Products
This page includes release notes for the following Lastline products:
- Lastline Enterprise Hosted
- Lastline Analyst Hosted
Release notes for our On-Premises products are available separately:
This page includes release notes for the following Lastline products:
Release notes for our On-Premises products are available separately:
A new script pre-filtering component reduces the load on customer's infrastructure by filtering out clearly benign scripts from the sandbox analysis.
This new feature was tracked internally as FEAT-6141.
The Lastline API documentation includes a deprecation schedule for deprecated Portal API methods, as well as information on how to replace usage of these deprecated methods with supported methods.
As part of this release, we are making available the following versions of Lastline appliances for use with Lastline Defender Hosted:
The sensor ships with an updated version of the Suricata IDS Engine, updated to version 6.0.4. This leads to a number of performance and stability improvements as well as new security functionalities that may be leveraged in future releases.
This new feature was tracked internally as FEAT-7343
This release adds official support to Broadcom NIC cards based on the bnxt_en driver. While sniffing appliances using such NICs were supported in standard "compatibility mode" with reduced performance, starting with this release sniffing appliances will be able to leverage hardware acceleration to achieve better throughputs.
This new feature was tracked internally as FEAT-7205
SENT-3296 - Fix to an issue where a sniffing appliance with a large number of CPU threads or a large number of …continue.
The permalink features allows for a link to an interactive Malware Analysis report to be made available to others within the organization without the need to log in to the NSX Defender Portal to view the details. To create a shareable report permalink, click on the "Share Report" button when viewing an Analysis Report. This feature is being tracked by FEAT-6081.
The home network setting has become increasingly important to Defender functionality. Home network information is taken into account throughout the detection and correlation pipeline, and is important to ensure accurate detection, classification and correlation of relevant threats.
For this reason, if a user has not configured a home network setting for a sensor group, we now default to setting its home network to the standard RFC1918 private IP ranges:
A previous release extended the host tagging feature with Lastline-defined host tags. Assigning these non-editable tags to known hosts in your environment will provide increased accuracy to threat correlations and also prevent potentially unwanted correlations. The next release (2021.4) will add a campaign correlation rule that makes use of the "ll:vulnerability scanner" host tag to distinguish between malicious attacker-initiated vulnerability scans and scheduled benign scans. We recommended that hosts that perform benign vulnerability scans are tagged with the appropriate tag to ensure only malicious scans are correlated. Lastline-defined tags can be assigned to hosts …continue.
We are planning on changing the public IP addresses that are used by Lastline backend services to reflect our move away from an older datacenter provider to more scalable infrastructure.
These are the IP addresses assigned to lastline.com
contacted by Lastline appliances (such as log.lastline.com
, user.lastline.com
, management.lastline.com
, update.lastline.com
, and anonvpn.lastline.com
)
when accessing services like cloud APIs and image registries. This will affect both hosted and on-premise installations of all Lastline products.
It is required that these IP addresses are permitted by firewall rules to prevent service issues when these IP addresses are expected go live in August 2021.
The new IP address range …continue.