Skip to content

Conversation

@natasha-moore-elastic
Copy link
Contributor

@natasha-moore-elastic natasha-moore-elastic commented Jan 8, 2026

Resolves #7121: adds the 8.19.10 Security end Endpoint release notes.

Preview: 8.19.10

  1. Did you use a generative AI (GenAI) tool to assist in creating this contribution?
  • Yes
  • No

Tool(s) and model(s) used:
Cursor, claude-4.5-opus-high

@github-actions
Copy link

github-actions bot commented Jan 8, 2026

A documentation preview will be available soon.

Request a new doc build by commenting
  • Rebuild this PR: run docs-build
  • Rebuild this PR and all Elastic docs: run docs-build rebuild

run docs-build is much faster than run docs-build rebuild. A rebuild should only be needed in rare situations.

If your PR continues to fail for an unknown reason, the doc build pipeline may be broken. Elastic employees can check the pipeline status here.

Copy link
Contributor

@e40pud e40pud left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

natasha-moore-elastic and others added 2 commits January 9, 2026 09:01
Co-authored-by: Asuka Nakajima <asuka.nakajima@elastic.co>
* Adds support for multiple values in the indicator details flyout **Table** tab ({kibana-pull}236110[#236110]).
* Updates Gemini Connector configuration ({kibana-pull}245647[#245647]).
* Improves responsiveness on systems running {elastic-defend}.
* Improves the {elastic-defend} startup log to explain details about unsigned policies.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Improves the {elastic-defend} startup log to explain details about unsigned policies.
* Improves the {elastic-defend} startup log to explain details about unsigned policies.
* Optimizes the {elastic-defend} kernel driver to collect file and registry access events more efficiently, improving overall system responsiveness and reducing CPU usage.

* Fixes an issue where {elastic-defend} upgrades and uninstallations could fail on busy systems.
* Fixes a bug where {elastic-defend} on Linux could fail to initialize with {elastic-agent}.
* For {elastic-defend} on Linux, reduces the occurrence of policy failures related to malware protection system deadlock avoidance.
* Fixes an issue in {elastic-defend} on Windows where Mark of the Web parsing incorrectly handled file origin information ending with a `\\0`.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Fixes an issue in {elastic-defend} on Windows where Mark of the Web parsing incorrectly handled file origin information ending with a `\\0`.
* Fixes an issue in {elastic-defend} on Windows where Mark of the Web parsing incorrectly handled file origin information ending with a `\\0`.
* Reduces the occurrence of Linux {elastic-defend} policy failures due Malware protections system deadlock avoidance.
* Fixes an issue in {elastic-defend} that could result in delayed or missing malware-on-write alerts.
* Fixes a bug in {elastic-defend} on Windows that can sometimes result in `KERNEL_AUTO_BOOST_LOCK_ACQUISITION_WITH_RAISED_IRQL` or `PAGE_FAULT_IN_NONPAGED_AREA` bugchecks when [Offloaded Data Transfer (ODX)](https://learn.microsoft.com/en-us/windows-hardware/drivers/storage/offloaded-data-transfer) is used to copy files. This regression was introduced in {elastic-defend} versions 8.19.8, 9.1.8, and 9.2.2.

[discrete]
[[bug-fixes-8.19.10]]
==== Fixes
* Fixes an issue where the Security AI Assistant API didn't use an associated conversation's system prompt ({kibana-pull}248020[#248020]).
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Fixes an issue where the Security AI Assistant API didn't use an associated conversation's system prompt ({kibana-pull}248020[#248020]).
* Fixes an issue where the Security AI Assistant chat completion API didn't use an associated conversation's system prompt ({kibana-pull}248020[#248020]).

Sorry, missed this on my first pass. We should specify which API

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

9 participants