January 22, 2026

Highlights

  • Added support for multi-signal alert investigations, breaking large SIEM cases into focused sub-investigations with a single consolidated conclusion.

  • Expanded integrations with Azure Monitor / Log Analytics (new) and Vectra AI (new), plus major enhancements across Microsoft, SentinelOne, CrowdStrike, and more.

New Features

Multi-Signal Alert Investigations

  • Added support for investigating multi-signal alerts by automatically breaking large SIEM cases into focused sub-investigations and generating a single consolidated conclusion.

Alert Reinvestigation Chains

  • Alert reinvestigation chains are now surfaced in the UI so you can see how an alert has evolved across multiple alert versions and investigations.

New Insight Tags

  • Added an Invalid Credentials insight tag to highlight investigations where authentication attempts fail across all observed attempts.

Customer action: Review and update your System Events / workflow rules (if applicable) to automatically de-prioritize these investigations when appropriate.

  • Added a Research Scanner insight tag that recognizes known internet-wide research scanners and can automatically treat related activity as benign when it meets defined criteria.

Integrations

Azure Monitor / Log Analytics

Vectra AI

Improvements

  • Reduced false positives across investigations by better recognizing expected activity (service accounts, test environments, MSP admin behavior, authorized security tools).

  • Improved identity threat detection for suspicious login attempts from uncommon hosting providers.

  • Improved Microsoft 365 file activity investigations using richer Microsoft Graph and audit telemetry where available.

  • Improved summarization for large query results across Microsoft Defender, Microsoft Sentinel, Google SecOps, and Sumo Logic.

  • Enhanced the context library with improved filtering and better links back to investigations.

  • Improved platform reliability and performance during upgrades, long-running investigations, and large query workloads.

Integration Improvements

SentinelOne

  • Added severity-based filtering options to restrict ingested alerts.

Microsoft Graph

  • Expanded Microsoft 365 audit and enrichment coverage for investigation context.

Microsoft Defender

  • Updated table mappings and expanded Advanced Hunting query coverage, including additional cloud activity scenarios.

Microsoft Sentinel

  • Improved performance with parallelized table queries.

  • Improved summarization of large query results.

  • Enhanced error handling for long-running queries.

Azure

  • Added automatic discovery of Log Analytics workspaces and table schemas to support richer queries.

Sumo Logic

  • Improved Windows event and email security querying.

  • Enhanced evidence handling when queries return no results.

  • Improved retry behavior for more consistent query results.

CrowdStrike

  • Added configurable case-name filtering for CrowdStrike Next-Gen SIEM cases.

Cato Networks

  • Improved evidence handling when no data is returned.

Okta

  • Improved user enrichment so it works even when only a username (not a full email address) is available.

GreyNoise

  • Improved identification of scanner-related activity to support scanner-aware insights.

ReversingLabs

  • Added stricter domain validation to prevent malformed lookups.

Custom Threat Intelligence

  • Improved indicator lookup reliability for asynchronous investigations.

Last updated

Was this helpful?