Security Onion 2.3.130 is now available! It includes new features and resolves a few issues:
https://docs.securityonion.net/en/2.3/release-notes.html#changes
Dashboards
Security Onion 2.3.130 now includes a new Dashboards app!
- create a data table for a particular field using the action menu or by manually typing in a "groupby" option in the query bar
- add additional fields to that data table OR a new data table
- convert the data table(s) to a pie chart, bar chart, or Sankey diagram using the buttons in the Count column
Here's what it looks like in action!
If you're familiar with our Hunt interface, then you'll feel right at home in Dashboards. The main difference between Hunt and Dashboards is that Dashboards has a different set of default queries that give you one dashboard for each data type, providing a simplified experience. Also, the new capabilities of creating multiple data tables and converting to charts or diagrams carries over to Hunt to make your hunting that much more powerful!
You can read more about Dashboards at:
https://docs.securityonion.net/en/2.3/dashboards.html
Analyzers
This release also includes analyzers allowing you to quickly gather context around an observable. Analyzers can leverage multiple internal and external sources of data without ever having to leave SOC!
For example, let’s start by going to the OBSERVABLES tab inside of a case. From the screenshot below, we can see we are working with an observable of type hash and a value of 8a62d103168974fba9c61edab336038c. To start analysis for this observable, we click the lightning bolt icon to the left of the observable creation date. At this point, an analyzer job is enqueued for each analyzer that supports the hash data type and results will be returned once all analyzers have completed their analysis.
Here, we can see results for analysis against a local file, Team Cymru’s Malware Hash Registry, Alienvault OTX, Pulsedive, and VirusTotal. All of these analyzers were initiated automatically since they support the hash observable type.
Each analyzer will have a brief description of the outcome of the analysis, such as No results found, Further investigation needed, or Malicious. We can expand the details for each analyzer to find more information. For example, here are the malwarehashregistry and virustotal sections.
In addition to the hash data type, several other types are supported by analyzers, including domain, ip, url, and more – even ja3!
If the supported data types don’t fit your needs, you can use the localfile analyzer. This will allow you to leverage multiple CSV files if desired, utilizing a data type of other and providing threat intel or other associative information that could contribute to overall context.
In addition to the included analyzers, you can also write your own custom analyzers in Python if you need to leverage other data sources or perform analysis in a different manner.
Here’s what the analyzers feature looks like in action!
You can read more about Analyzers at:
https://docs.securityonion.net/en/2.3/cases.html#analyzers
Updates
This release also updates many components including:
- Elastic 7.17.4
- FleetDM 4.14.0
- Zeek 4.0.7
- ElastAlert 2.5.0
- Kratos 0.9.0-alpha.3
- attack-navigator 4.6.4
- TensorFlow 2.9.1
Custom Elasticsearch Templates
If you have custom Elasticsearch templates, please see:
https://docs.securityonion.net/en/2.3/elasticsearch.html#custom-templates
TheHive
As a reminder, we have fully transitioned from TheHive to Cases. TheHive is no longer included or supported.
Documentation
You can find our documentation here:
https://docs.securityonion.net/en/2.3/
Documentation is always a work in progress and some documentation may be missing or incorrect. Please let us know if you notice any issues.
New Installations
If you want to perform a new installation, please review the documentation and then you can find instructions here:
https://docs.securityonion.net/en/2.3/download.html
Existing 2.3 Installations
If you have an existing Security Onion 2.3 installation, please be aware that custom settings in Kibana may be overwritten during upgrade. If possible, we recommend that you test the upgrade process on a test deployment before deploying to production. If you have a distributed deployment, then we recommend monitoring SOC Grid while your update is running to verify that all nodes update properly. If there are issues, you can review logs, services, and containers for any additional clues. If you need help, please see our support information below.
For more information about the update process, please see:
https://docs.securityonion.net/en/2.3/soup.html
AWS Marketplace
For new Security Onion 2 installations on AWS, Security Onion 2.3.130 will soon be available on AWS Marketplace via the official Security Onion 2 AMI:
https://securityonion.net/aws/?ref=_ptnr_soc_blog_220607
AMI Documentation:
https://securityonion.net/docs/cloud-ami
Existing Security Onion 2 AMI users should use the "soup" command to upgrade:
https://docs.securityonion.net/en/2.3/soup.html
Azure Marketplace
For new Security Onion 2 installations on Azure, Security Onion 2.3.130 will soon be available on the Azure Marketplace!
https://securityonion.net/azure
Azure Documentation:
https://docs.securityonion.net/en/2.3/cloud-azure.html
Existing Security Onion 2 users on Azure should use the "soup" command to upgrade:
https://docs.securityonion.net/en/2.3/soup.html
Security Onion 16.04 EOL
As a reminder, Security Onion 16.04 has reached End Of Life (EOL):
https://blog.securityonion.net/2021/04/security-onion-1604-has-reached-end-of.html
If you're still running Security Onion 16.04, please see the following for upgrade options:
https://docs.securityonion.net/en/2.3/appendix.html
Questions or Problems
If you have questions or problems, please see our community support forum guidelines:
https://docs.securityonion.net/en/2.3/community-support.html
You can then find the community support forum at:
https://securityonion.net/discuss
Thanks
Lots of love went into this release!
Special thanks to all our folks working so hard to make this release happen!
- Josh Brower
- Jason Ertel
- Wes Lambert
- Josh Patterson
- Mike Reeves
Training
Need training? Start with our free Security Onion Essentials training and then take a look at some of our other official Security Onion training!
https://securityonion.net/training
Hardware Appliances
We know Security Onion's hardware needs, and our appliances are the perfect match for the platform. Leave the hardware research, testing, and support to us, so you can focus on what's important for your organization. Not only will you have confidence that your Security Onion deployment is running on the best-suited hardware, you will also be supporting future development and maintenance of the Security Onion project!
https://securityonionsolutions.com/hardware
Screenshot Tour
If you want the quickest and easiest way to try out Security Onion 2, just follow the screenshots below to install an Import node and then optionally enable the Analyst Workstation. This can be done in a minimal VM with only 4GB RAM! For more information, please see:
https://docs.securityonion.net/en/2.3/first-time-users.html
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.