
  • Sophos Intercept EDR (SOPHOS_EDR)
  • Splunk Platform (SPLUNK)
  • STIX Threat Intelligence (STIX)
  • Tanium Stream (TANIUM_TH)
  • tenable.io (TENABLE_IO)
  • ThreatLocker Platform (THREATLOCKER)
  • VMware AirWatch (AIRWATCH)
  • WatchGuard (WATCHGUARD)
  • Windows Event (XML) (WINEVTLOG_XML)
  • Windows Sysmon (WINDOWS_SYSMON)
  • Zscaler (ZSCALER_WEBPROXY)

For details about changes in each parser, see Supported default parsers.

December 16, 2022

You can now enable up to 500 active rules within your Chronicle account. Up to 75 of those can be multi-event rules. See Running a rule against live data for information on how to enable rules and Manage rules using Rules Editor for information on how to configure rules.

December 15, 2022

Starting December 15, 2022, you may not see data in your Chronicle instance that is older than the data retention period defined in your contract. For more information, see Data Retention.

December 12, 2022

New endpoint for UK

Chronicle has added a supported region for Chronicle customers in the UK, europe-west2.

December 08, 2022

The following changes were made to UDM Search. You can now do the following:

  • Use enhanced filtering to include Bottom 30 values in addition to Top 30 values for each UDM Field in search results
  • Use 'field[key] = value' exact match to search the 'additional' and 'labels' fields
  • Pin fields (using the push pin icon) in Quick Filter to save them as a favorite. They will appear at the top of the Quick Filters list
  • Save column layouts and load them
  • Escape special characters by using backslashes and double-quotes

December 07, 2022

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • Cisco Router (CISCO_ROUTER)
  • Digital Guardian DLP (DIGITALGUARDIAN_DLP)
  • Linux Auditing System (AuditD) (AUDITD)
  • Microsoft Azure Activity (AZURE_ACTIVITY)
  • Rubrik (RUBRIK)
  • Sentinelone Alerts (SENTINELONE_ALERT)
  • SentinelOne EDR (SENTINEL_EDR)
  • Sophos Firewall (Next Gen) (SOPHOS_FIREWALL)
  • STIX Threat Intelligence (STIX)
  • Thales Luna Hardware Security Module (THALES_LUNA_HSM)
  • Thinkst Canary (THINKST_CANARY)
  • Unix system (NIX_SYSTEM)
  • Workspace Activities (WORKSPACE_ACTIVITY)

For details about changes in each parser, see Supported default parsers.

November 30, 2022

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • Akamai WAF (AKAMAI_WAF)
  • AlgoSec Security Management (ALGOSEC)
  • Ansible AWX (ANSIBLE_AWX)
  • Arcsight CEF (ARCSIGHT_CEF)
  • AWS Cloudtrail (AWS_CLOUDTRAIL)
  • AWS Control Tower (AWS_CONTROL_TOWER)
  • AWS GuardDuty (GUARDDUTY)
  • Azure AD Directory Audit (AZURE_AD_AUDIT)
  • BIND (BIND_DNS)
  • Bluecat DDI (BLUECAT_DDI)
  • Carbon Black (CB_EDR)
  • Check Point (CHECKPOINT_FIREWALL)
  • Cisco Firepower NGFW (CISCO_FIREPOWER_FIREWALL)
  • Cisco Meraki (CISCO_MERAKI)
  • Cisco Router (CISCO_ROUTER)
  • Deep Instinct EDR (DEEP_INSTINCT_EDR)
  • Department of Homeland Security (DHS_IOC)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • Emerging Threats Pro (ET_PRO_IOC)
  • ESET Threat Intelligence (ESET_IOC)
  • FortiGate (FORTINET_FIREWALL)
  • Fortinet (FORTINET_DHCP)
  • Cloud Audit (N/A)
  • Security Command Center (N/A)
  • GitHub (GITHUB)
  • Hitachi Cloud Platform (HITACHI_CLOUD_PLATFORM)
  • Juniper (JUNIPER_FIREWALL)
  • Linux Auditing System (AuditD) (AUDITD)
  • Mandiant Threat Intelligence (MANDIANT_IOC)
  • Microsoft Azure Resource (AZURE_RESOURCE_LOGS)
  • Microsoft Exchange (EXCHANGE_MAIL)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • Microsoft Powershell (POWERSHELL)
  • Netscout Arbor Sightline (ARBOR_SIGHTLINE)
  • Office 365 (OFFICE_365)
  • Okta (OKTA)
  • Palo Alto Networks Firewall (PAN_FIREWALL)
  • Palo Alto Prisma Access (PAN_CASB)
  • Sentinelone Alerts (SENTINELONE_ALERT)
  • Shrubbery TACACS+ (SHRUBBERY_TACACS)
  • Signal Sciences WAF (SIGNAL_SCIENCES_WAF)
  • Solarwinds Kiwi Syslog Server (SOLARWINDS_KSS)
  • Splunk Platform (SPLUNK)
  • Stealthbits Defend (STEALTHBITS_DEFEND)
  • STIX Threat Intelligence (STIX)
  • Symantec Endpoint Protection (SEP)
  • Tanium Discover (TANIUM_DISCOVER)
  • Tanium Threat Response (TANIUM_THREAT_RESPONSE)
  • WatchGuard (WATCHGUARD)
  • Windows Event (WINEVTLOG)
  • Windows Network Policy Server (WINDOWS_NET_POLICY_SERVER)

For details about changes in each parser, see Supported default parsers.

November 16, 2022

You can collect Splunk CIM logs by using the Chronicle forwarder and Splunk default parser. For more information, see Collect Splunk CIM logs.

November 15, 2022

UDM Search

UDM Search is a new Chronicle search feature which enables you to find UDM events within your Chronicle instance. You can search both for individual UDM events and groups of UDM events tied to shared search terms. UDM search includes a number of search features, enabling you to navigate through your UDM data:

  • Quick Filters—Fast access to saved searches and search history.
  • Event Viewer—View the raw log and UDM for the event.
  • Search Manager—Comprehensive view of your saved searches and search history.

There is also a new UDM search API method available for the Chronicle Search API.

Be sure to review Google's recommended best practices for conducting searches using UDM Search. UDM searches can require substantial computational resources to complete if they are not constructed carefully. Performance also varies depending on the size and complexity of the data in your Chronicle instance.

Reference Lists

Google has made enhancements to the Chronicle reference lists feature, it now enables you to perform more complex matching beyond exact string matches. These new types of reference lists can be used in Detection Engine rules.

For more detailed information about these special list types, see the reference lists documentation.

When creating a list, you must provide a "List Type" to indicate how you want Chronicle to interpret your list. List type cannot be changed after list creation, and can be STRING, REGEX, or CIDR. The list type for any existing lists has been set to STRING, since all reference lists made by preview customers perform exact string matching.

You can create Reference Lists using the Chronicle user interface or programmatically using the Reference List API. For information on how to embed a Reference List within a Rule, see the documentation.

November 10, 2022

Chronicle Curated Detections has been enhanced with the following additional detection content:

  • Windows-based threats:
    • Security Posture Downgrade: detects activity attempting to disable or decrease the effectiveness of security tools.
  • Cloud threats:
    • Suspicious Behavior: detects activity that is thought to be uncommon and suspicious in most environments.
    • Service Disruption: detects destructive or disruptive actions that, if performed in a functioning production environment, may cause a significant outage.
    • Suspicious Infrastructure Change: detects modifications to production infrastructure that align with known persistence tactics.

November 09, 2022

Alerts and IOC Matches

The Alerts and Indicators of Compromise (IOC) page displays all the alerts and IOCs currently impacting your enterprise. It provides tools that enable you to filter and view your alerts and IOCs.

  • Alerts can be designated by your security infrastructure, by your security personnel, or by Chronicle Uppercase.

  • IOCs are designated automatically by Chronicle. Chronicle is always absorbing data from both your own infrastructure and numerous other security data sources. It automatically correlates suspicious security indicators with your security data. If a match is found (for example, a suspicious domain is found within your enterprise), Chronicle labels the event as an IOC and displays it on the IOC matches tab.

You can also still navigate to the Enterprise Insights page using the link provided at the top of the Alerts and IOCS page. To view CBN alerts, you still need to use the Enterprise Insights page.

Alert view

Alert view shows a variety of information with regards to a specific alert, including:

  • Alert Status

  • Alert Details—Displays an alert's creation time, recent updates, and its associated rule.

  • Decision States—Displays the verdict for the alert and if it is an indication of a security issue. History—Displays the history of changes made to the alert by your security team. For alerts originating from Chronicle SOAR, Alert view also includes the number and a link to the associated Chronicle SOAR case. You can pivot to your Chronicle SOAR account using this link.

Chronicle SOAR Authentication

You can authenticate with your Chronicle SOAR account from Chronicle. Once you have authenticated with your Chronicle SOAR account, you can pivot between your Chronicle account and your Chronicle SOAR account as needed.

Chronicle SOAR Cases

Chronicle SOAR ingests alerts from a variety of sources. You can conduct additional investigations of Chronicle SOAR cases from Chronicle or pivot to Chronicle SOAR. You can pivot to your Chronicle SOAR Cases from the Chronicle application menu. For more information on Chronicle SOAR cases, see the Chronicle SOAR documentation.

Chronicle SOAR Playbooks

Chronicle SOAR Playbooks define a series of automatic steps taken when triggered by an incoming alert and can be used to investigate and respond to security issues. You can pivot to your Chronicle SOAR Playbooks from the Chronicle application menu. For more information on Chronicle SOAR Playbooks, see the Chronicle SOAR documentation.

The following default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • Akeyless Vault Platform (AKEYLESS_VAULT)
  • AWS Control Tower (AWS_CONTROL_TOWER)
  • AWS VPC Flow (AWS_VPC_FLOW)
  • Azure AD (AZURE_AD)
  • Azure AD Directory Audit (AZURE_AD_AUDIT)
  • Azure WAF (AZURE_WAF)
  • BeyondTrust Privileged Identity (BEYONDTRUST_PI)
  • Check Point (CHECKPOINT_FIREWALL)
  • Cisco Router (CISCO_ROUTER)
  • Cisco Wireless IPS (CISCO_WIPS)
  • Citrix Monitor (CITRIX_MONITOR)
  • CrowdStrike Falcon (CS_EDR)
  • Darktrace (DARKTRACE)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • EPIC Systems (EPIC)
  • F5 ASM (F5_ASM)
  • Forcepoint DLP (FORCEPOINT_DLP)
  • FortiGate (FORTINET_FIREWALL)
  • Google Cloud Audit (N/A)
  • Security Command Center (N/A)
  • HAProxy (HAPROXY)
  • InterSystems Cache (INTERSYSTEMS_CACHE)
  • Lenel Onguard Badge Management (LENEL_ONGUARD)
  • Microsoft Azure Resource (AZURE_RESOURCE_LOGS)
  • Microsoft Defender for Endpoint (MICROSOFT_DEFENDER_ENDPOINT)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • Microsoft IIS (IIS)
  • Netscout (ARBOR_EDGE_DEFENSE)
  • Netscout Arbor Sightline (ARBOR_SIGHTLINE)
  • Okta (OKTA)
  • Okta User Context (OKTA_USER_CONTEXT)
  • OpenSSH (OPENSSH)
  • Palo Alto Cortex XDR Alerts (CORTEX_XDR)
  • Palo Alto Networks Firewall (PAN_FIREWALL)
  • Proofpoint Tap Alerts (PROOFPOINT_MAIL)
  • Pulse Secure (PULSE_SECURE_VPN)
  • RSA NetWitness (RSA_NETWITNESS)
  • Sentinelone Alerts (SENTINELONE_ALERT)
  • Signal Sciences WAF (SIGNAL_SCIENCES_WAF)
  • Sourcefire (SOURCEFIRE_IDS)
  • Symantec Endpoint Protection (SEP)
  • Unix system (NIX_SYSTEM)
  • Vectra Stream (VECTRA_STREAM)
  • Versa Firewall (VERSA_FIREWALL)
  • WatchGuard (WATCHGUARD)
  • Wazuh (WAZUH)
  • Windows Defender ATP (WINDOWS_DEFENDER_ATP)
  • Zix Email Encryption (ZIX_EMAIL_ENCRYPTION)
  • Zoom Operation Logs (ZOOM_OPERATION_LOGS)

For details about changes in each parser, see Supported default parsers.

November 07, 2022

Chronicle Feed Management added support for the Sentinel One Alerts API. See the Feed Management documentation for information about how to configure this feed.

When downloading data to CSV file format from the Chronicle user interface, raw log data is now excluded unless you are using Raw Log Scan. For example, raw log data is no longer included when you download events.

This resolves an issue where downloading to CSV was failing.

November 02, 2022

Enhancements to the Detection Engine API

The StreamDetectionAlerts method in the Detection Engine API has been enhanced to return detections generated by both user-created rules and Chronicle Curated Detections. For more information about this method, see StreamDetectionAlerts.

November 01, 2022

The Ingestion API udmevents and createentities methods now accept both uppercase and lowercase characters in the following fields:

  • <_Noun_>.mac: defined when calling the udmeevents method, where Noun is either principal, src, target, observer, intermediary, or about.

  • entity.asset.mac: defined when calling the createentities method.

These fields are defined in the UDM record in the request body when calling the method. For more information about these methods, see Chronicle Ingestion API documentation. For more information about UDM fields, see the Unified Data Model field list.

October 31, 2022

Chronicle Feed Management added a hostname field to the configuration workflow of certain log types. The hostname field enables you to configure the API endpoint for the feed. If you do not define a value for this field, the following default values are used:

  • AzureAD (AZURE_AD) default hostname is graph.microsoft.com.
  • AzureADAudit (AZURE_AD_AUDIT) default hostname is graph.microsoft.com.
  • AzureADContext (AZURE_AD_CONTEXT) default hostname is graph.microsoft.com.
  • AzureMDMIntune (AZURE_MDM_INTUNE) default hostname is graph.microsoft.com.
  • MicrosoftGraphAlert (MICROSOFT_GRAPH_ALERT) default hostname is graph.microsoft.com.
  • MicrosoftSecurityCenterAlert (MICROSOFT_SECURITY_CENTER_ALERT) default hostname is management.azure.com.
  • Office365 (OFFICE_365) default hostname is manage.office.com.

Chronicle Feed Management API was also updated to support the hostname field for these log types.

October 27, 2022

Chronicle Feed Management added support for the CrowdStrike Detection API. See the Feed Management documentation for information about how to configure this feed.

October 19, 2022

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • 1Password (ONEPASSWORD)
  • Accellion (ACCELLION)
  • Akamai Cloud Monitor (AKAMAI_CLOUD_MONITOR)
  • AWS Cloudtrail (AWS_CLOUDTRAIL)
  • BeyondTrust (BOMGAR)
  • BeyondTrust Secure Remote Access (BEYONDTRUST_REMOTE_ACCESS)
  • Bitdefender (BITDEFENDER)
  • Blue Coat Proxy (BLUECOAT_WEBPROXY)
  • Carbon Black (CB_EDR)
  • Check Point (CHECKPOINT_FIREWALL)
  • CIS Albert Alerts (CIS_ALBERT_ALERT)
  • Cisco ASA (CISCO_ASA_FIREWALL)
  • Cisco FireSIGHT Management Center (CISCO_FIRESIGHT)
  • Cisco ISE (CISCO_ISE)
  • Cisco Meraki (CISCO_MERAKI)
  • Cloudflare (CLOUDFLARE)
  • CrowdStrike Detection Monitoring (CS_DETECTS)
  • CrowdStrike Falcon (CS_EDR)
  • CyberArk (CYBERARK)
  • Darktrace (DARKTRACE)
  • Forcepoint NGFW (FORCEPOINT_FIREWALL)
  • Forescout NAC (FORESCOUT_NAC)
  • FortiGate (FORTINET_FIREWALL)
  • Cloud Audit (N/A)
  • Cloud Identity Device Users (GCP_CLOUDIDENTITY_DEVICEUSERS)
  • Load Balancing (GCP_LOADBALANCING)
  • Google Chrome Browser Cloud Management (CBCM) (N/A)
  • IBM Guardium (GUARDIUM)
  • Ipswitch MOVEit Transfer (IPSWITCH_MOVEIT_TRANSFER)
  • Juniper (JUNIPER_FIREWALL)
  • Kaspersky AV (KASPERSKY_AV)
  • Linux Auditing System (AuditD) (AUDITD)
  • Microsoft Azure Resource (AZURE_RESOURCE_LOGS)
  • Microsoft Defender for Endpoint (MICROSOFT_DEFENDER_ENDPOINT)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • Microsoft IIS (IIS)
  • Microsoft Powershell (POWERSHELL)
  • Netfilter IPtables (NETFILTER_IPTABLES)
  • Netscout (ARBOR_EDGE_DEFENSE)
  • Netscout Arbor Sightline (ARBOR_SIGHTLINE)
  • Okta (OKTA)
  • Oracle (ORACLE_DB)
  • Palo Alto Networks Firewall (PAN_FIREWALL)
  • Palo Alto Prisma Access (PAN_CASB)
  • pfSense (PFSENSE)
  • PostFix Mail (POSTFIX_MAIL)
  • Proofpoint Email Filter (PROOFPOINT_MAIL_FILTER)
  • Pulse Secure (PULSE_SECURE_VPN)
  • Qualys VM (QUALYS_VM)
  • Sentinelone Alerts (SENTINELONE_ALERT)
  • SentinelOne EDR (SENTINEL_EDR)
  • Shrubbery TACACS+ (SHRUBBERY_TACACS)
  • Symantec Endpoint Protection (SEP)
  • Sysdig (SYSDIG)
  • Tanium Integrity Monitor (TANIUM_INTEGRITY_MONITOR)
  • Varonis (VARONIS)
  • VyOS Open Source Router (VYOS)
  • ZScaler DNS (ZSCALER_DNS)

For details about changes in each parser, see Supported default parsers.

October 14, 2022

There is now an additional parameter you can specify for Chronicle feeds, "display_name". This additional parameter can be specified and will be returned when using the following Feed Management API methods:

  • CreateFeed
  • DisableFeed
  • EnableFeed
  • GetFeed
  • ListFeeds
  • UpdateFeed

For additional information and examples, see Feed Management API.

October 13, 2022

Chronicle CLI provides a text-based interface to initiate all Chronicle user workflows, acting as an alternative to the graphical user interface for advanced users.

Access to fields stored as key-value pairs in Detection Engine rules

You can now create Detection Engine rules that include UDM fields stored as key-value pairs, such as google.protobuf.Struct and Label data type. Using the map syntax, you access fields stored as the:

  • google.protobuf.Struct data type using syntax similar to $e.additional.fields["key"] = "value".

  • Label data type using syntax similar to $e.target.labels["key"] = "value".

For more details about the map syntax, see the YARA-L 2.0 language syntax.

October 06, 2022

Chronicle Feed Management for the Rapid7 Insight log type now enables you to configure the Rapid7 API endpoint.

A new field, called hostname, was added to the Rapid7 Insight configuration workflow. Use this field to change the API endpoint to any one of the supported Rapid7 regions, by specifying value using the following pattern {region_id}.api.insight.rapid7.com. If you do not specify an endpoint, the default is us.api.insight.rapid7.com. The Chronicle Feed Management API was also updated to support a configurable value for the hostname field.

October 04, 2022

Chronicle Curated Detections has been enhanced with the following additional detection content:

  • Windows-based threats:
    • Living off the land (LotL): identifies tools native to Microsoft Windows operating systems that can be abused by threat actors for malicious purposes.
  • Cloud attacks and cloud misconfigurations:
    • Cloud Hacktool: detects activity from known offensive security platforms or tools used by threat actors that target resources on Google Cloud.
    • IAM Abuse: detects activity associated with abusing IAM roles and permissions to potentially escalate privilege or move laterally within a given Google Cloud project or across a Google Cloud organization.

October 03, 2022

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • Apache (APACHE)
  • Aruba (ARUBA_WIRELESS)
  • AWS GuardDuty (GUARDDUTY)
  • Azure AD Directory Audit (AZURE_AD_AUDIT)
  • Azure AD Organizational Context (AZURE_AD_CONTEXT)
  • BeyondTrust (BOMGAR)
  • Box (BOX)
  • Cisco Application Centric Infrastructure (CISCO_ACI)
  • Cisco Application Control Engine (CISCO_ACE)
  • Cisco ASA (CISCO_ASA_FIREWALL)
  • Cisco Email Security (CISCO_EMAIL_SECURITY)
  • Citrix Netscaler (CITRIX_NETSCALER)
  • Cloudflare WAF (CLOUDFLARE_WAF)
  • CrowdStrike Detection Monitoring (CS_DETECTS)
  • CrowdStrike Falcon (CS_EDR)
  • Crowdstrike IOC (CROWDSTRIKE_IOC)
  • F5 ASM (F5_ASM)
  • Fluentd Logs (FLUENTD)
  • FortiGate (FORTINET_FIREWALL)
  • Fortinet FortiAnalyzer (FORTINET_FORTIANALYZER)
  • Cloud Audit (N/A)
  • Cloud DNS (N/A)
  • Cloud Load Balancing (GCP_LOADBALANCING)
  • HCNET Account Adapter Plus (HCNET_ACCOUNT_ADAPTER)
  • Kong API Gateway (KONG_GATEWAY)
  • ManageEngine AD360 (MANAGE_ENGINE_AD360)
  • McAfee ePolicy Orchestrator (MCAFEE_EPO)
  • McAfee Web Gateway (MCAFEE_WEBPROXY)
  • McAfee Web Protection (MCAFEE_WEB_PROTECTION)
  • Microsoft Azure Activity (AZURE_ACTIVITY)
  • Mongo Database (MONGO_DB)
  • Office 365 (OFFICE_365)
  • Okta (OKTA)
  • OSQuery (OSQUERY_EDR)
  • OSSEC (OSSEC)
  • Palo Alto Networks Firewall (PAN_FIREWALL)
  • Red Canary (REDCANARY_EDR)
  • Snort (SNORT_IDS)
  • Squid Web Proxy (SQUID_WEBPROXY)
  • Symantec Endpoint Protection (SEP)
  • Tanium Asset (TANIUM_ASSET)
  • Tanium Stream (TANIUM_TH)
  • Windows Defender ATP (WINDOWS_DEFENDER_ATP)
  • Workday (WORKDAY)
  • Zeek JSON (BRO_JSON)

For details about changes in each parser, see Supported default parsers.

September 29, 2022

The following changes are available in the Unified Data Model:

For a list of all fields in the Unified Data Model, and their descriptions, see the Unified Data Model field list.

September 26, 2022

Context Aware Detections - Risk Dashboard

The Context Aware Detections - Risk dashboard provides insight into the current threat status of assets and users in your enterprise.

Contextual enrichment in events and entities

To enable a security investigation, Chronicle provides additional context about artifacts in a customer environment by calculating prevalence statistics and ingesting data from Safe Browsing threat lists related to file hashes. For more information, see:

September 21, 2022

ListAssetAliases and ListUserAliases

The ListAssetAliases and ListUserAliases API methods are now available as part of the Chronicle Search API. Use ListAssetAliases to list all the aliases of an asset in an enterprise and use ListUserAliases to list all the aliases of a user in an enterprise.

September 14, 2022

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • Apache (APACHE)
  • Barracuda WAF (BARRACUDA_WAF)
  • Bluecat DDI (BLUECAT_DDI)
  • Cisco Umbrella Cloud Firewall (UMBRELLA_FIREWALL)
  • Cisco Umbrella Web Proxy (UMBRELLA_WEBPROXY)
  • Cisco WLC/WCS (CISCO_WIRELESS)
  • CloudGenix SD-WAN (CLOUDGENIX_SDWAN)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • FortiGate (FORTINET_FIREWALL)
  • Cloud Audit (N/A)
  • Google Cloud Identity Context (CLOUD_IDENTITY_CONTEXT)
  • IBM Guardium (GUARDIUM)
  • IBM z/OS (IBM_ZOS)
  • Infoblox DNS (INFOBLOX_DNS)
  • Ipswitch SFTP (IPSWITCH_SFTP)
  • Kubernetes auth proxy logs (KUBERNETES_AUTH_PROXY)
  • Linux DHCP (LINUX_DHCP)
  • McAfee ePolicy Orchestrator (MCAFEE_EPO)
  • Microsoft Defender for Endpoint (MICROSOFT_DEFENDER_ENDPOINT)
  • NGINX (NGINX)
  • OSSEC (OSSEC)
  • pfSense (PFSENSE)
  • Ribbon Analytics Platform (RIBBON_ANALYTICS_PLATFORM)
  • Ruckus Networks (RUCKUS_WIRELESS)
  • Salesforce (SALESFORCE)
  • Sentinelone Alerts (SENTINELONE_ALERT)
  • SentinelOne Deep Visibility (SENTINEL_DV)
  • SentinelOne EDR (SENTINEL_EDR)
  • Trend Micro Deep Security (TRENDMICRO_DEEP_SECURITY)
  • VMware AirWatch (AIRWATCH)
  • VMware ESXi (VMWARE_ESX)
  • VMware Workspace ONE (VMWARE_WORKSPACE_ONE)
  • Zscaler (ZSCALER_WEBPROXY)

For details about changes in each parser, see Supported default parsers.

September 02, 2022

GetLog

The GetLog API method is now available as part of the Chronicle Search API. Use GetLog to retrieve a specific raw log using an event's UID.

September 01, 2022

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • Arcsight CEF (ARCSIGHT_CEF)
  • Aruba (ARUBA_WIRELESS)
  • AWS Security Hub (AWS_SECURITY_HUB)
  • Azure AD (AZURE_AD)
  • BeyondTrust (BOMGAR)
  • Bitdefender (BITDEFENDER)
  • Blue Coat Proxy (BLUECOAT_WEBPROXY)
  • Bluecat DDI (BLUECAT_DDI)
  • CA LDAP (CA_LDAP)
  • Check Point (CHECKPOINT_FIREWALL)
  • Cisco ACS (CISCO_ACS)
  • Cisco Router (CISCO_ROUTER)
  • Cisco UCM (CISCO_UCM)
  • Cisco Umbrella IP (UMBRELLA_IP)
  • Cisco Umbrella Web Proxy (UMBRELLA_WEBPROXY)
  • Cisco VPN (CISCO_VPN)
  • Cisco WLC/WCS (CISCO_WIRELESS)
  • CrowdStrike Falcon (CS_EDR)
  • Falco IDS (FALCO_IDS)
  • FireEye HX (FIREEYE_HX)
  • Forcepoint CASB (FORCEPOINT_CASB)
  • FortiGate (FORTINET_FIREWALL)
  • Cloud Load Balancing (GCP_LOADBALANCING)
  • Cloud Audit (N/A)
  • HP Aruba Clearpass (CLEARPASS)
  • Infoblox DNS (INFOBLOX_DNS)
  • Linux DHCP (LINUX_DHCP)
  • Microsoft Intune (AZURE_MDM_INTUNE)
  • Office 365 (OFFICE_365)
  • Open LDAP (OPENLDAP)
  • Ordr IoT (ORDR_IOT)
  • Palo Alto Networks Traps (PAN_EDR)
  • Pivotal (PIVOTAL)
  • Proofpoint Threat Response (PROOFPOINT_TRAP)
  • Red Hat OpenShift (REDHAT_OPENSHIFT)
  • Sophos Firewall Next Gen (SOPHOS_FIREWALL)
  • Sourcefire (SOURCEFIRE_IDS)
  • Suricata EVE (SURICATA_EVE)
  • Symantec Event export (SYMANTEC_EVENT_EXPORT)
  • Tanium Comply (TANIUM_COMPLY)
  • Vectra Detect (VECTRA_DETECT)
  • VMware ESXi (VMWARE_ESX)
  • Windows Event (WINEVTLOG)

For details about changes in each parser, see Supported default parsers.

The following changes are available in the Unified Data Model:

  • The ip_location field was added to Noun type.
  • The day_max_sub_domains field was added to the Prevalence type.
  • The source_type field was added to the EntityMetadata type.

For a list of all fields in the Unified Data Model, and their descriptions, see the Unified Data Model field list.

August 18, 2022

VirusTotal Context

Chronicle's integration with VirusTotal has been revised and enhanced. This feature enables you to pivot from finding domains linked to an asset in Chronicle to viewing information about that domain from VirusTotal. From a Chronicle event view, such as Asset view, Domain view, or IP Address view, click VT Context to open the VirusTotal Context window. Some of the VirusTotal information is only available to users with a VirusTotal Enterprise account.

Some of the older links in the Chronicle user interface to VirusTotal, for example the option in Asset view to display the first 50 results in VirusTotal Graph and the VirusTotal Insights results panel, have been removed. Clicking VT Context provides access to the same information and VirusTotal functionality, including access to VirusTotal Graph.

August 17, 2022

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • Akamai WAF (AKAMAI_WAF)
  • Arista Switch (ARISTA_SWITCH)
  • AWS CloudWatch (AWS_CLOUDWATCH)
  • AWS GuardDuty (GUARDDUTY)
  • AWS Macie (AWS_MACIE)
  • AWS Route 53 DNS (AWS_ROUTE_53)
  • AWS WAF (AWS_WAF)
  • Azure AD (AZURE_AD)
  • Azure AD Organizational Context (AZURE_AD_CONTEXT)
  • Bitdefender (BITDEFENDER)
  • Bluecat DDI (BLUECAT_DDI)
  • Centrify (CENTRIFY_SSO)
  • Check Point (CHECKPOINT_FIREWALL)
  • Cisco Application Centric Infrastructure (CISCO_ACI)
  • Cisco ISE (CISCO_ISE)
  • Custom DNS (CUSTOM_DNS)
  • Cylance Protect (CYLANCE_PROTECT)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • FireEye (FIREEYE_ALERT)
  • Forcepoint Proxy (FORCEPOINT_WEBPROXY)
  • FortiGate (FORTINET_FIREWALL)
  • IBM z/OS (IBM_ZOS)
  • Linux DHCP (LINUX_DHCP)
  • Microsoft AD FS (ADFS)
  • Microsoft Azure Resource (AZURE_RESOURCE_LOGS)
  • Microsoft Defender for Endpoint (MICROSOFT_DEFENDER_ENDPOINT)
  • Microsoft SQL Server (MICROSOFT_SQL)
  • Nasuni File Services Platform (NASUNI_FILE_SERVICES)
  • Palo Alto Prisma Cloud (PAN_PRISMA_CLOUD)
  • Ping Identity (PING)
  • Riverbed Steelhead (STEELHEAD)
  • SiteMinder Web Access Management (CA_SSO_WEB)
  • Snoopy Logger (SNOOPY_LOGGER)
  • Stormshield Firewall (STORMSHIELD_FIREWALL)
  • Symantec Endpoint Protection (SEP)
  • Tanium Stream (TANIUM_TH)
  • VMware ESXi (VMWARE_ESX)
  • VMware Horizon (VMWARE_HORIZON)
  • Windows Event (WINEVTLOG)
  • Windows Sysmon (WINDOWS_SYSMON)

For details about changes in each parser, see Supported default parsers.

Chronicle curated detections provide out-of-the-box threat detection content curated, built, and maintained by Google Cloud Threat Intelligence (GCTI) researchers. This release of curated detections cover the following range of threats:

  • Windows-based threats: Coverage for several classes of threats including infostealers, ransomware, RATs, misused software, and crypto activity.
  • Cloud attacks and cloud misconfigurations: Secure cloud workloads with additional coverage around exfiltration of data, suspicious behavior, and additional vectors.

August 16, 2022

Feed Management

You can now configure new data feeds for your Chronicle account using Feed Management. This feature makes it possible for you to setup your own data feeds without the assistance of Chronicle support personnel. You can setup new data feeds using either the Feed Management user interface or the Feed Management API. Chronicle returns error messages in the event you have misconfigured a feed and need to make changes.

August 08, 2022

The following changes are available in the Unified Data Model:

  • The File.ashash field was deprecated and replaced with the File.authentihash field.
  • The day_max field was added to the Prevalence type.

Descriptions of the File.FileType Enum values are now available in the Unified Data Model field list document.

For a list of all fields in the Unified Data Model, and their descriptions, see the Unified Data Model field list.

August 03, 2022

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • AWS Cloudtrail (AWS_CLOUDTRAIL)
  • AWS Route 53 DNS (AWS_ROUTE_53)
  • AWS S3 Server Access (AWS_S3_SERVER_ACCESS)
  • AWS WAF (AWS_WAF)
  • Box (BOX)
  • Cisco Switch (CISCO_SWITCH)
  • Citrix Storefront (CITRIX_STOREFRONT)
  • CrowdStrike Falcon (CS_EDR)
  • Dell OpenManage (DELL_OPENMANAGE)
  • F5 VPN (F5_VPN)
  • Falco IDS (FALCO_IDS)
  • Cloud SQL (GCP_CLOUDSQL)
  • Cloud VPC Flow (GCP_VPC_FLOW)
  • Imperva SecureSphere Management (IMPERVA_SECURESPHERE)
  • Linux Auditing System AuditD (AUDITD)
  • McAfee ePolicy Orchestrator (MCAFEE_EPO)
  • Microsoft Defender for Identity (MICROSOFT_DEFENDER_IDENTITY)
  • Netskope (NETSKOPE_ALERT)
  • NIMBLE OS (NIMBLE_OS)
  • Office 365 (OFFICE_365)
  • Oracle (ORACLE_DB)
  • Ping Identity (PING)
  • SentinelOne EDR (SENTINEL_EDR)
  • Snare System Diagnostic Logs (SNARE_SOLUTIONS)
  • Sophos AV (SOPHOS_AV)
  • Suricata EVE (SURICATA_EVE)
  • Symantec Endpoint Protection (SEP)
  • TeamViewer (TEAMVIEWER)
  • Vectra Stream (VECTRA_STREAM)
  • VMware ESXi (VMWARE_ESX)
  • Windows Defender ATP (WINDOWS_DEFENDER_ATP)
  • Windows Event (WINEVTLOG)
  • Workspace Activities (WORKSPACE_ACTIVITY)

For details about changes in each parser, see Supported default parsers.

July 29, 2022

Detection Engine now includes the following new features:

  • You can define an outcome section in single event rules. Previously, the outcome section was supported in multi-event rules only. If you have multi-event rules that use only one event variable, you can refactor them by deleting the match section to make them more performant. For an example rule, see YARA-L 2.0 language overview. For more detailed information about rule syntax, see YARA-L 2.0 language syntax.

  • In the existing condition section, you can now use variables defined in the outcome section. This enables you to filter on aggregates (variables in the outcome section can be defined using aggregate functions) and on the $risk_score outcome variable. For more detailed information about the condition section, see YARA-L 2.0 language syntax.

  • You can assign a placeholder variable to the result of a function call. You can then use the placeholder variable in other sections of the rule, such as the match section, outcome section, or condition section. For information about the syntax for function to placeholder assignments and any restrictions, see the YARA-L 2.0 language syntax.

July 28, 2022

The following changes are available in the Unified Data Model:

For a list of all fields in the Unified Data Model, and their descriptions, see the Unified Data Model field list.

July 26, 2022

Export filter for Cloud logs

Previously, you could export DNS and Cloud Audit logs using the Chronicle panel within the Google Cloud Console. You can now configure the default export filter to export additional log types. You can not only control the log types, but also the source projects producing these logs. Both inclusion and exclusion of logs are supported as well. In addition, semantic validation of the log filters can catch malformed log filters with invalid log types or identifiers. The filter language is defined by the Google logging query language that is shared with Cloud Logging.

For more information about the Export Log Filter Settings, see Exporting Google Cloud Logs to Chronicle.

July 21, 2022

The following supported default parsers have changed. Each is listed by product name and ingestion label, if applicable.

  • Avanan Email Security (AVANAN_EMAIL)
  • AWS Cloudtrail (AWS_CLOUDTRAIL)
  • AWS GuardDuty (GUARDDUTY)
  • AWS VPC Flow (AWS_VPC_FLOW)
  • Barracuda Firewall (BARRACUDA_FIREWALL)
  • BeyondTrust Secure Remote Access (BEYONDTRUST_REMOTE_ACCESS)
  • Carbon Black (CB_EDR)
  • Centrify (CENTRIFY_SSO)
  • Cisco Firepower NGFW (CISCO_FIREPOWER_FIREWALL)
  • Cisco ISE (CISCO_ISE)
  • CrowdStrike Falcon (CS_EDR)
  • CrowdStrike Falcon Stream (CS_STREAM)
  • Custom Security Data Analytics (CUSTOM_SECURITY_DATA_ANALYTICS)
  • Dell EMC Data Domain (DELL_EMC_DATA_DOMAIN)
  • Department of Homeland Security (DHS_IOC)
  • Elastic Audit Beats (ELASTIC_AUDITBEAT)
  • F5 VPN (F5_VPN)
  • FortiGate (FORTINET_FIREWALL)
  • Fortinet FortiNAC (FORTINET_FORTINAC)
  • Cloud Run (GCP_RUN)
  • GitHub (GITHUB)
  • Google Chrome Browser Cloud Management
  • HCL BigFix (HCL_BIGFIX)
  • HP Aruba(Clearpass) (CLEARPASS)
  • IBM Guardium (GUARDIUM)
  • Infoblox (INFOBLOX)
  • Infoblox DNS (INFOBLOX_DNS)
  • Kubernetes audit logs (KUBERNETES_AUDIT)
  • Linux Sysmon (LINUX_SYSMON)
  • McAfee ePolicy Orchestrator (MCAFEE_EPO)
  • Medigate IoT (MEDIGATE_IOT)
  • Microsoft AD FS (ADFS)
  • Nasuni File Services Platform (NASUNI_FILE_SERVICES)
  • Office 365 (OFFICE_365)
  • Okta (OKTA)
  • Ping Identity (PING)
  • PostFix Mail (POSTFIX_MAIL)
  • Proofpoint On Demand (PROOFPOINT_ON_DEMAND)
  • Proofpoint Tap Alerts (PROOFPOINT_MAIL)
  • SailPoint IAM (SAILPOINT_IAM)
  • SecureLink (SECURELINK)
  • SentinelOne EDR (SENTINEL_EDR)
  • ServiceNow CMDB (SERVICENOW_CMDB)
  • Suricata EVE (SURICATA_EVE)
  • Suricata IDS (SURICATA_IDS)
  • Symantec Web Isolation (SYMANTEC_WEB_ISOLATION)
  • Thales Luna Hardware Security Module (THALES_LUNA_HSM)
  • Thales MFA (THALES_MFA)
  • Uptycs EDR (UPTYCS_EDR)
  • Windows DNS (WINDOWS_DNS)
  • Windows Event (WINEVTLOG)
  • Workspace Activities (WORKSPACE_ACTIVITY)

For details about changes in each parser, see Supported default parsers.

July 06, 2022

The following supported default parsers have changed (listed by product name and ingestion label):

  • Azure DevOps Audit (AZURE_DEVOPS)
  • Bitdefender (BITDEFENDER)
  • CA Access Control (CA_ACCESS_CONTROL)
  • Carbon Black App Control (CB_APP_CONTROL)
  • Check Point (CHECKPOINT_FIREWALL)
  • Cisco Firepower NGFW (CISCO_FIREPOWER_FIREWALL)
  • Cisco Router (CISCO_ROUTER)
  • Cloud Passage (CLOUD_PASSAGE)
  • Digital Guardian (DIGITALGUARDIAN_EDR)
  • ExtraHop RevealX (EXTRAHOP)
  • Forcepoint NGFW (FORCEPOINT_FIREWALL)
  • IBM DataPower Gateway (IBM_DATAPOWER)
  • IBM Guardium (GUARDIUM)
  • Imperva (IMPERVA_WAF)
  • Microsoft Azure Resource (AZURE_RESOURCE_LOGS)
  • Microsoft SQL Server (MICROSOFT_SQL)
  • Office 365 (OFFICE_365)
  • pfSense (PFSENSE)
  • Proofpoint On Demand (PROOFPOINT_ON_DEMAND)
  • Proofpoint Tap Alerts (PROOFPOINT_MAIL)
  • SonicWall (SONIC_FIREWALL)
  • Sophos UTM (SOPHOS_UTM)
  • VMware AirWatch (AIRWATCH)
  • VMware ESXi (VMWARE_ESX)
  • Workspace Activities (WORKSPACE_ACTIVITY)

For details about changes in each parser, see Supported default parsers.

The following new fields are available in the Unified Data Model:

  • The new fields prevalence, first_seen_time, and last_seen_time were added to the File object.
  • A new field, bounce_address, was added to the Email object.
  • A new field, artifact, was added to the Noun object. Artifact is a new object.
  • A new field, rolling_max_sub_domains, was added to the Prevalence object.
  • A new field, first_seen_time, was added to the User object.
  • The following new fields were added to the Smtp object:
    • helo
    • mail_from
    • rcpt_to
    • server_response
    • message_path
    • is_webmail
    • is_tls

For a list of all fields in the Unified Data Model, and their descriptions, see the Unified Data Model field list

June 29, 2022

Chronicle Forwarder configuration on Linux has been updated to include two separate configuration files. The <x>.conf file stores the configuration related to log ingestion. The <x>_auth.conf file stores the authentication credentials.

For more information, see Installing and configuring the forwarder on Linux.

June 22, 2022

The following supported default parsers have changed (listed by product name and ingestion label):

  • Akamai WAF (AKAMAI_WAF)
  • Aruba IPS (ARUBA_IPS)
  • Azure AD Directory Audit (AZURE_AD_AUDIT)
  • Carbon Black App Control (CB_APP_CONTROL)
  • Check Point (CHECKPOINT_FIREWALL)
  • Cisco ACS (CISCO_ACS)
  • Cisco Email Security (CISCO_EMAIL_SECURITY)
  • Cisco Firepower NGFW (CISCO_FIREPOWER_FIREWALL)
  • Cisco ISE (CISCO_ISE)
  • Cisco Meraki (CISCO_MERAKI)
  • Citrix Netscaler (CITRIX_NETSCALER)
  • CloudM (CLOUDM)
  • CrowdStrike Falcon (CS_EDR)
  • EPIC Systems (EPIC)
  • Forescout NAC (FORESCOUT_NAC)
  • FortiGate (FORTINET_FIREWALL)
  • Cloud Compute (GCP_COMPUTE)
  • IBM DataPower Gateway (IBM_DATAPOWER)
  • Imperva (IMPERVA_WAF)
  • JAMF Protect (JAMF_PROTECT)
  • Linux Auditing System (AuditD) (AUDITD)
  • Microsoft Exchange (EXCHANGE_MAIL)
  • Netskope (NETSKOPE_ALERT)
  • Office 365 (OFFICE_365)
  • Okta (OKTA)
  • Preempt Alert (PREEMPT)
  • RSA (RSA_AUTH_MANAGER)
  • SentinelOne EDR (SENTINEL_EDR)
  • ServiceNow CMDB (SERVICENOW_CMDB)
  • Sourcefire (SOURCEFIRE_IDS)
  • Suricata IDS (SURICATA_IDS)
  • Symantec Web Isolation (SYMANTEC_WEB_ISOLATION)
  • Tripwire (TRIPWIRE_FIM)
  • Unix system (NIX_SYSTEM)
  • VMware AirWatch (AIRWATCH)
  • VMware ESXi (VMWARE_ESX)
  • VMware NSX (VMWARE_NSX)
  • WatchGuard (WATCHGUARD)
  • Workspace Alerts (WORKSPACE_ALERTS)
  • Zscaler (ZSCALER_WEBPROXY)

For details about changes in each parser, see Supported default parsers.

June 14, 2022

Enhancements to YARA-L 2.0 syntax in Detection Engine rules

We have enhanced the outcome section that can be used in Detection Engine rules.

  • We now support up to 10 outcome variables.
  • We now support integer and string data type outcome variables.
  • We have added new aggregate functions: count(), count_distinct(), array(), array_distinct()

For more details about the outcome section, see Outcome section syntax.

June 08, 2022

The following supported default parsers have changed (listed by product name and ingestion label):

  • Amazon Guardduty (GUARDDUTY)
  • Atlassian Jira (ATLASSIAN_JIRA)
  • AWS CloudFront (AWS_CLOUDFRONT)
  • AWS Cloudtrail (AWS_CLOUDTRAIL)
  • AWS CloudWatch (AWS_CLOUDWATCH)
  • AWS Config (AWS_CONFIG)
  • AWS Elastic Load Balancer (AWS_ELB)
  • AWS Key Management Service (AWS_KMS)
  • AWS VPC Flow (AWS_VPC_FLOW)
  • Check Point (CHECKPOINT_FIREWALL)
  • Cisco ACS (CISCO_ACS)
  • Cisco Email Security (CISCO_EMAIL_SECURITY)
  • CrowdStrike Falcon (CS_EDR)
  • Elastic Audit Beats (ELASTIC_AUDITBEAT)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • ESET Threat Intelligence (ESET_IOC)
  • F5 BIGIP LTM (F5_BIGIP_LTM)
  • Fastly WAF (FASTLY_WAF)
  • Cloud IOT (GCP_CLOUDIOT)
  • HCL BigFix (HCL_BIGFIX)
  • IBM z/OS (IBM_ZOS)
  • Imperva (IMPERVA_WAF)
  • Infoblox DNS (INFOBLOX_DNS)
  • Juniper IPS (JUNIPER_IPS)
  • Microsoft Azure Resource (AZURE_RESOURCE_LOGS)
  • Microsoft Defender for Endpoint (MICROSOFT_DEFENDER_ENDPOINT)
  • Microsoft Graph API Alerts (MICROSOFT_GRAPH_ALERT)
  • Microsoft SQL Server (MICROSOFT_SQL)
  • Okta (OKTA)
  • Tanium Stream (TANIUM_TH)
  • Trend Micro AV (TRENDMICRO_AV)
  • Unix system (NIX_SYSTEM)
  • Windows Event (WINEVTLOG)
  • Zscaler (ZSCALER_WEBPROXY)

For details about changes in each parser, see Supported default parsers.

May 25, 2022

The following supported default parsers have changed, listed by product name and ingestion label:

  • Apache Hadoop (HADOOP)
  • Suricata IDS (SURICATA_IDS)
  • Cloud Compute (GCP_COMPUTE)
  • Elastic Audit Beats (ELASTIC_AUDITBEAT)
  • Cloudflare (CLOUDFLARE)
  • Proofpoint On Demand (PROOFPOINT_ON_DEMAND)
  • FortiGate (FORTINET_FIREWALL)
  • CSV Custom IOC (CSV_CUSTOM_IOC)
  • CrowdStrike Falcon (CS_EDR)
  • Cisco Firepower NGFW (CISCO_FIREPOWER_FIREWALL)
  • CIS Albert Alerts (CIS_ALBERT_ALERT)
  • SonicWall (SONIC_FIREWALL)
  • Okta User Context (OKTA_USER_CONTEXT)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • Check Point (CHECKPOINT_FIREWALL)
  • Barracuda Email (BARRACUDA_EMAIL)
  • Microsoft Azure Activity (AZURE_ACTIVITY)
  • Carbon Black App Control (CB_APP_CONTROL)
  • OpenSSH (OPENSSH)
  • OneLogin (ONELOGIN_SSO)
  • Office 365 (OFFICE_365)
  • FireEye NX (FIREEYE_NX)
  • ExtraHop RevealX (EXTRAHOP)
  • Cisco Umbrella DNS (UMBRELLA_DNS)
  • Kaspersky AV (KASPERSKY_AV)
  • IBM Guardium (GUARDIUM)
  • F5 ASM (F5_ASM)
  • Cisco Email Security (CISCO_EMAIL_SECURITY)
  • Workspace Activities (WORKSPACE_ACTIVITY)
  • Forcepoint Proxy (FORCEPOINT_WEBPROXY)
  • Azure AD Organizational Context (AZURE_AD_CONTEXT)
  • Tanium Stream (TANIUM_TH)
  • Apache (APACHE)

For details about the changes in each parser, see Supported default parsers.

May 11, 2022

The following supported default parsers have changed (listed by product name and ingestion label):

  • ExtraHop RevealX (EXTRAHOP)
  • Imperva (IMPERVA_WAF)
  • Windows Event (WINEVTLOG)
  • Azure AD Organizational Context (AZURE_AD_CONTEXT)
  • Citrix Netscaler (CITRIX_NETSCALER)
  • Elastic Packet Beats (ELASTIC_PACKETBEATS)
  • Elastic Audit Beats (ELASTIC_AUDITBEAT)
  • Sendmail (SENDMAIL)
  • VMware vCenter (VMWARE_VCENTER)
  • AWS VPC Flow (AWS_VPC_FLOW)
  • Bluecat DDI (BLUECAT_DDI)
  • Cisco ACS (CISCO_ACS)
  • Cisco Firepower NGFW (CISCO_FIREPOWER_FIREWALL)
  • Forcepoint Proxy (FORCEPOINT_WEBPROXY)
  • McAfee ePolicy Orchestrator (MCAFEE_EPO)
  • Office 365 (OFFICE_365)
  • Apple MacOS (MACOS)
  • Archer Integrated Risk Management (ARCHER_IRM)
  • Cisco Meraki (CISCO_MERAKI)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • IBM DB2 (DB2_DB)
  • Cisco ISE (CISCO_ISE)
  • F5 BIGIP LTM (F5_BIGIP_LTM)
  • Juniper Junos (JUNIPER_JUNOS)
  • Microsoft Exchange (EXCHANGE_MAIL)
  • VMware ESXi (VMWARE_ESX)
  • Digital Shadows SearchLight (DIGITAL_SHADOWS_SEARCHLIGHT)
  • Azure Firewall (AZURE_FIREWALL)
  • ForgeRock OpenAM (OPENAM)
  • FortiGate (FORTINET_FIREWALL)
  • ZScaler NGFW (ZSCALER_FIREWALL)
  • OpenVPN (OPEN_VPN)

For details about the changes in each parser, see Supported default parsers.

May 10, 2022

The following new fields are available in the Unified Data Model:

For a list of fields in the Unified Data Model, and descriptions, see the Unified Data Model field list.

April 27, 2022

The following supported default parsers have changed (listed by product name and ingestion label):

  • Apache Tomcat (TOMCAT)
  • Azure AD (AZURE_AD)
  • BIND (BIND_DNS)
  • Bitdefender (BITDEFENDER)
  • Blue Coat Proxy (BLUECOAT_WEBPROXY)
  • Cisco ACS (CISCO_ACS)
  • Cisco Email Security (CISCO_EMAIL_SECURITY)
  • Cisco Firepower NGFW (CISCO_FIREPOWER_FIREWALL)
  • Cisco ISE (CISCO_ISE)
  • Citrix Netscaler (CITRIX_NETSCALER)
  • CrowdStrike Falcon (CS_EDR)
  • Darktrace (DARKTRACE)
  • Dell EMC Data Domain (DELL_EMC_DATA_DOMAIN)
  • Elastic Windows Event Log Beats (ELASTIC_WINLOGBEAT)
  • EPIC Systems (EPIC)
  • F5 ASM (F5_ASM)
  • Cloud Identity Device Users (GCP_CLOUDIDENTITY_DEVICEUSERS)
  • GMV Checker ATM Security (GMV_CHECKER)
  • HCL BigFix (HCL_BIGFIX)
  • Layer7 SiteMinder (SITEMINDER_SSO)
  • Microsoft Azure NSG Flow (AZURE_NSG_FLOW)
  • Microsoft Defender for Identity(MICROSOFT_DEFENDER_IDENTITY)
  • Microsoft Powershell (POWERSHELL)
  • Mobileiron (MOBILEIRON)
  • Office 365 (OFFICE_365)
  • Salesforce (SALESFORCE)
  • SecureAuth (SECUREAUTH_SSO)
  • SentinelOne EDR (SENTINEL_EDR)
  • Windows Event (WINEVTLOG)
  • Workspace Activities (WORKSPACE_ACTIVITY)
  • ZScaler NGFW (ZSCALER_FIREWALL)

For details about the changes in each parser, see Supported default parsers.

Chronicle now supports the following functions in Detection Engine rules:

  • strings.concat(a, b)
  • strings.to_lower(stringText)
  • strings.to_upper(stringText)
  • strings.base64_decode(encodedString)
  • re.capture(stringText, regex)
  • re.replace(stringText, replaceRegex, replacementText)
  • timestamp.get_minute(unix_seconds [, time_zone])
  • timestamp.get_hour(unix_seconds [, time_zone])
  • timestamp.get_day_of_week(unix_seconds [, time_zone])
  • timestamp.get_week(unix_seconds [, time_zone])
  • timestamp.current_seconds()
  • math.abs(intExpression)

For more information about these functions, see YARA-L 2.0 language syntax.

April 26, 2022

The Chronicle Container Registry key is no longer needed and has been removed. The corresponding documentation on the Container Registry key for the Linux version of the Chronicle Forwarder has also been removed.

April 25, 2022

Rules run frequency

Rules can now be run at different frequencies. Rule run frequency impacts the latency with which detections are discovered for each rule. Longer run frequencies increase the amount of time between when an event occurs and when a detection is processed for that event. Rules with a window size of at least one hour are limited to either 1 hour or 24 hour run frequencies.

April 15, 2022

Chronicle Detection Engine now supports the min() function and subtraction operator in the outcome section of a rule.

April 13, 2022

The following supported default parsers have changed (listed by ingestion label)

  • AKAMAI_WAF
  • ARUBA_WIRELESS
  • AWS_CLOUDTRAIL
  • AWS_CONFIG
  • AZURE_AD_CONTEXT
  • AZURE_COSMOS_DB
  • BITDEFENDER
  • CA_ACCESS_CONTROL
  • CASSANDRA
  • CISCO_EMAIL_SECURITY
  • CISCO_FIREPOWER_FIREWALL
  • CISCO_ISE
  • CISCO_MERAKI
  • CISCO_TACACS
  • CS_EDR
  • D3_BANKING
  • ELASTIC_WINLOGBEAT
  • FILEZILLA_FTP
  • GCP_CLOUDIDENTITY_DEVICES
  • GCP_CLOUDIDENTITY_DEVICEUSERS
  • GMV_CHECKER
  • GUARDDUTY
  • GUARDIUM
  • IIS
  • INFOBLOX_DHCP
  • KASPERSKY_AV
  • KEA_DHCP
  • MCAFEE_DLP
  • MCAFEE_EPO
  • MICROSOFT_DEFENDER_ENDPOINT
  • NETSKOPE_WEBPROXY
  • OFFICE_365
  • OKTA
  • OKTA_USER_CONTEXT
  • ONELOGIN_SSO
  • ORDR_IOT
  • PAN_FIREWALL
  • PROOFPOINT_ON_DEMAND
  • PULSE_SECURE_VPN
  • RH_ISAC_IOC
  • SALESFORCE
  • SERVICENOW_CMDB
  • SLACK_AUDIT
  • SOPHOS_UTM
  • SYMANTEC_EDR
  • TANIUM_TH
  • UMBRELLA_DNS
  • UNIFI_AP
  • VANDYKE_SFTP
  • VMWARE_ESX
  • VMWARE_VREALIZE
  • WINDOWS_DHCP
  • WINDOWS_DNS
  • WINDOWS_SYSMON
  • WORKSPACE_ACTIVITY
  • WORKSPACE_ALERTS
  • WORKSPACE_USERS

For details about the changes in each parser, see Supported default parsers

April 07, 2022

Exporting Google Cloud Logs to Chronicle

There are now lists of the specific Google Cloud Logs and Google Cloud Asset Metadata that are exported to Chronicle when you enable Google Cloud log ingestion.

February 15, 2022

DeleteSubject

The DeleteSubject method has been added to the Chronicle Role-Based Access Control (RBAC) API. DeleteSubject enables you to remove user and group role assignments.

February 08, 2022

Chronicle Forwarder

For the Chronicle Forwarder to function properly, an additional firewall rule is needed for host oauth2.googleapis.com. This information has been added to both the Windows and Linux versions of the Forwarder documentation.

December 14, 2021

Role-based access control (RBAC)

Role-based access control (RBAC) enables you to tailor access to Chronicle features based on an employee's role in the organization. Assigning a role to a user grants that user the permissions associated with the role, which enables the user to access role-appropriate Chronicle features.

December 08, 2021

Dashboards

Chronicle provides a set of default dashboards to monitor data ingestion status, health, rule detection context, IOC matches and alert prioritization, and user sign-ins. Reporting is available by converting a dashboard to a shareable file (PDF, Excel, CSV, etc.). You can also create custom personal and shared dashboards.

November 19, 2021

This document describes Chronicle's recommendations for writing rules in YARA-L.

October 15, 2021

Detection Engine API

The ListDetections method has been updated to allow customers to list detections efficiently across rule versions and rules by either detection timestamp or commit timestamp. Parameters originally used to list detections by detection timestamp will eventually be deprecated.

September 28, 2021

Uppercase has been rebranded as Google Cloud Threat Intelligence (GCTI).

September 22, 2021

The Linux Forwarder has been enhanced to support load balancing and high-availability. This enables you to deploy the forwarder in an environment where a Layer 4 load balancer is installed between syslog data sources and forwarder instances.

July 13, 2021

New documentation to support Chronicle data ingestion planning

You can now find information about Chronicle supported default parsers.

Supported default parsers provides information about which ingestion labels (LogTypes) also support a default parser. You can find the supported data format (KV, JSON, CEF, etc), the parser category, and when the default parser was last updated.

July 01, 2021

Asset Namespaces

The asset namespaces feature enables you to classify categories of assets sharing a common network environment, or namespace, and then perform searches for those assets within the Chronicle user interface based on that namespace. See also the Linux Forwarder documentation for information on how to configure the Forwarder to add namespaces to your security data before it is ingested into your Chronicle account.

Linux Forwarder Updates

The Linux Forwarder has been enhanced with the following additional capabilities:

Disk Buffering—Disk buffering enables you to buffer backlogged messages to disk as opposed to memory. The backlogged messages can be stored in case the forwarder crashes or the underlying host crashes.

Regular Expression Filters—Regular expression filters enable you to filter logs based on regular expression matches.

Arbitrary labels—Use labels to attach arbitrary metadata to logs using key and value pairs.

Namespaces—Use namespace labels to identify logs from distinct network segments and to deconflict overlapping IP addresses.

Kafka Input—You can ingest data from Kafka topics just as you can for syslog. Consumer groups are leveraged to enable you to deploy up to 3 Forwarders and pull data from the same Kafka topic.

June 30, 2021

Downloading Events

You can download large numbers of the events associated with each threat detection as a CSV file, enabling you to search across a broad set of the data stored in your Chronicle account to hunt for security issues.

June 28, 2021

Detection Engine API

The VerifyRule method has been added to the Detection Engine API. This method verifies that a rule is a valid YARA-L 2.0 rule without creating a new rule or evaluating it over data.

June 21, 2021

Uppercase Alerts

For Chronicle customers who are also Uppercase customers, Uppercase alerts are now displayed on the Enterprise Insights page. Uppercase alerts are derived from both Google's internal threat detection infrastructure and research provided by Uppercase security analysts.

You can view these alerts in Uppercase Alert view. This view also enables you to provide feedback that can be shared with your own security team and with Uppercase.

You can also use the Uppercase API to retrieve alerts from your Chronicle account.

June 01, 2021

Chronicle Automated Google Cloud Log Ingestion

Google Cloud customers can now send logs directly to their Chronicle account. Customers can send both Cloud Audit and Cloud DNS logs. See Ingesting Google Cloud Logs in to Chronicle for more information.

May 15, 2021

Archive Rules

You can now archive rules specified for the Detection Engine. Archiving a rule hides the security data related to that rule (and all of its versions) without actually deleting the rule. See Archive rules for more information.

April 23, 2021

Supported Data Sets

Chronicle can now ingest and parse data from the following additional systems and services:

  • Aruba Airwave
  • Blue Coat Proxy
  • Brocade ServerIron ADX
  • CIS Albert Alerts
  • Cisco Application Control Engine
  • Cisco Email Security
  • Cisco NX-OS
  • Citrix StoreFront
  • Cofense Triage
  • Comodo
  • Fidelis Network
  • FireEye NX
  • Honeyd
  • Kemp Load Balancer
  • Kyriba Treasury Management
  • Microsoft Intune
  • MySQL
  • Palo Alto Networks Cortex XDR
  • Red Canary EDR
  • ServiceNow CMDB
  • Symantec VIP Enterprise Gateway
  • Tanium Discover
  • Tripwire File Integrity Monitoring

January 25, 2021

  • Chronicle Detection Engine

    Enables customers to automate the process of searching across their data for security issues. You can specify Rules to search all of your data and notify you when potential and known threats appear in your enterprise. For more information on the Chronicle Detection Engine, please see the following:

    • Chronicle Detection Engine UI: The Chronicle Detection Engine is integrated within the Chronicle UI. It includes the Rules Dashboard for monitoring Rule activity and the Rules Editor, enabling you to create, test, and activate new Rules.

    • Chronicle Detection Engine API: The Chronicle Detection Engine API enables you to programmatically modify and operate all of the Detection Engine functionality that is also provided by the Detection Engine UI.

    • YARA-L 2.0: Use the YARA-L 2.0 language to specify Rules for the Detection Engine.

September 02, 2020

  • Chronicle User View

    Enables customers to better understand how users within an enterprise might be impacted by security events. By focusing on the behavior of individual users, security administrators can search for activity indicating an account compromise or other security concern.

June 12, 2020

  • Chronicle Rules Engine API

    The Chronicle Rules Engine API now includes the StreamRuleNotifications method. This method enables you to continuously receive rules engine results over an HTTP stream as the results are discovered. Contact your Chronicle representative for more information.

  • Chronicle API Query Limits

    The query limits for the Chronicle Search API calls are now documented.

  • Chronicle Tooling and Management APIs

    The query limits for the Chronicle Tooling and Management API calls are now documented. Contact your Chronicle representative for more information.

  • Supported Data Sets

    Chronicle can now ingest and parse data from the following additional systems and services:

    • Access Management—Added support for OpenAM.
    • Audit—Added support for ManageEngine ADAudit Plus.
    • Authentication—Added support for Preempt, Symantec SiteMinder, and Thycotic.
    • Badging—Added support for Honeywell Pro-Watch.
    • Cloud—Added support for Microsoft Cloud Access Security Broker (CASB) and Salesforce.
    • DHCP—Added support for Linux DHCP Server.
    • Hypervisor—Added support for VMware ESXi JSON.
    • Intrusion Detection and Prevention—Added support for Juniper Intrusion Prevention System (IPS).
    • Security Management—Added support for AlgoSec, BeyondTrust, and DMP Entré.
    • Server—Added support for Microsoft Internet Information Services (IIS) and Microsoft SQL Server.

May 15, 2020

  • Chronicle Rules Engine API

    The Chronicle Rules Engine API now includes the Live Rules API. The Live Rules API enables you to run and manage security rules in real time. Once activated, a Live Rule monitors your incoming logs for threats until it is deleted or disabled. Contact your Chronicle representative for more information.

  • UDM Reference

    Location Metadata—Added the location metadata fields.

  • Supported Data Sets

    Chronicle can now ingest and parse data from the following additional systems and services:

    • ATP—Added support for Microsoft Defender ATP.
    • Antivirus—Added support for Bitdefender and Trend Micro.
    • Authentication—Added support for Cisco ACS and RSA Authentication Manager version 8.1.
    • EDR—Added support for Digital Guardian.
    • IDM and PAM—Added support for Cyberark.
    • NAC—Added support for Forescout.
    • VPN—Added support for Zscaler.

May 08, 2020

  • Chronicle Tooling API

    Helps partners to develop new parsers to normalize new log data types. Contact your Chronicle representative for more information.

  • Supported Data Sets

    Chronicle can now ingest and parse data from the following additional systems and services:

    • Alerts—Added support for Suricata.
    • Antivirus—Added support for Cisco.
    • Application—Added support for Microsoft Office 365.
    • Authentications—Added support for Aruba ClearPass, Cisco ISE, and Duo.
    • Deception—Added support for Acalvio.
    • EDR—For Red Canary customers, Chronicle can ingest EDR logs from Endgame.
    • Endpoint—Added support for McAfee ePolicy Orchestrator.
    • Firewall—Added support for Zscaler.
    • IoC—Added support for Emerging Threats Pro.
    • Router—Added support for Cisco.
    • SAAS—Added support for Cloudflare and Google G Suite Audit.
    • Switch—Added support for Cisco.
    • VPN—Added support for Pulse Connect Secure.

March 30, 2020

  • Chronicle User Guide

    Column sort—You can now sort columns on the Enterprise Insights page and from the Timeline sidebar lists.

  • Supported Data Sets

    Chronicle can now ingest and parse data from the following additional systems and services:

    • DHCP—Added support for Elastic Packetbeat.
    • DNS—Added support for Elastic Packetbeat.
    • EDR—Added support for ESET.
    • Mail Gateway—Added support for Barracuda Email Security and Mimecast Email Security.
    • Web Application Firewall—Added support for Citrix Netscaler.

March 19, 2020

  • Supported Data Sets

    Chronicle can now ingest and parse data from the following additional systems and services:

    • Traffic Management—Added support for F5 Big-IP Local Traffic Manager (LTM).
    • Unified Threat Management—Added support for Cisco Meraki.

January 01, 2020

  • Chronicle Partner Ingestion API

    Added the udmevents endpoint to enable you to send UDM events in batches.

  • Chronicle Search API

    Enables you to programmatically access your security data directly through API calls to Chronicle.

December 01, 2019

  • Chronicle Unified Data Model

    Describes how to generate properly constructed UDM events for consumption by Chronicle's cyber-security analytics platform.

July 01, 2019

  • Raw Log Scan

    Enables you to examine your raw unparsed logs.

  • Regular Expressions

    Enables you to search your raw logs using regular expressions.

  • Hash View

    Enables you to search for and investigate files based on their hash value.

June 01, 2019

  • Chronicle Data Flow Overview

    Information on how customer security data flows from customers to Chronicle and how Chronicle handles that data.

May 01, 2019

  • Chronicle Partner Ingestion API

    Enables you to forward raw logs directly to Chronicle.

March 01, 2019

  • Enterprise Insights

    Now includes the Procedural Filtering menu and lists all of the Assets with Alerts within your enterprise.

  • Viewing EDR Data in the Timeline

    Viewing Endpoint Detection and Response (EDR) data in the timeline.

  • Domain Context

    Analytics and insights from VirusTotal, EmergingThreats, WHOIS, and Department of Homeland Security's (DHS) Automated Indicator Sharing (AIS) data sources.

  • Investigating Domains and IP Addresses

    Searching for external IP addresses and URLs.

  • Chronicle Chrome Extension

    Search for indicators using the Chrome extension.