Disclaimer: This document is for information purposes only. It is subject to change due to
ongoing product development by Uptycs. You should not interpret this information as a binding
commitment from Uptycs. Without prior written consent from Uptycs, you must not reproduce,
store, or transmit any part of this document through electronic or mechanical means, recording,
or any other method.
Extended Detection & Response
Enhancements
● The Detection Graph now includes an option to seamlessly add a blocking policy
to block a process based on the process path or hash.
● The Threat Sources page now has separate tabs to view and create threat and
vulnerability sources.
● The Roles page now includes a new permission: Report Schedule. This
permission allows users to view, modify, and delete other users' report schedules,
giving them greater control over the report workflow.
● The Summary Stats section on the Certificate Discovery page includes an option
to view certificates self-signed by a non CA.
● The Detection Details page includes an option to view the asset activity for the
asset on which the detection is triggered.
● The Asset Details page includes a clickable link for Non-compliances, allowing
you to access the Evidence Details page to view the non-compliance checks for
that asset.
Vulnerability
Enhancements
● The Vulnerability UI now includes essential path information on the Endpoint
Details, Image Details, and Container Details pages that provides clear insights
for informed risk assessment and remediation. This includes the following key
points:
○ Addition of path details on both the Vulnerability UI and CSV Download
reports
○ Single path display for a vulnerability and multiple paths condensed with
an ellipsis
○ Tooltip functionality offering a quick glance at up to 5 paths for in-depth
analysis
Cloud Security
New Features
Cross Tenant Analysis for Azure
- Added a new tab Cross Tenant on the Cloud Threat Investigation dashboard to analyze
activities across subscriptions within or outside the tenants. You can view activities
across tenants that provide the details of the role that was assumed to access from
other subscriptions.
Enhancements
AWS
● Added support for Okta Users on the IAM graph for Cloud Discovery. You can
search for Okta User from resource type and view the access graph and effective
permissions for the roles assumed by the Okta User.
● Added support for AWS HITRUST 11.1.0 compliance standard
Azure
● Added new telemetry table azure_cost_management_cost_usage for Cost
Management service.
● Identity Analytics enhancements:
○ Updated Azure identity graph to show additional services such as API
management, Container Registry based on the telemetry supported.
○ Added a Resource Group filter to view the Effective Permissions for resources
across the Resource Groups within the Subscription.
○ Added support to view Effective Permissions on subscription node.
GCP
● Added compliance check support for section 4.10 of GCP CIS 2.0.0
Kubernetes and Container Security
New Features
Network Exposure Risk For Kubernetes Pods and Namespaces
View internet exposure risk for pods and namespaces on the Kubernetes Overview graph. To
check for internet exposure, Uptycs checks the network policies deployed to the cluster and
namespaces and checks whether those allow for internet exposure. In addition, you can view
the Container Network Interface (CNI) details on the cluster overview cards.
On-Demand Registry Scanning
Support to re-scan images in registries scanned by Uptycs on-demand. This helps you scan
images that failed during init or push the first time the image was scanned.
Resolved Issues
● The issue with layers not displayed for vulnerable images on the Kubernetes >
Vulnerabilities page is now resolved.