Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions packages/crowdstrike/_dev/build/docs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,10 @@

The [CrowdStrike](https://www.crowdstrike.com/) integration allows you to efficiently connect your CrowdStrike Falcon platform to Elastic for seamless onboarding of alerts and telemetry from CrowdStrike Falcon and Falcon Data Replicator. Elastic Security can leverage this data for security analytics including correlation, visualization, and incident response.

For a demo, refer to the following video (click to view).

[![CrowdStrike integration video](https://play.vidyard.com/VKKWSpg4sDEk1DBXATkyEP.jpg)](https://videos.elastic.co/watch/VKKWSpg4sDEk1DBXATkyEP)

### Compatibility

This integration is compatible with CrowdStrike Falcon SIEM Connector v2.0, REST API, and CrowdStrike Event Streams API.
Expand Down
5 changes: 5 additions & 0 deletions packages/crowdstrike/changelog.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "3.12.0"
changes:
- description: Improve documentation
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- description: Improve documentation
- description: Add demo video link to integration documentation.

type: enhancement
link: https://github.com/elastic/integrations/pull/17889
- version: "3.11.0"
changes:
- description: Append preserve_original_event in pipeline on_failure handlers to support error correction and debugging.
Expand Down
4 changes: 4 additions & 0 deletions packages/crowdstrike/docs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,10 @@

The [CrowdStrike](https://www.crowdstrike.com/) integration allows you to efficiently connect your CrowdStrike Falcon platform to Elastic for seamless onboarding of alerts and telemetry from CrowdStrike Falcon and Falcon Data Replicator. Elastic Security can leverage this data for security analytics including correlation, visualization, and incident response.

For a demo, refer to the following video (click to view).

[![CrowdStrike integration video](https://play.vidyard.com/VKKWSpg4sDEk1DBXATkyEP.jpg)](https://videos.elastic.co/watch/VKKWSpg4sDEk1DBXATkyEP)

### Compatibility

This integration is compatible with CrowdStrike Falcon SIEM Connector v2.0, REST API, and CrowdStrike Event Streams API.
Expand Down
2 changes: 1 addition & 1 deletion packages/crowdstrike/manifest.yml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: crowdstrike
title: CrowdStrike
version: "3.11.0"
version: "3.12.0"
description: Collect logs from Crowdstrike with Elastic Agent.
type: integration
format_version: "3.4.0"
Expand Down
4 changes: 4 additions & 0 deletions packages/m365_defender/_dev/build/docs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,10 @@ The [Microsoft Defender XDR](https://learn.microsoft.com/en-us/defender-xdr/) in

The integration works by collecting data from the Microsoft Azure Event Hub, Microsoft Graph Security REST API, and the Microsoft Defender Endpoint API.

For a demo, refer to the following video (click to view).

[![Microsoft Defender XDR integration video](https://play.vidyard.com/fSxgBbf7QArpgX345x28v5.jpg)](https://videos.elastic.co/watch/fSxgBbf7QArpgX345x28v5)

### Compatibility

This integration supports below API versions to collect data.
Expand Down
9 changes: 6 additions & 3 deletions packages/m365_defender/changelog.yml
Original file line number Diff line number Diff line change
@@ -1,14 +1,17 @@
# newer versions go on top
- version: "5.12.0"
changes:
- description: Improve documentation
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- description: Improve documentation
- description: Add demo video link to integration documentation.

type: enhancement
link: https://github.com/elastic/integrations/pull/17889
- version: "5.11.1"
changes:
- description: Fix table formatting in README.
type: bugfix
link: https://github.com/elastic/integrations/pull/17797
- version: "5.11.0"
changes:
- description: |
Add support for "CloudAuditEvents", "CloudProcessEvents", and
"CloudStorageAggregatedEvents" table in event data stream.
- description: "Add support for \"CloudAuditEvents\", \"CloudProcessEvents\", and \n\"CloudStorageAggregatedEvents\" table in event data stream.\n"
type: enhancement
link: https://github.com/elastic/integrations/pull/17612
- version: "5.10.1"
Expand Down
4 changes: 4 additions & 0 deletions packages/m365_defender/docs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,10 @@ The [Microsoft Defender XDR](https://learn.microsoft.com/en-us/defender-xdr/) in

The integration works by collecting data from the Microsoft Azure Event Hub, Microsoft Graph Security REST API, and the Microsoft Defender Endpoint API.

For a demo, refer to the following video (click to view).

[![Microsoft Defender XDR integration video](https://play.vidyard.com/fSxgBbf7QArpgX345x28v5.jpg)](https://videos.elastic.co/watch/fSxgBbf7QArpgX345x28v5)

### Compatibility

This integration supports below API versions to collect data.
Expand Down
2 changes: 1 addition & 1 deletion packages/m365_defender/manifest.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
format_version: "3.4.0"
name: m365_defender
title: Microsoft Defender XDR
version: "5.11.1"
version: "5.12.0"
description: Collect logs from Microsoft Defender XDR with Elastic Agent.
categories:
- "security"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,10 @@ This integration is for [Microsoft Defender for Endpoint](https://docs.microsoft

Microsoft Defender for Endpoint integration collects data for Alert, Machine, Machine Action, and Vulnerability logs using REST API.

For a demo, refer to the following video (click to view).

[![Microsoft Defender for Endpoint integration video](https://play.vidyard.com/fSxgBbf7QArpgX345x28v5.jpg)](https://videos.elastic.co/watch/fSxgBbf7QArpgX345x28v5)

## Data streams

This integration collects the following logs:
Expand Down
14 changes: 7 additions & 7 deletions packages/microsoft_defender_endpoint/changelog.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "4.5.0"
changes:
- description: Improve documentation
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- description: Improve documentation
- description: Add demo video link to integration documentation.

type: enhancement
link: https://github.com/elastic/integrations/pull/17889
- version: "4.4.0"
changes:
- description: Removed ECS field definitions from CDR transform destinations, now covered by ecs@mappings component template. Renamed overridden ECS fields files to ecs-overridden.yml.
Expand Down Expand Up @@ -40,10 +45,7 @@
Fetch vulnerability data using SoftwareVulnerabilitiesExport API endpoint.
type: enhancement
link: https://github.com/elastic/integrations/pull/15603
- description: |
The following fields are no longer available in the new implementation: "cloud.provider", "cloud.resource_id",
"cloud.instance.id", "host.geo", "host.ip", "host.risk.calculated_level", "related.ip",
"vulnerability.description", "vulnerability.published_date", "vulnerability.score.version".
- description: "The following fields are no longer available in the new implementation: \"cloud.provider\", \"cloud.resource_id\", \n\"cloud.instance.id\", \"host.geo\", \"host.ip\", \"host.risk.calculated_level\", \"related.ip\", \n\"vulnerability.description\", \"vulnerability.published_date\", \"vulnerability.score.version\".\n"
type: breaking-change
link: https://github.com/elastic/integrations/pull/15603
- version: "3.1.2"
Expand All @@ -68,9 +70,7 @@
link: https://github.com/elastic/integrations/pull/15226
- version: "3.0.0"
changes:
- description: |
Add mapping changes and latest transform in `vulnerability` data stream for
Cloud Detection and Response (CDR) vulnerability workflow.
- description: "Add mapping changes and latest transform in `vulnerability` data stream for \nCloud Detection and Response (CDR) vulnerability workflow.\n"
type: breaking-change
link: https://github.com/elastic/integrations/pull/14809
- version: "2.43.0"
Expand Down
4 changes: 4 additions & 0 deletions packages/microsoft_defender_endpoint/docs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,10 @@ This integration is for [Microsoft Defender for Endpoint](https://docs.microsoft

Microsoft Defender for Endpoint integration collects data for Alert, Machine, Machine Action, and Vulnerability logs using REST API.

For a demo, refer to the following video (click to view).

[![Microsoft Defender for Endpoint integration video](https://play.vidyard.com/fSxgBbf7QArpgX345x28v5.jpg)](https://videos.elastic.co/watch/fSxgBbf7QArpgX345x28v5)

## Data streams

This integration collects the following logs:
Expand Down
2 changes: 1 addition & 1 deletion packages/microsoft_defender_endpoint/manifest.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
format_version: "3.4.0"
name: microsoft_defender_endpoint
title: Microsoft Defender for Endpoint
version: "4.4.0"
version: "4.5.0"
description: Collect logs from Microsoft Defender for Endpoint with Elastic Agent.
categories:
- security
Expand Down
4 changes: 4 additions & 0 deletions packages/sentinel_one/_dev/build/docs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,12 @@

## Overview

The [SentinelOne](https://www.sentinelone.com/) integration collects and parses data from SentinelOne REST APIs. This integration also offers the capability to perform response actions on SentinelOne hosts directly through the Elastic Security interface (introduced with v8.12.0). Additional configuration is required; for detailed guidance, refer to [documentation](https://www.elastic.co/guide/en/security/current/response-actions-config.html).

Check notice on line 5 in packages/sentinel_one/_dev/build/docs/README.md

View workflow job for this annotation

GitHub Actions / Lint Documentation

Elastic.Semicolons: Use semicolons judiciously.

For a demo, refer to the following video (click to view).

[![SentinelOne integration video](https://play.vidyard.com/gQovyr6REJoU4eotQsnTTB.jpg)](https://videos.elastic.co/watch/gQovyr6REJoU4eotQsnTTB)

### Compatibility

This module has been tested against `SentinelOne Management Console API version 2.1`.
Expand Down
5 changes: 5 additions & 0 deletions packages/sentinel_one/changelog.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "2.5.0"
changes:
- description: Improve documentation
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- description: Improve documentation
- description: Add demo video link to integration documentation.

type: enhancement
link: https://github.com/elastic/integrations/pull/17889
- version: "2.4.1"
changes:
- description: Use triple-brace Mustache templating when referencing variables in ingest pipelines.
Expand Down
4 changes: 4 additions & 0 deletions packages/sentinel_one/docs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,12 @@

## Overview

The [SentinelOne](https://www.sentinelone.com/) integration collects and parses data from SentinelOne REST APIs. This integration also offers the capability to perform response actions on SentinelOne hosts directly through the Elastic Security interface (introduced with v8.12.0). Additional configuration is required; for detailed guidance, refer to [documentation](https://www.elastic.co/guide/en/security/current/response-actions-config.html).

Check notice on line 5 in packages/sentinel_one/docs/README.md

View workflow job for this annotation

GitHub Actions / Lint Documentation

Elastic.Semicolons: Use semicolons judiciously.

For a demo, refer to the following video (click to view).

[![SentinelOne integration video](https://play.vidyard.com/gQovyr6REJoU4eotQsnTTB.jpg)](https://videos.elastic.co/watch/gQovyr6REJoU4eotQsnTTB)

### Compatibility

This module has been tested against `SentinelOne Management Console API version 2.1`.
Expand Down
2 changes: 1 addition & 1 deletion packages/sentinel_one/manifest.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
format_version: "3.4.0"
name: sentinel_one
title: SentinelOne
version: "2.4.1"
version: "2.5.0"
description: Collect logs from SentinelOne with Elastic Agent.
type: integration
categories:
Expand Down
Loading