Splunk® Security Content

Release Notes

This documentation does not apply to the most recent version of Splunk® Security Content. For documentation on the most recent version, go to the latest release.

What's new

Enterprise Security Content Updates v4.7.0 was released on July 25, 2023. It includes the following enhancements.

New analytics

  • Citrix ADC Exploitation CVE-2023-3519
  • Windows Modify Registry EnableLinkedConnections
  • Windows Modify Registry LongPathsEnabled
  • Windows Modify Registry Risk Behavior
  • Windows Post Exploitation Risk Behavior
  • Windows Common Abused Cmd Shell Risk Behavior

Updated analytics

  • O365 Add App Role Assignment Grant User
  • MSHTML Module Load in Office Product
  • Office Document Spawned Child Process To Download
  • Office Product Spawn CMD Process
  • Office Product Spawning BITSAdmin
  • Office Product Spawning CertUtil
  • Office Product Spawning MSHTA
  • Office Product Spawning Rundll32 with no DLL
  • Office Product Spawning Windows Script Host

New analytics story

Other updates

  • Tagged several detection analytics to BlackByte Ransomware
  • Removed unused fields from detections.json for SSE API
  • Improved validation script for the csv lookup and yaml files
Last modified on 31 July, 2023
  What's in Splunk Security Content

This documentation applies to the following versions of Splunk® Security Content: 4.7.0


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters