All the latest changes and improvements to the Vectra AI Platform.
Vectra AI has introduced new detection coverage for Sliver Command & Control (C2) activity, an advanced framework used by red teams and threat actors to evade traditional defenses. Sliver’s use of encryption, layered encoders, and variable timing and data patterns allows it to disguise malicious beaconing within normal encrypted traffic. Vectra’s deep learning model identifies these subtle patterns without relying on payload inspection, leveraging the industry’s largest dataset of network behavior. This update enhances our current beaconing C2 algorithms, delivering stronger visibility into evasive C2 channels and helping security teams detect sophisticated adversary activity earlier in the attack chain.
Vectra AI has introduced a new detection that surfaces suspicious behaviors tied to modification of logging extensions for Window sand Linux VMs, Virtual Machine Scale Sets and Hybrid machines. This provides deeper visibility into suspicious activities that may indicate attempts to tamper with security monitoring (degraded vs fully disabled logs).
Enhancements have been introduced to the Azure Cryptomining detection to filter out behaviors tied to modification of existing compute instances. This improvement improves the fidelity of the alerting around creation of new compute instances. Customer should expect fewer alerts tied to this behavior in their environment.
Enhancements have been introduced across the following detections to improve breadth of coverage:
The following improvements have been made to algorithms since the last software release cycle. Customers that are connected to Vectra’s update service with Remote Support enabled have received these improvements. All other customers will be receiving the following improvements as part of this release:
Vectra’s AI-Triage now delivers expanded capabilities across the kill chain and modern networks, cutting detection volumes significantly. It automatically investigates and resolves benign alerts, reducing alert fatigue while preserving full visibility into real threats.
This custom-built, rigorously tested capability identifies low-risk patterns that consistently appear in your environment and resolves them automatically, keeping your team focused on meaningful risk.
Expect fewer benign detections across network C2, recon, Azure AD, M365, Copilot for M365, and AWS.
Visibility is never lost — resolved detections remain searchable, auditable, and fully traceable. No actions are taken on your behalf beyond resolution.
In November, Vectra will release Vectra AI Stitching with CrowdStrike EDR for all customers. This capability streamlines investigations by automatically finding the probable process related to a NDR detection and presenting it alongside the detection in the platform and when the event is collected via API.
This result is a more powerful NDR, less manual work, and better outcomes for security teams. What was the process driving C2 a browser or a PowerShell script, is it expected, or does it stand out, these are questions analysts must answer immediately, and this capability makes that instant.
To ensure smooth delivery of this capability we encourage all Crowdstrike customers to provide NGSIEM Read / NGSIEM Write permissions to support future collection of this information. Visit Crowdstrike EDR Integration FAQ for instructions on how to grant these permissions.
Vectra AI’s Attack Graph just got smarter with two powerful updates. C2 Blast Radius instantly reveals all hosts communicating with the same command-and-control endpoint, eliminating manual cross-referencing and speeding triage. Targeted Detections trace the initial point of compromise and attacker movement, giving analysts a clear lineage of how each host or account was reached. Together, these enhancements deliver sharper visibility, faster investigations, and more precise responses. Explore the Attack Graph FAQ for more capabilities.
All current and future files in Additional Resources > Downloads on our Support Portal now include a SHA256 hash to validate the file downloaded is the same as what was served from the Support Portal. Today this applies to OVA and Vectra Match file downloads.
Vectra AI has expanded its TLS/SSL cipher suite mapping to include the latest TLS 1.3 and modern cipher suites, ensuring encrypted sessions are accurately identified and displayed with clear, human-readable names. This update enhances visibility and accuracy in encrypted traffic analysis across Recall and Stream, with Advanced Investigations support planned for a future release.
Vectra AI now includes JA4L, JA4X, and JA4H fingerprints in metadata—bringing next-gen fingerprinting to encrypted traffic analysis. This powerful framework reduces collisions, links related sessions, and makes it easier to spot attacker infrastructure hiding behind common protocols. Analysts get clearer, faster insights with less noise and better context across detections. JA4+ is supported in Investigate (RUX), Stream, and Recall. Read more about the new attributes here.
With External App Alerts, the Vectra AI Platform delivers instant notifications to your team’s collaboration tools when critical security events occur, such as high-priority hosts or accounts and key system alerts. No more screen-watching or delayed responses — you get real-time intel that drives faster action. Available now with direct Microsoft Teams integration and Slack support coming soon. See External App Alerts for implementation details.
Vectra AI has introduced enhancements to improve both the breadth of behaviors and user agents covered by this detection. Updates to the parsing layer now filter user agents more accurately from logs, increasing fidelity, and reducing false positives.
Enhancements have been introduced across several detections to provide additional context and streamline investigative workflows:
Enhancements to the Azure Diagnostic Logging Disabled detection expand coverage to include deletion of logging extensions for both Windows and Linux VMs. This provides broader visibility into suspicious activities that may indicate attempts to disable security monitoring.
The following improvements have been made to algorithms since the last software release cycle. Customers that are connected to Vectra AI’s update service with Remote Support enabled have received these improvements. All other customers will be receiving the following improvements as part of 9.3:
Vectra AI and Zscaler have teamed up to eliminate blind spots in encrypted and direct-to-cloud traffic. Through integration with Zscaler Internet Access (ZIA), Vectra replays user traffic from secure PCAPs for full-spectrum threat detection—uncovering advanced C2 and exfiltration that traditional tools miss. It’s a game-changer for securing remote and cloud-first environments. For information see Vectra AI’s Press Release and Podcast. Please contact your Vectra AI account team if you are interested in enabling Vectra’s ZIA integration. See Zscaler ZIA Integration and Optimization for implementation details.
Vectra Match now makes it easier to detect known Indicators of Compromise (IOCs) with Suricata-compatible signatures—no external tools required. As of 9.3, you can manage, modify, enable, or disable rules directly in the platform, and your changes persist even after Emerging Threats updates. It’s faster to set up, simpler to maintain, and puts full control of detection logic in your hands. For more information visit Managing Vectra AI Match Rulesets.
Vectra AI is introducing the Executive Overview Report—your boardroom-ready security snapshot. Purpose-built for CISOs and security leaders, it delivers clear, high-impact metrics like noise-to-signal trends and evolving attack patterns. In minutes, you’ll have the insights to showcase Vectra’s impact, steer strategic decisions, and prove how you’re reducing breach risk—no deep dives required.
The new Attack Graph brings instant clarity to active threats by visually mapping how attackers move across your network, cloud, and identity environments. Powered by Vectra AI Prioritization, each threat is now displayed directly on the host or account page, giving you immediate insight into where the attack started, what systems it interacted with, and how its risk level evolved over time.
Security teams can choose from three intuitive views to investigate threats in the way that best suits their workflow:
This capability empowers SOC teams to act quickly and confidently by surfacing context and urgency in a single, actionable view. For more information visit the Attack Graph FAQ.
Vectra AI now includes JA4 and JA4S fingerprints in metadata, bringing next-gen fingerprinting to encrypted traffic analysis. This powerful framework reduces collisions, links related sessions, and makes it easier to spot attacker infrastructure hiding behind common protocols. Analysts get clearer, faster insights with less noise and better context across detections. JA4 is supported in Investigate (RUX), Stream, and Recall, with more from the JA4+ suite coming soon. Read more about the new attributes here.
Starting in 9.3, Vectra AI has introduced new Traffic Validation pages. These pages transform the Traffic Validation JSON report into an intuitive dashboard— displaying insights faster and without the hassle of parsing raw data. Key stats are automatically checked against predefined health thresholds, with clear red or yellow indicators highlighting areas that may need attention. For more information read the FAQ.
Vectra AI’s proprietary agentic AI just got smarter. Our upgraded AI-Triage algorithm now automatically investigates and resolves 50% of benign C&C and 25% of benign Recon detections, dramatically reducing benign events. It leverages both local patterns and global insights to deliver the clearest signal yet. For more details on AI-Triage, see the AI-Triage article and video.
Vectra AI Prioritization has been enhanced to better surface threats that mirror recent changes in attacker behavior. Expect better separation of high and critical threats, smarter prioritization across your environment and faster prioritization of threats. Note that some host and account’s threat and certainty scores may shift based on the updated scoring logic once your system is updated.
Vectra AI is introducing a new Best Practices series designed to help users get the most out of key features in the Vectra AI Platform. The first release in this series focuses on Triage. The Triage Best Practices guide includes common terminology, when and why to triage, how-to instructions, FAQs, and much more. Visit the Triage Best Practices article to hone your Triage workflow.
Vectra AI has removed the VirusTotal integration from Quadrant UX due to licensing changes. The External Destination popup no longer displays VirusTotal data, and a full UI cleanup is coming in the next release to avoid confusion. For feedback or questions on this removal, contact your Vectra AI account team.
Vectra AI has introduced three new detections to surface suspicious behaviors surrounding the use of AWS S3 in the impact and exfil stages of the cloud kill chain:
Enhancements have been introduced to the following AAD, Microsoft 365, and Azure detections to better account for the risk of the underlying behaviors and surface them promptly for review. Introduction of these enhancements may result in changes to the number of entities prioritized within the Vectra AI Platform:
The following improvements have been made to algorithms since the last software release cycle. Customers that are connected to Vectra AI’s update service with Remote Support enabled have received these improvements. All other customers will be receiving the following improvements as part of 9.3:
Vectra AI has enhanced the Attack Graph with two powerful new capabilities. First, analysts can now see detections directly targeting the entity they’re investigating, making it easier to answer the question: “How did this entity get compromised?” This helps quickly pinpoint “patient zero” even in complex lateral movement scenarios. Second, the Attack Graph now visualizes the blast radius of command-and-control (C2) channels, automatically expanding to show all entities tied to the same malicious domain or IP. Together, these upgrades accelerate investigations, reveal hidden links, and give teams complete context to stop attacks faster.
We’re excited to share that Five Minute Hunts are now live in Advanced Investigations. These guided hunts surface meaningful insights in metadata without requiring customers to master SQL or specialized terminology. Security teams can quickly uncover attacker patterns, demonstrate proactive “peace-time” value, and boost efficiency with just a few clicks. Behind the scenes, the feature is powered by our flexible content delivery framework—complete with adaptive layouts, smooth animations, and engaging visuals for a seamless analyst experience.
With External App Alerts, Vectra AI delivers instant notifications to your team’s collaboration tools when critical security events occur, such as high-priority hosts or accounts and key system alerts. No more screen-watching or delayed responses — you get real-time intel that drives faster action. Available now with direct Microsoft Teams integration and Slack support coming soon. See External App Alerts for implementation details.
Vectra AI now includes JA4, JA4S, JA4L, JA4X, and JA4H fingerprints in metadata—bringing next-gen fingerprinting to encrypted traffic analysis. This powerful framework reduces collisions, links related sessions, and makes it easier to spot attacker infrastructure hiding behind common protocols. Analysts get clearer, faster insights with less noise and better context across detections. JA4+ is supported in Investigate (RUX), Stream, and Recall. Read more about the new attributes here.
Vectra AI has made Azure CDR easier to use by replacing confusing UUIDs with clear, human-readable names. Account names in the REST API now reflect recognizable Entra IDs, while detection activity surfaces intuitive object and application names. Analysts no longer need to decode raw IDs—making triage faster, investigations smoother, and dashboards more actionable.
Seamlessly bring your existing AD groups into Vectra and keep them perfectly in sync—no more manual recreations or tedious upkeep. Bulk import eliminates repetitive admin work, so your teams can focus on threat hunting, not group management. By streamlining triage rules and reducing noise, you’ll act faster on the alerts that truly matter. This is efficiency and signal clarity, built right in. Visit Active Directory (AD) Groups for more information.
Vectra AI and Zscaler have teamed up to eliminate blind spots in encrypted and direct-to-cloud traffic. Through integration with Zscaler Internet Access (ZIA), Vectra replays user traffic from secure PCAPs for full-spectrum threat detection—uncovering advanced C2 and exfiltration that traditional tools miss. It’s a game-changer for securing remote and cloud-first environments. For information see Vectra’s Press Release and Podcast. Please contact your Vectra account team if you are interested in enabling Vectra’s ZIA integration. See Zscaler ZIA Integration and Optimization for implementation details.
Vectra AI now brings signal efficacy metrics directly into CISO reports—showing how detections and entities were resolved as benign, remediated, or unclassified. This added context proves the value of detections that mattered most to analysts and highlights remediation outcomes at a glance. Executives get clear visibility into threat quality, empowering smarter security decisions and demonstrating measurable value from Vectra.
Vectra AI introduces the Network Discovery Dashboard, a powerful new way to explore your environment with an interactive network map. Analysts can now trace hosts and IPs visually, spot anomalies in context, and accelerate investigations with intuitive navigation. This dashboard simplifies complex environments, turning raw network data into actionable insights for faster, more confident threat response.
Starting in 9.2, Vectra is introducing additional Brain offerings hosted in Google Cloud Platform, or GCP. The new GCP Brains are capable of handling 5Gb/s and 15Gb/s and support all the same features as other Cloud/Virtual/Hardware Brains.
Starting in 9.2, Vectra supports getting group members from the /groups endpoint. For more information see: https://support.vectra.ai/vectra/article/KB-VS-1638
Vectra AI has introduced AI Triage, its proprietary agentic AI solution to its AWS and Azure coverage portfolios. AI-Triage now auto-investigates AWS Cloud and Azure Cloud alerts based on factors such as prevalence and threat profiles to filter benign activities in customers' environments. The impact of AI-Triage is a reduction in prioritized entities and corresponding investigation workloads for SOC analysts.
Vectra AI is expanding the coverage of the Suspect Protocol Activity detections. Now, Suspect Protocol Activity includes detections covering Internal Lateral/Recon attacks and supports LDAP, Kerberos, NTLM, and SMB protocols. This feature is off by default but can be customer enabled and is included as part of the standard Detect product line. For more information on SPA, please see https://support.vectra.ai/s/article/KB-VS-1793.
Vectra AI is expanding the coverage of the Suspect Protocol Activity detections. Now, SPA can detect brute force attempts over all protocols. This rule detects brute force attacks where an attacker attempts multiple authentication requests in a short period. Brute force attacks can target various protocols such as SMB, LDAP, FTP, RDP, SSH, and HTTP, and are often used by adversaries to gain unauthorized access to accounts.
Vectra AI has introduced a new detection for NTLM Relay Activity. This enhances Vectra’s visibility into lateral movement techniques used by attackers. This detection identifies attempts to exploit NTLM authentication by observing when an attacker queries one host and relays the captured authentication to another host—often as part of privilege escalation or domain compromise efforts.
Vectra AI has introduced a new detection for discovery behaviors surrounding M365 CoPilot. The new M365 CoPilot Sensitive Data Discovery detection where a CoPilot session was leveraged by an identity to access file(s) that may contain sensitive information. This detection aims to surface threat actors that use an account in the environment to discover sensitive information.
Vectra AI has introduced four new detections to surface suspicious behaviors surrounding the use of AWS Bedrock, a fully managed service offered by AWS that simplifies building and deploying generative AI applications.
Significantly reduced benign prioritization alerts through improvements to Vectra’s AI prioritization algorithm and detection updates. In some cases, customers may see up to 50% fewer prioritized host and account alerts—without sacrificing coverage for real threats.
The following improvements have been made to algorithms since the last software release cycle. Customers that are connected to Vectra’s update service with Remote Support enabled have received these improvements. All other customers will be receiving the following improvements as part of 9.2:
Vectra AI’s proprietary agentic AI just got smarter. Our upgraded AI-Triage algorithm now automatically investigates and resolves 50% of benign C&C and 25% of benign Recon detections—dramatically reducing benign events. It leverages both local patterns and global insights to deliver the clearest signal yet. For more details on AI-Triage, see the AI-Triage KB and our recent update video.
Vectra AI has introduced four new detections to surface suspicious behaviors surrounding the use of AWS Bedrock, a fully managed service offered by AWS that simplifies building and deploying generative AI applications.
Vectra AI has introduced three new detections to surface suspicious behaviors surrounding the use of AWS S3 in the impact and exfil stages of the cloud kill chain:
Vectra AI has streamlined Azure CDR enablement with a new Redirector Service fix. Customers can now seamlessly deploy Azure CDR without VPN or IP restrictions blocking the setup. This removes friction in onboarding cloud telemetry, ensuring faster time-to-value and immediate visibility into Azure threats. Security teams get quicker coverage with less hassle.
Vectra Match now makes it easier to detect known Indicators of Compromise (IOCs) with Suricata-compatible signatures—no external tools required. As of 9.3, you can manage, modify, enable, or disable rules directly in the platform, and your changes persist even after Emerging Threats updates. It’s faster to set up, simpler to maintain, and puts full control of detection logic in your hands. For more information visit Managing Vectra Match Rulesets.
Vectra is introducing the Executive Overview report on the Vectra AI Platform. This report is catered to CISOs and security executives who need to bring high-level metrics to their board or executive-level meetings. Metrics include noise to signal tunnel, investigation time saved with Vectra, attack trends, and more. This report allows executives to make strategic decisions and evaluate how Vectra reduces security breach risk for their organization.
Global View enables large enterprises and MSSPs to centrally manage and investigate threats across multiple Brains and tenants from a single RUX deployment—making it ideal for global operations with complex environments.
The new Attack Graph brings instant clarity to active threats by visually mapping how attackers move across your network, cloud, and identity environments. Powered by Vectra’s AI-Prioritization, each threat is now displayed directly on the host or account page—giving you immediate insight into where the attack started, what systems it interacted with, and how its risk level evolved over time.
Security teams can choose from three intuitive views to investigate threats in the way that best suits their workflow:
This capability empowers SOC teams to act quickly and confidently by surfacing context and urgency in a single, actionable view.
We've resolved an issue that prevented some customers—particularly those in large RUX environments—from downloading the Network Traffic Validation Report when its size exceeded approximately 6MB. The workflow has been enhanced to support larger report downloads, ensuring reliable access to traffic validation data regardless of report size.
Starting in 9.1, Vectra is introducing the new X47 and M47 systems. Like other X-series systems, the X47 can be deployed as a Brain, Sensor, or in Mixed mode. The M47 supports Vectra Stream at up to 75 Gbps rates. The hardware features 4x1Gbps Copper and 2 x 10/25 Gbps SFP28. For more information about the appliance specs, please see the Appliance and Sensor Specifications.
For the deployment guides please see the X47 Quick Start Guide or M47 Quick Start Guide.
Starting in 9.1, Vectra supports conversion between static and dynamic group types for QUX deployments. Existing triage filters that reference a static group, will continue to function without requiring any change after the group is redefined using a regex in the dynamic group configuration. This should allow for greater flexibility and ease of implementation as customers move to dynamic groups. For more information on dynamic groups see the Dynamic Groups FAQ.
Starting in 9.1, Vectra AI now supports Elliptic Curve Cryptography (ECC) certificates. Customers can upload their own certificate via the existing commands. Additionally, the commands supporting Certificate Signing Request (CSR) have been updated. Use:
For full certificate installation details, please see: SSL Certificate Installation (Quadrant UX only).
Vectra AI has upgraded the Suricata to support new features in the Suricata engine including JA4 and we have enabled protocol parsing for OT protocols. The suricata.yaml base configuration has also been upgraded to reflect the latest Suricata features. For details on Vectra’s Suricata configuration please see: Vectra Match Suricata Configuration.
Vectra ai has updated the QUX v2.x APIs to include support for OAuh2 authentication. Now, both the existing Personal Access Token (PAT) and Oauth2 flow are supported in v2.x. The Oauth2 access token will be valid for 6 hours after which it will expire, and a new token will need to be requested using the API client credentials. API client creation must be done in the Vectra UI only. Accessing v2.x APIs older than v2.5 works the same way it does for v2.5. The public postman collection has been updated for all v2.x versions. For more information see: REST API Quick Start Guide for Postman v2.5 using OAuth2 (QUX).
The Hidden Tunnel detection has been improved to identify new beaconless connections which are contacting external systems. This enhancement provides new coverage for hidden tunnel command line based beaconless attack tools. For more information about the Hidden Tunnel detection in general, please see Understanding Vectra AI Detections.
The RDP Recon detection has been enhanced to detect RDP Password Spray attacks which an attacker can attempt to test a small number of passwords against a large number of accounts. The previous version of RDP Recon focused on an attacker attempting to try a large number of passwords against an account, this enhancement extends the RDP Recon to cover scenarios where a very shallow brute force attack is conducted across many accounts.
Enhancements have been introduced to the following AWS detections to improve the fidelity associated with them. Introduction of these enhancements results in broader coverage of malicious behaviors and may be associated with minor increases in prioritized entities within customer environments.
Significantly reduced benign prioritization alerts through improvements to Vectra’s AI prioritization algorithm and detection updates. In some cases, customers may see up to 50% fewer prioritized host and account alerts—without sacrificing coverage for real threats.
The following improvements have been made to algorithms since the last software release cycle. Customers that are connected to Vectra’s Update service with Remote Support enabled have received these improvements. All other customers will be receiving the following improvements as part of 9.1:
We've enhanced the search functionality on the Detections page to support searching by Sensor Name instead of the internal Sensor LUID. This update addresses customer feedback and makes it easier to find detections associated with specific sensors using recognizable names.
In response to strong customer interest, we’re expanding protection against potential abuse of Microsoft Copilot. In addition to the existing M365 Suspicious Copilot Access detection (which flags access from unusual locations), we’re introducing a new detection: M365 Copilot Sensitive Data Discovery. This identifies attacker behavior attempting to locate sensitive documents through Copilot in Microsoft 365.
Vectra now surfaces tailored attack profiles when detections span multiple attack surfaces, helping to identify complex threats with greater clarity. Two new profile types have been introduced:
These profiles are designed to reflect the nature of hybrid threats and enhance threat context in the UI.
Vectra is enhancing support for Azure detections by enabling AI Triage for Azure CDR (Cloud Detection and Response) alerts. For each existing Azure detection type, we are evaluating and applying appropriate AI distillation algorithms, defining relevant context fields, and addressing any specific handling requirements. This will help surface high-fidelity insights more efficiently and improve detection clarity within the platform.
Starting in 9.0, Vectra AI now supports Dynamic Groups on the Quadrant UX. Dynamic Groups is a feature on the Vectra AI Platform that allows customers to use Regex rules to define what hosts or accounts should belong to each triage group, resulting in entities being automatically sorted into groups as they are detected. This feature will reduce the amount of time customers spend managing and updating groups. Respond UX support for this feature was introduced in December 2024. For more information see: https://support.vectra.ai/s/article/KB-VS-1839.
Vectra ai has created a new 64 core variant of the GCP Brain and validated the existing 96 core Brain to support higher overall throughput than previously published. Please see the GCP Brain Deployment Guide for details.
Starting in 9.0, Vectra AI added automatic proxy support for Match and SPA. While no user action is required, additional variables for Match are available. Please see the Match FAQ for more details: https://support.vectra.ai/s/article/KB-VS-1635.
Starting in 9.0, Vectra added support to view the southside learned list proxy IPs via command line. Southside Proxies identify Proxies where Vectra sits between the Client and the Proxy. This differs from Northside proxies which are configured under Manage -> Proxies in the UI. Use “show proxy --southside" to display southside proxies that the system has learned from observing the network traffic.
Starting in 9.0, Vectra AI has added new fields to the Enhanced Network Traffic Validation report available on the Network Stats page. The new fields include statistics on NIC errors, packet truncation, and drops/holes in traffic. For more information see: https://support.vectra.ais/article/KB-VS-1648.
Starting in 9.0, Vectra now supports the use of the S1’s two onboard SFP+ interfaces for capture or management. The command “set management <default|sfp>” will alter the interface configuration for the MGT1 port. The command “set capture <default|sfp>” will alter the interface assignment used for capture. This creates 4 total configurations for management or capture. All options with new interface assignment diagrams for each are detailed in the S1 Quick Start Guide. Please note: The rated throughput of the S1 appliance does not change when using SFP+ ports. This only changes the physical interface assignments. Care should be taken to only forward a supported amount of traffic to the S1.
The X29/M29 appliances have an option to configure one of their SFP+ interfaces to be used as the MGT1 management port. The command has changed in version 9.0 to be consistent with the command syntax that is used now for all appliances that offer options to change similar interface options. The old command was “set management speed <1G|10G>” and the new command is “set management <default|sfp>”. Please see the X29 Quick Start Guide or the M29 Quick Start Guide for details.
Enhancements have been introduced to the following AWS detections to improve the fidelity associated with them. Introduction of these enhancements results in broader coverage of malicious behaviors and may be associated with minor increases in prioritized entities within customer environments.
Enhancements have been introduced to the following Microsoft 365 detections to better account for the risk of the underlying behaviors and surface them promptly for review. Introduction of these enhancements may result in changes to the number of entities prioritized within the Vectra platform:
Vectra supports both the existing Personal Access Token (PAT) and Oauth2 flow in v2.x. The Oauth2 access token will be valid for 6 hours after which it will expire, and a new token will need to be requested using the API client credentials. API client creation must be done in the Vectra UI only. Accessing v2.x APIs older than v2.5 works the same way it does for v2.5. The public postman collection has been updated for all v2.x versions.
Vectra now supports Microsoft 365 Government Community Cloud (GCC) environments. While support previously existed for GCC-High and Azure AD customers, this update extends coverage to customers operating in GCC environments—commonly used by U.S. state, local, and federal agencies. By integrating with Microsoft’s GCC-specific endpoints, Vectra AI ensures secure and compliant log aggregation to provide complete visibility and threat detection across all Microsoft government cloud tiers.
Vectra added support for ingesting EDR alerts from Cybereason. Customers using Cybereason can now configure their integration within Cantina to enable alert ingestion and visibility.
Starting in 9.1, Vectra supports conversion between static and dynamic group types for QUX deployments. Existing triage filters that reference a static group, will continue to function without requiring any change after the group is redefined using a regex in the dynamic group configuration. This should allow for greater flexibility and ease of implementation as customers move to dynamic groups. For more information on dynamic groups see the Dynamic Groups FAQ
Users can now disable DNS reply packet inspection within the Settings page. A warning message will appear if selected to inform users that disabling DNS reply packet logging may impact related detections.
Users can now pivot into Advanced Investigations from key data points outside the Advanced Investigations page. This update introduces a new menu to the Last Seen IP field within the Host cards on the Respond page. When hovering over the Last Seen IP field, users can select a query containing the IP address and pivot directly into the results of the query on the Advanced investigations page.
To support the growing number of dashboards, the navigation has been updated from horizontal tabs to a collapsible vertical sidebar. This redesign offers a more scalable and user-friendly way for users to access and manage dashboards.
This update adds support for reconciling Federated accounts in EntraID with their corresponding User Principal Names (UPNs), including alignment with matching Azure CDR entities and M365/AzureAD accounts.
Starting in 8.10, Vectra has improved the Backup downtime to take less than ten minutes to complete. The usability of the backup function remains the same, this solution introduces a drastically reduced completion time for backups.
Starting in 8.10, Vectra is increasing the bandwidth capabilities of VMWare vSensors. The VMWare Sensors are capable of handling 20Gb/s of traffic and support all the same features as other Cloud/Virtual/Hardware Sensors. For more information, please see our deployment guide: https://support.vectra.ai/s/article/KB-VS-1075
As part of the 8.10 release, Vectra has improved our Hidden DNS Tunnel detection to detect scenarios where an attacker may attempt to exfiltrate data over DNS using techniques where the server does not respond (thus the tunnel is only a one sided tunnel where the attacker streams the data from In to Out.).
Enhancements have been introduced to the following Microsoft 365 and Azure AD detections to better account for the risk of the underlying behaviors and surface them promptly for review. Introduction of these enhancements may result in changes to the number of entities prioritized within the Vectra platform:
M365 SecOps Mailbox Change: This detection alerts when the configuration associated with a SecOps account is changed.
Vectra AI adds AI-powered detections that expose attacker behaviors targeting Microsoft Azure cloud services and Microsoft Copilot delivering much needed reinforcements for customers’ native tools:
Groups have been extended to support dynamic membership through the definition of a Regular Expression (RegEx) to describe the names of members to include. This delivers an enormous saving of operational effort in managing groups for triage or scoring. Group membership is evaluated at run-time, to ensure new entities are correctly categorized with no additional effort from you. This applies to groups for hosts or accounts.
Streamlining the query management process within Respond UX’s Advanced Investigation experience through the ability to save and share queries.
Analysts will be able to create, save, update, and delete queries seamlessly reducing repetition and promoting reuse. Analysts will also be able to share saved queries with other analysts will foster collaboration and knowledge sharing within teams.
We now support Respond UX deployments within Switzerland. This enables Swiss customers to host within their own borders if required. This new region supports all Vectra products.
With this release, we now fully support selective PCAPs for our Respond UX network customers. This feature enables you to leverage the Vectra sensor footprint to run a customized packet capture remotely – without having to get access to local infrastructure.
With this release, Vectra has introduced a downloadable link that allows users to retrieve the curated ruleset for Vectra Match. A new link will appear in the UI on the Vectra Match page for updated daily content, as well as consumable via API. Please see Vectra Match Curated Ruleset for more details.
This is a new dashboard in Respond UX for M365 focused on organization-wide Copilot usage. Use this dashboard to understand Copilot usage within your organization, and what files are being accessed by Copilot.
New API endpoint on the V3 Respond UX API to give visibility into integrations such as EDR, AD, etc enabling you to monitor these critical integrations over time.
With this release, Vectra Match is supported in Respond UX. Respond UX support brings all the WebUI and API support delivered in Quadrant UX and adds Instant and Advanced Investigation support for Match alerts. Please see the Match Deployment Guide for additional details.
New API endpoint on the V3 Respond UX API to manage standalone users within your Respond UX tenant. Use this API to provision or deprovision users automatically from your onboarding or offboarding playbooks.
AzureAD Account Automatic Lockdown is designed to empower Vectra users with proactive defense mechanisms against threats. By enabling this feature, you can now configure two pivotal settings: Urgency Score and Entity Importance. This dual-configuration approach ensures that when an entity surpasses predefined thresholds of Urgency Score and Importance, it automatically enters a lockdown state for a set duration configured by the user. This period allows for thorough investigation, ensuring that potential threats are investigated and responded to effectively.
Initial release of a new Threat Surface dashboard for our Respond UX network customers. This dashboard unveils a wealth of information about your environment and exposes attack surface and compliance issues. Leverage this dashboard to explore legacy and deprecated protocol use within your environment, and ensure compliance with your established policies for areas such as SMBv1.
By default, CloudTrail populates S3 buckets by putObject events. Upon ingest Vectra was discarding events populated with the copyObject command. With this change, Vectra ingests events created using copyObject or putObject.
For customers with options to lockdown both AzureAD and AD accounts (customers with network and Detect for AzureAD), we have harmonized the experience to give a better overall experience – integrating these two different capabilities and enabling greater visibility and selectivity for the action you want to perform. Choose to lock down either Azure AD or AD, or both, all from the same experience.
AD Account Automatic Lockdown is designed to empower Vectra users with proactive defense mechanisms against threats. By enabling this feature, you can now configure two pivotal settings: Urgency Score and Entity Importance. This dual-configuration approach ensures that when an entity surpasses predefined thresholds of Urgency Score and Importance, it automatically enters a lockdown state for a set duration configured by the user. This period allows for thorough investigation, ensuring that potential threats are investigated and responded to effectively.
This enhancement gives Respond UX administrators the familiar look and feel of the user management interface offered on our Quadrant UX platform. Admins can now easily manage users and their roles, ensuring utmost accuracy when provisioning users and auditing system access.
Vectra has introduced the ability to detect attackers who compromise an identity and accesses it from a public cloud provider, such as Amazon, Azure or GCP to attempt evade detection and hide their true location. The detection uses machine learning to identify whether a user normally accesses their account from the public cloud. Bening alerts may trigger when a user uses an application that routes through a public cloud or cloud hosted virtual machines. This new alert will prioritize an account when it occurs with other alerts in a similar manner to the Azure AD Suspicious Sign-On alert.