What's new in ATA version 1.9
These release notes provide information about updates, new features, bug fixes, and known issues in this version of Advanced Threat Analytics.
New & updated detections
- Suspicious service creation: Attackers attempt to run a suspicious service on your network. ATA now raises an alert when it identifies that someone runs a new service, that seems suspicious, on a domain controller. This detection is based on events (not network traffic), for more information, see the Suspicious activity guide.
New reports to help you investigate
The Passwords exposed in cleartext enables you to detect when accounts, both sensitive and non-sensitive, send account credentials in plain text. This allows you to investigate and mitigate the use of LDAP simple bind in your environment, improving your network security level. This report replaces the service and sensitive account cleartext suspicious activity alerts.
The Lateral movement paths to sensitive accounts lists the sensitive accounts that are exposed via lateral movement paths. This enables you to mitigate these paths and harden your network to minimize the attack surface risk. This enables you to prevent lateral movement so that attackers can't move across your network between users and computers until they hit the virtual security jackpot: your sensitive admin account credentials.
ATA 1.9 includes a new and improved entity profile. The entity profile provides you with a dashboard designed for full deep-dive investigation of users, the resources they accessed, and their history. The entity profile also enables you to identify sensitive users who are accessible via lateral movement paths.
ATA 1.9 enables you to manually tag groups or accounts as sensitive to enhance detections. This tagging impacts many ATA detections, such as sensitive group modification detection and lateral movement path, rely on which groups and accounts are considered sensitive.
- The ATA Center infrastructure was improved for performance: the aggregated view of the traffic enables optimization of CPU and packet pipeline, and reuses sockets to the domain controllers to minimize SSL sessions to the DC.
- After a new version of ATA is installed, the What's new icon appears in the toolbar to let you know what was changed in the latest version. It also provides you with a link to the in-depth version changelog.
Removed and deprecated features
- The Broken trust suspicious activity alert was removed.
- The passwords exposed in clear text suspicious activity was removed. It was replaced by the Passwords exposed in clear text report.
We'd love to hear your thoughts. Choose the type you'd like to provide:
Our feedback system is built on GitHub Issues. Read more on our blog.