From 3fad5ae2130c21bb596c6545812a02293a598cef Mon Sep 17 00:00:00 2001 From: Janeen Mikell-Straughn <57149392+jmikell821@users.noreply.github.com> Date: Tue, 10 Nov 2020 18:08:30 -0500 Subject: [PATCH] [DOCS] What's new in 7.10. (#352) * updates for 7.10. * feedback/build fix. * removing links so the build can pass. --- docs/whats-new.asciidoc | 20 +++++++++++++++++--- 1 file changed, 17 insertions(+), 3 deletions(-) diff --git a/docs/whats-new.asciidoc b/docs/whats-new.asciidoc index c2d495566d..fbbd93778d 100644 --- a/docs/whats-new.asciidoc +++ b/docs/whats-new.asciidoc @@ -9,10 +9,24 @@ coming::[7.10.0] [discrete] -[[sec-ml-7.10-changes]] -=== Twelve new {anomaly-detect} configurations +[[sec-7.10-term-changes]] +=== Terminology changes + +* *Ingest Manager* has been renamed to *Fleet*. +* *Configuration* has been renamed to *Policy*. -{elastic-sec} now provides additional {anomaly-jobs} for {auditbeat} and +[discrete] +[[enhancements-7.10]] +=== New features +* New support for macOS 11.0 (Big Sur). +* Enhanced user interface for the <> page. +* Add <> to avoid performance or compatibility issues. +* New Event Correlation rule type>> based on {ref}/eql.html[EQL (Event Query Language)]. +* New Indicator Match rule type to create alerts for index field values that match threat indices. +* Free, open detections in the https://github.com/elastic/detection-rules#detection-rules[Detection Rules repo]. +* New <> that include detection alert actions. +* Connect and send <> to external systems (ServiceNow, Jira, Resilient) +* In addition to new <> for 7.10, {elastic-sec} now provides additional {anomaly-jobs} for {auditbeat} and {winlogbeat} data. Twelve new metadata and discovery analysis jobs have been added to enable threat detection on metadata services, system and discovery processes, and compiler events. For the full list, see <>.