Splunk® Enterprise Security

Release Notes

This documentation does not apply to the most recent version of Splunk® Enterprise Security. For documentation on the most recent version, go to the latest release.

Fixed Issues for Splunk Enterprise Security

The following issues have been resolved for this version of Splunk Enterprise Security.

Inputs

Date resolved Issue number Description
2017-01-10 SOLNESS-11245, SOLNESS-11048 Threat Artifacts Showing 0 for File_Intel and IP_Intel

Uncategorized issues

Date resolved Issue number Description
2017-01-27 SOLNESS-11431, SOLNESS-10850 "$process$" in drill-down "Anomalous New Process" not properly escaped for Windows paths
2017-01-17 SOLNESS-11247, SOLNESS-9311 Incident Review: form tokens aren't passed to the URL when filtering dashboard
2017-01-06 SOLNESS-11146, SOLNESS-11005 reviewstatuses, governance, and correlationsearches collections do not refresh in SHC environments
2016-11-15 SOLNESS-10490, SOLNESS-10405, SOLNESS-10844 Drilldown from Adaptive Responses table on Incident Review fails if a custom adaptive response action includes the drilldown_uri parameter in the param._cam JSON blob but leaves its value blank
Last modified on 24 September, 2018
Release Notes for Splunk Enterprise Security   Known Issues for Splunk Enterprise Security

This documentation applies to the following versions of Splunk® Enterprise Security: 4.5.2


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters