Tuesday, June 7, 2022

Security Onion 2.3.130 now available including Dashboards, Analyzers, and much more!

Security Onion 2.3.130 is now available! It includes new features and resolves a few issues:


Security Onion 2.3.130 now includes a new Dashboards app!

The new Dashboards app includes an entire set of pre-built dashboards for our standard data types.

In addition to the pre-built dashboards, you can make your own dashboards very quickly and easily:
  • create a data table for a particular field using the action menu or by manually typing in a "groupby" option in the query bar

  • add additional fields to that data table OR a new data table

  • convert the data table(s) to a pie chart, bar chart, or Sankey diagram using the buttons in the Count column

Here's what it looks like in action!

If you're familiar with our Hunt interface, then you'll feel right at home in Dashboards. The main difference between Hunt and Dashboards is that Dashboards has a different set of default queries that give you one dashboard for each data type, providing a simplified experience. Also, the new capabilities of creating multiple data tables and converting to charts or diagrams carries over to Hunt to make your hunting that much more powerful!

You can read more about Dashboards at:


This release also includes analyzers allowing you to quickly gather context around an observable. Analyzers can leverage multiple internal and external sources of data without ever having to leave SOC!

For example, let’s start by going to the OBSERVABLES tab inside of a case. From the screenshot below, we can see we are working with an observable of type hash and a value of 8a62d103168974fba9c61edab336038c. To start analysis for this observable, we click the lightning bolt icon to the left of the observable creation date. At this point, an analyzer job is enqueued for each analyzer that supports the hash data type and results will be returned once all analyzers have completed their analysis.

Here, we can see results for analysis against a local file, Team Cymru’s Malware Hash Registry, Alienvault OTX, Pulsedive, and VirusTotal. All of these analyzers were initiated automatically since they support the hash observable type.

Each analyzer will have a brief description of the outcome of the analysis, such as No results found, Further investigation needed, or Malicious. We can expand the details for each analyzer to find more information. For example, here are the malwarehashregistry and virustotal sections.

In addition to the hash data type, several other types are supported by analyzers, including domain, ip, url, and more – even ja3!

If the supported data types don’t fit your needs, you can use the localfile analyzer. This will allow you to leverage multiple CSV files if desired, utilizing a data type of other and providing threat intel or other associative information that could contribute to overall context.

In addition to the included analyzers, you can also write your own custom analyzers in Python if you need to leverage other data sources or perform analysis in a different manner.

Here’s what the analyzers feature looks like in action!

You can read more about Analyzers at:


This release also updates many components including:

  • Elastic 7.17.4
  • FleetDM 4.14.0
  • Zeek 4.0.7
  • ElastAlert 2.5.0
  • Kratos 0.9.0-alpha.3
  • attack-navigator 4.6.4
  • TensorFlow 2.9.1

Custom Elasticsearch Templates

If you have custom Elasticsearch templates, please see:


As a reminder, we have fully transitioned from TheHive to Cases. TheHive is no longer included or supported.


You can find our documentation here:

Documentation is always a work in progress and some documentation may be missing or incorrect. Please let us know if you notice any issues.

New Installations

If you want to perform a new installation, please review the documentation and then you can find instructions here:

Existing 2.3 Installations

If you have an existing Security Onion 2.3 installation, please be aware that custom settings in Kibana may be overwritten during upgrade. If possible, we recommend that you test the upgrade process on a test deployment before deploying to production. If you have a distributed deployment, then we recommend monitoring SOC Grid while your update is running to verify that all nodes update properly. If there are issues, you can review logs, services, and containers for any additional clues. If you need help, please see our support information below.

For more information about the update process, please see:

AWS Marketplace

For new Security Onion 2 installations on AWS, Security Onion 2.3.130 will soon be available on AWS Marketplace via the official Security Onion 2 AMI:

AMI Documentation:

Existing Security Onion 2 AMI users should use the "soup" command to upgrade:

Azure Marketplace

For new Security Onion 2 installations on Azure, Security Onion 2.3.130 will soon be available on the Azure Marketplace!

Azure Documentation:

Existing Security Onion 2 users on Azure should use the "soup" command to upgrade:

Security Onion 16.04 EOL

As a reminder, Security Onion 16.04 has reached End Of Life (EOL):

If you're still running Security Onion 16.04, please see the following for upgrade options:

Questions or Problems

If you have questions or problems, please see our community support forum guidelines:

You can then find the community support forum at:


Lots of love went into this release!

Special thanks to all our folks working so hard to make this release happen!

  • Josh Brower
  • Jason Ertel
  • Wes Lambert
  • Josh Patterson
  • Mike Reeves


Need training? Start with our free Security Onion Essentials training and then take a look at some of our other official Security Onion training!


Hardware Appliances

We know Security Onion's hardware needs, and our appliances are the perfect match for the platform. Leave the hardware research, testing, and support to us, so you can focus on what's important for your organization. Not only will you have confidence that your Security Onion deployment is running on the best-suited hardware, you will also be supporting future development and maintenance of the Security Onion project!


Screenshot Tour

If you want the quickest and easiest way to try out Security Onion 2, just follow the screenshots below to install an Import node and then optionally enable the Analyst Workstation. This can be done in a minimal VM with only 4GB RAM! For more information, please see:

No comments:

Search This Blog

Featured Post

New Security Onion Online Training Class - Detection Engineering with Security Onion!

We've just added an exciting new course to our online Security Onion 2.4 training catalog! It's called "Detection Engineering w...

Popular Posts

Blog Archive