<?xml version="1.0" encoding="UTF-8"?>
<!-- AUTOGENERATED FILE. DO NOT EDIT. -->
<feed xmlns="http://www.w3.org/2005/Atom">
  <id>tag:google.com,2016:chronicle-security-operations-release-notes</id>
  <title>Google SecOps - Release notes</title>
  <link rel="self" href="https://docs.cloud.google.com/feeds/chronicle-security-operations-release-notes.xml"/>
  <author>
    <name>Google Cloud Platform</name>
  </author>
  <updated>2026-04-08T00:00:00-07:00</updated>

  <entry>
    <title>April 08, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#April_08_2026</id>
    <updated>2026-04-08T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#April_08_2026"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p><strong>Emerging Threats Center general availability</strong></p>
<p>The <strong>Emerging Threats Center</strong> is now in General Availability (GA) and includes
the following new features and enhancements:</p>
<ul>
<li><strong>Expanded campaign filtering:</strong> Filter the Emerging Threats feed by new
categories, including associated malware, tools, and threat actors.</li>
<li><strong>MITRE ATT&amp;CK matrix visualization:</strong> Evaluate your detection rule coverage
for specific tactics, techniques, and procedures (TTPs) using the new
visualization matrix in the <strong>Associated Rules</strong> panel. You can customize
heat map metrics, filter the matrix by rule or alerting status, and view
detailed context for specific sub-techniques.</li>
<li><strong>Enhanced Entity context panel:</strong> Investigate an indicator of compromise (IoC)
using the <strong>Entity context</strong> panel to view its point-in-time state and related
cases.</li>
<li><strong>GTI-associated IoC categories:</strong> Filter GTI-associated IoCs by specific
categories, including <strong>Files</strong>, <strong>URLs</strong>, <strong>Domains</strong>, and <strong>IPs</strong>.</li>
</ul>
<p>For more information, see <a href="https://docs.cloud.google.com/chronicle/docs/detection/emerging-threats">Emerging Threats Center overview</a>
and <a href="https://docs.cloud.google.com/chronicle/docs/detection/emerging-threats-detailed-view">Emerging Threats Center detail view</a>. </p>
]]>
    </content>
  </entry>

  <entry>
    <title>April 07, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#April_07_2026</id>
    <updated>2026-04-07T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#April_07_2026"/>
    <content type="html"><![CDATA[<h3>Change</h3>
<p><strong>Search query editor enhancements</strong></p>
<p>Google SecOps has enhanced the search query editor to  provide intelligent
auto-suggestions and improved error handling.</p>
<ul>
<li><strong>Auto-suggestions</strong>: The query editor now provides context-aware auto-suggestions
for fields, operators, and valid values as you type. </li>
<li><strong>Error handling</strong>: The editor now highlights syntax errors with a red squiggly
line and displays a tooltip with the specific error description when you hover
over it. Additionally, runtime errors now display persistently in the <strong>Results panel</strong>
to assist with troubleshooting.</li>
</ul>
<p>For more information, see
<a href="https://docs.cloud.google.com/chronicle/docs/investigation/udm-search#search_autosuggestions">Use auto-suggestions to build queries</a>.</p>
<aside class="note"><strong>Note:</strong><span> This change follows a phased rollout from <strong>April 07, 2026</strong>, to <strong>April 10, 2026</strong>.
Reach out to support if you do not see the new limits applied to your environment
after <strong>April 10, 2026</strong>.</span></aside>
<h3>Feature</h3>
<p><strong>Health Hub</strong></p>
<p>This feature is currently in Preview.</p>
<p>The <strong>Health Hub</strong> is the central location in Google Security Operations for you to monitor the status and health of all configured data sources. The <strong>Health Hub</strong> provides crucial information on data sources and log types, offering the context needed to diagnose and remediate data pipeline issues.</p>
<p>The <strong>Health Hub</strong> includes information about the following:</p>
<ul>
<li>Ingestion volumes and ingestion health.</li>
<li>Parsing volumes from raw logs to <a href="https://docs.cloud.google.com/chronicle/docs/event-processing/udm-overview">Unified Data Model (UDM) events</a>.</li>
<li>Context and links to interfaces with additional relevant information and functionality.</li>
<li>Irregular and failed sources and log types. </li>
</ul>
<p>For more information, see <a href="https://docs.cloud.google.com/chronicle/docs/reports/data-health-monitoring-and-troubleshooting-dashboard">Use the Health Hub</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>April 06, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#April_06_2026</id>
    <updated>2026-04-06T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#April_06_2026"/>
    <content type="html"><![CDATA[<h3>Change</h3>
<p><strong>Updates to search query limits and error messaging</strong></p>
<p>Google SecOps has updated search query limits for programmatic and web interface
access:</p>
<ul>
<li>Increased Queries Per Hour (QPH) limits of up to 2,000 for APIs and 1,000
for the web interface.</li>
<li>New concurrency limits for both simple and complex queries.</li>
<li>More descriptive error messages for quota failures in the API and web interface.</li>
</ul>
<p>For more information, see <a href="https://docs.cloud.google.com/chronicle/docs/investigation/udm-search#QPHlimits">Search limits and quotas</a></p>
<aside class="note"><strong>Note:</strong><span> This change follows a phased rollout from <strong>April 06, 2026</strong>, to
<strong>April 30, 2026</strong>. Contact Support if you don't see the new limits applied
to your environment after <strong>April 30, 2026</strong>.</span></aside>
<h3>Deprecated</h3>
<p><strong>v1 Cloud Storage Feed Types (GCS, S3, SQS, Azure)</strong></p>
<p>The v1 feed types for <code>GOOGLE_CLOUD_STORAGE</code>, <code>AMAZON_S3</code>, <code>AMAZON_SQS</code>, and <code>AZURE_BLOBSTORE</code> are deprecated and will be discontinued on <strong>March 15, 2027</strong>. The new v2 feed types uses the Google Cloud Storage Transfer Service (STS) to provide improved performance, scalability, and reliability.</p>
<p>To ensure continued ingestion, transition your feeds before the March 15, 2027 shutdown date:</p>
<ul>
<li>Google SecOps will automatically migrate your feeds using v1 feed types to v2 in waves starting from April 6, 2026. To facilitate this, some feeds may require additional IP allowlist or service account permission updates. You can also self-migrate by replacing your existing data feeds with new feeds using v2 feed types.</li>
</ul>
<p>You can also self-migrate by creating new feeds using v2 feed types to substitute your existing feeds using v1 feed types by following the steps documented in our <a href="https://docs.cloud.google.com/chronicle/docs/reference/feed-management-api#source-types">feed configuration guides</a> before March 15, 2027.</p>
<p><strong>Key Dates:</strong></p>
<ul>
<li><strong>April 6, 2026:</strong> Transition begins; auto-migration available.</li>
<li><strong>September 15, 2026:</strong> Support for v1 feeds is discontinued.</li>
<li><strong>March 15, 2027:</strong> v1 feeds reach End of Life (EOL) and will stop returning data.</li>
</ul>
<p>For more information, see <a href="https://docs.cloud.google.com/chronicle/docs/deprecations">Feature deprecations</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>April 04, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#April_04_2026</id>
    <updated>2026-04-04T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#April_04_2026"/>
    <content type="html"><![CDATA[<h3>Feature</h3>
<p><strong>Playbook Condition and Multi-Choice Question Flows</strong></p>
<p>The maximum number of branches supported in Playbook <strong>Conditions</strong> and <strong>Multiple Choice Questions</strong> has been increased from 6 to 20. This allows for more complex branching logic within a single step.</p>
<p>For more information, see <a href="https://docs.cloud.google.com/chronicle/docs/soar/respond/working-with-playbooks/using-flows-in-playbooks">Use flows in playbooks</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>April 03, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#April_03_2026</id>
    <updated>2026-04-03T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#April_03_2026"/>
    <content type="html"><![CDATA[<h3>Change</h3>
<p>Google SecOps has updated the list of <a href="https://docs.cloud.google.com/chronicle/docs/ingestion/parser-list/supported-default-parsers">supported default parsers</a>. Parsers are updated gradually, so it might take one to four days before you see the changes reflected in your region.</p>
<p>The following supported default parsers have been updated. Each parser is listed by product name and <code>log_type</code> value, where applicable. This list includes both released default parsers and pending parser updates.</p>
<ul>
<li>Abnormal Security (<code>ABNORMAL_SECURITY</code>)</li>
<li>Active Countermeasures (<code>AI_HUNTER</code>)</li>
<li>AIX system (<code>AIX_SYSTEM</code>)</li>
<li>Apache (<code>APACHE</code>)</li>
<li>Apache Cassandra (<code>CASSANDRA</code>)</li>
<li>Aruba (<code>ARUBA_WIRELESS</code>)</li>
<li>Aruba EdgeConnect SD-WAN (<code>ARUBA_EDGECONNECT_SDWAN</code>)</li>
<li>Auth0 (<code>AUTH_ZERO</code>)</li>
<li>AWS Aurora (<code>AWS_AURORA</code>)</li>
<li>AWS CloudFront (<code>AWS_CLOUDFRONT</code>)</li>
<li>AWS Cloudtrail (<code>AWS_CLOUDTRAIL</code>)</li>
<li>AWS CloudWatch (<code>AWS_CLOUDWATCH</code>)</li>
<li>AWS VPC Flow (<code>AWS_VPC_FLOW</code>)</li>
<li>AWS WAF (<code>AWS_WAF</code>)</li>
<li>Azure AD (<code>AZURE_AD</code>)</li>
<li>Azure AD Directory Audit (<code>AZURE_AD_AUDIT</code>)</li>
<li>Azure Front Door (<code>AZURE_FRONT_DOOR</code>)</li>
<li>Azure SQL (<code>AZURE_SQL</code>)</li>
<li>BeyondTrust (<code>BOMGAR</code>)</li>
<li>BeyondTrust BeyondInsight (<code>BEYONDTRUST_BEYONDINSIGHT</code>)</li>
<li>Blue Coat Proxy (<code>BLUECOAT_WEBPROXY</code>)</li>
<li>Broadcom Support Portal Audit Logs (<code>BROADCOM_SUPPORT_PORTAL</code>)</li>
<li>Check Point Harmony (<code>CHECKPOINT_HARMONY</code>)</li>
<li>Chronicle SOAR Audit (<code>CHRONICLE_SOAR_AUDIT</code>)</li>
<li>Cisco ASA (<code>CISCO_ASA_FIREWALL</code>)</li>
<li>Cisco Email Security (<code>CISCO_EMAIL_SECURITY</code>)</li>
<li>Cisco ISE (<code>CISCO_ISE</code>)</li>
<li>Cisco Meraki (<code>CISCO_MERAKI</code>)</li>
<li>Cisco Secure Access (<code>CISCO_SECURE_ACCESS</code>)</li>
<li>Cisco Switch (<code>CISCO_SWITCH</code>)</li>
<li>Cisco Umbrella Audit (<code>CISCO_UMBRELLA_AUDIT</code>)</li>
<li>Cisco Umbrella DNS (<code>UMBRELLA_DNS</code>)</li>
<li>Cisco WSA (<code>CISCO_WSA</code>)</li>
<li>Cloud DNS (<code>GCP_DNS</code>)</li>
<li>Cloud SQL (<code>GCP_CLOUDSQL</code>)</li>
<li>Cloudflare (<code>CLOUDFLARE</code>)</li>
<li>Cloudflare Warp (<code>CLOUDFLARE_WARP</code>)</li>
<li>Code42 Incydr (<code>CODE42_INCYDR</code>)</li>
<li>CrowdStrike Alerts API (<code>CS_ALERTS</code>)</li>
<li>CrowdStrike Falcon (<code>CS_EDR</code>)</li>
<li>CrowdStrike Falcon Stream (<code>CS_STREAM</code>)</li>
<li>CyberArk Privileged Access Manager (PAM) (<code>CYBERARK_PAM</code>)</li>
<li>Cybereason EDR (<code>CYBEREASON_EDR</code>)</li>
<li>CYJAX Threat Intelligence (<code>CYJAX_THREAT_INTELLIGENCE</code>)</li>
<li>Cyware Threat Intelligence Exchange (<code>CTIX</code>)</li>
<li>Databricks (<code>DATABRICKS</code>)</li>
<li>Duo Auth (<code>DUO_AUTH</code>)</li>
<li>Elastic Defend (<code>ELASTIC_DEFEND</code>)</li>
<li>ESET AV (<code>ESET_AV</code>)</li>
<li>F5 ASM (<code>F5_ASM</code>)</li>
<li>F5 BIGIP Access Policy Manager (<code>F5_BIGIP_APM</code>)</li>
<li>FireEye eMPS (<code>FIREEYE_EMPS</code>)</li>
<li>FireEye ETP (<code>FIREEYE_ETP</code>)</li>
<li>FireEye NX (<code>FIREEYE_NX</code>)</li>
<li>Forescout NAC (<code>FORESCOUT_NAC</code>)</li>
<li>ForgeRock Identity Cloud (<code>FORGEROCK_IDENTITY_CLOUD</code>)</li>
<li>Fortinet FortiAnalyzer (<code>FORTINET_FORTIANALYZER</code>)</li>
<li>GitHub (<code>GITHUB</code>)</li>
<li>Google Threat Intelligence IOC (<code>GTI_IOC</code>)</li>
<li>HP Aruba (ClearPass) (<code>CLEARPASS</code>)</li>
<li>Huawei Switches (<code>HUAWEI_SWITCH</code>)</li>
<li>IBM DataPower Gateway (<code>IBM_DATAPOWER</code>)</li>
<li>IBM Safenet (<code>IBM_SAFENET</code>)</li>
<li>IBM Websphere Application Server (<code>IBM_WEBSPHERE_APP_SERVER</code>)</li>
<li>Imperva Advanced Bot Protection (<code>IMPERVA_ABP</code>)</li>
<li>Imperva SecureSphere Management (<code>IMPERVA_SECURESPHERE</code>)</li>
<li>Juniper (<code>JUNIPER_FIREWALL</code>)</li>
<li>Kolide Endpoint Security (<code>KOLIDE</code>)</li>
<li>Kubernetes Audit (<code>KUBERNETES_AUDIT</code>)</li>
<li>Kubernetes Node (<code>KUBERNETES_NODE</code>)</li>
<li>Linux Auditing System (AuditD) (<code>AUDITD</code>)</li>
<li>Maria Database (<code>MARIA_DB</code>)</li>
<li>McAfee ePolicy Orchestrator (<code>MCAFEE_EPO</code>)</li>
<li>McAfee Skyhigh CASB (<code>MCAFEE_SKYHIGH_CASB</code>)</li>
<li>McAfee Web Gateway (<code>MCAFEE_WEBPROXY</code>)</li>
<li>Microsoft Azure Activity (<code>AZURE_ACTIVITY</code>)</li>
<li>Microsoft Defender For Cloud (<code>MICROSOFT_DEFENDER_CLOUD_ALERTS</code>)</li>
<li>Microsoft Graph API Alerts (<code>MICROSOFT_GRAPH_ALERT</code>)</li>
<li>Microsoft IIS (<code>IIS</code>)</li>
<li>Microsoft SQL Server (<code>MICROSOFT_SQL</code>)</li>
<li>Mimecast Mail V2 (<code>MIMECAST_MAIL_V2</code>)</li>
<li>Mobile Endpoint Security (<code>LOOKOUT_MOBILE_ENDPOINT_SECURITY</code>)</li>
<li>Mobileiron (<code>MOBILEIRON</code>)</li>
<li>NetApp ONTAP (<code>NETAPP_ONTAP</code>)</li>
<li>Netskope V2 (<code>NETSKOPE_ALERT_V2</code>)</li>
<li>Netskope Web Proxy (<code>NETSKOPE_WEBPROXY</code>)</li>
<li>Obsidian (<code>OBSIDIAN</code>)</li>
<li>Office 365 (<code>OFFICE_365</code>)</li>
<li>Oort Security Tool (<code>OORT</code>)</li>
<li>Oracle (<code>ORACLE_DB</code>)</li>
<li>Orca Cloud Security Platform (<code>ORCA</code>)</li>
<li>Palo Alto Cortex XDR Events (<code>PAN_CORTEX_XDR_EVENTS</code>)</li>
<li>Palo Alto Networks Firewall (<code>PAN_FIREWALL</code>)</li>
<li>Palo Alto Prisma Cloud Alert payload (<code>PAN_PRISMA_CA</code>)</li>
<li>PostFix Mail (<code>POSTFIX_MAIL</code>)</li>
<li>Proofpoint On Demand (<code>PROOFPOINT_ON_DEMAND</code>)</li>
<li>Proofpoint Tap Alerts (<code>PROOFPOINT_MAIL</code>)</li>
<li>Proofpoint Threat Response (<code>PROOFPOINT_TRAP</code>)</li>
<li>Radware Web Application Firewall (<code>RADWARE_FIREWALL</code>)</li>
<li>Red Hat OpenShift (<code>REDHAT_OPENSHIFT</code>)</li>
<li>Salesforce (<code>SALESFORCE</code>)</li>
<li>SAP Change Document (<code>SAP_CHANGE_DOCUMENT</code>)</li>
<li>SAP Gateway (<code>SAP_GATEWAY</code>)</li>
<li>SAP Hana Audit (<code>SAP_HANA_AUDIT</code>)</li>
<li>SAP Security Audit (<code>SAP_SECURITY_AUDIT</code>)</li>
<li>Security Command Center Posture Violation (<code>GCP_SECURITYCENTER_POSTURE_VIOLATION</code>)</li>
<li>Security Command Center Sensitive Data Risk (<code>GCP_SECURITYCENTER_SENSITIVE_DATA_RISK</code>)</li>
<li>Security Command Center Threat (<code>GCP_SECURITYCENTER_THREAT</code>)</li>
<li>Security Command Center Toxic Combination (<code>GCP_SECURITYCENTER_TOXIC_COMBINATION</code>)</li>
<li>Snyk Group level audit Logs (<code>SNYK_SDLC</code>)</li>
<li>Suricata EVE (<code>SURICATA_EVE</code>)</li>
<li>Symantec EDR (<code>SYMANTEC_EDR</code>)</li>
<li>Sysdig (<code>SYSDIG</code>)</li>
<li>Tenable Active Directory Security (<code>TENABLE_ADS</code>)</li>
<li>ThreatConnect IOC V3 (<code>THREATCONNECT_IOC_V3</code>)</li>
<li>Trellix HX Alerts (<code>TRELLIX_HX_ALERTS</code>)</li>
<li>Trellix HX Audit Events (<code>TRELLIX_HX_AUDIT</code>)</li>
<li>Trellix HX Event Streamer (<code>TRELLIX_HX_ES</code>)</li>
<li>Trellix HX Hosts (<code>TRELLIX_HX_HOSTS</code>)</li>
<li>Trend Micro Vision One Endpoint Vulnerabilities (<code>TRENDMICRO_VISION_ONE_ENDPOINT_VULNERABILITIES</code>)</li>
<li>Trend Micro Vision One Observerd Attack Techniques (<code>TRENDMICRO_VISION_ONE_OBSERVERD_ATTACK_TECHNIQUES</code>)</li>
<li>Trend Micro Vision One Workbench (<code>TRENDMICRO_VISION_ONE_WORKBENCH</code>)</li>
<li>TrendMicro Apex Central (<code>TRENDMICRO_APEX_CENTRAL</code>)</li>
<li>TXOne Stellar (<code>TRENDMICRO_STELLAR</code>)</li>
<li>Ubika Waf (<code>UBIKA_WAF</code>)</li>
<li>Unix system (<code>NIX_SYSTEM</code>)</li>
<li>Varonis (<code>VARONIS</code>)</li>
<li>Vmware Avinetworks iWAF (<code>VMWARE_AVINETWORKS_IWAF</code>)</li>
<li>VMware ESXi (<code>VMWARE_ESX</code>)</li>
<li>VMware Horizon (<code>VMWARE_HORIZON</code>)</li>
<li>Wallix Bastion (<code>WALLIX_BASTION</code>)</li>
<li>Windows DNS (<code>WINDOWS_DNS</code>)</li>
<li>Windows Event (<code>WINEVTLOG</code>)</li>
<li>Windows Event (XML) (<code>WINEVTLOG_XML</code>)</li>
<li>wiz.io (<code>WIZ_IO</code>)</li>
<li>Zeek JSON (<code>BRO_JSON</code>)</li>
<li>Zscaler (<code>ZSCALER_WEBPROXY</code>)</li>
</ul>
<p>The following log types were added without a default parser. Each parser is listed by product name and <code>log_type</code> value, where applicable.</p>
<ul>
<li>Action1 (<code>ACTION1</code>)</li>
<li>CDNetworks Cloud Security (<code>CDNETWORKS_CLOUD_SECURITY</code>)</li>
<li>Claude Compliance Logs (<code>CLAUDE_COMPLIANCE_LOGS</code>)</li>
<li>Dell RecoverPoint (<code>DELL_RECOVERPOINT</code>)</li>
<li>IBM Storwize (<code>IBM_STORWIZE</code>)</li>
<li>LeapXpert Audit Logs (<code>LEAPXPERT_AUDIT</code>)</li>
<li>Oracle Key Vault Audit Logs (<code>ORACLE_KEY_VAULT_AUDIT_LOGS</code>)</li>
<li>RSA Cloud (<code>RSA_CLOUD</code>)</li>
<li>ServiceNow Antivirus Activity (<code>SERVICENOW_ANTIVIRUS_ACTIVITY</code>)</li>
<li>ServiceNow Attachment (<code>SERVICENOW_ATTACHMENT</code>)</li>
<li>ServiceNow Email (<code>SERVICENOW_EMAIL</code>)</li>
<li>Versa Director (<code>VERSA_DIRECTOR</code>)</li>
<li>ZPE Systems NodeGrid (<code>ZPE_SYSTEMS_NODEGRID</code>)</li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>April 02, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#April_02_2026</id>
    <updated>2026-04-02T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#April_02_2026"/>
    <content type="html"><![CDATA[<h3>Feature</h3>
<p><strong>Chrome Enterprise Premium Integration general availability</strong></p>
<p>The Chrome Enterprise Premium integration is now GA. This release includes the following new features and updates:</p>
<ul>
<li><p>New <a href="https://support.google.com/chrome/a/answer/16731355?visit_id=639074578268464336-809360017&amp;p=cep_secops&amp;rd=1">Chrome Enterprise
Connector</a>
which configures recommended data export settings and sends data through
Google Cloud to Google Security Operations. Chrome Enterprise Premium customers can export data
with additional security context provided by Google Safe Browsing.</p></li>
<li><p>Updates to the <code>CHROME_MANAGEMENT</code> parser documentation in <a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/chrome-management">Collect Chrome Enterprise data</a> and
<a href="https://docs.cloud.google.com/chronicle/docs/detection/chrome-enterprise-threats-category">Chrome Enterprise Premium Threats</a>.</p></li>
<li><p>Curated Detections for Chrome Enterprise Premium.</p></li>
<li><p>Curated Dashboards for Chrome Enterprise Premium.</p></li>
<li><p>Response actions to 
<a href="https://docs.cloud.google.com/chronicle/docs/soar/marketplace-integrations/google-workspace#block_extension">block and remove</a>
malicious extensions or to <a href="https://docs.cloud.google.com/chronicle/docs/soar/marketplace-integrations/google-workspace#delete_extension">delete blocked extensions</a>
from the extension policy
<a href="https://chromeenterprise.google/policies/?policy=ExtensionInstallBlocklist">ExtensionInstallBlocklist</a>.</p></li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>March 31, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#March_31_2026</id>
    <updated>2026-03-31T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#March_31_2026"/>
    <content type="html"><![CDATA[<h3>Feature</h3>
<p><strong>Multi-stage queries in YARA-L</strong></p>
<p>The Multi-stage queries feature is now GA. This feature lets you feed the output of one query stage into the input of another, providing more granular data transformation than a single, monolithic query.</p>
<p>You can use multi-stage queries in both Dashboards and Search to build sophisticated detection and visualization logic. No action is required to enable this feature.</p>
<p>Learn more about how to <a href="https://docs.cloud.google.com/chronicle/docs/investigation/multi-stage-yaral">create multi-stage queries with YARA-L 2.0</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>March 25, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#March_25_2026</id>
    <updated>2026-03-25T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#March_25_2026"/>
    <content type="html"><![CDATA[<h3>Feature</h3>
<p><strong>Credential validation for third-party API feed types</strong></p>
<p>Credential validation is now available for all 49 third-party API connectors.</p>
<p>When you create a feed using a third-party API feed type, Google SecOps now automatically validates the provided credentials. This ensures that if credentials are incorrect:</p>
<ul>
<li><strong>Immediate feedback</strong>: The web interface displays an error message explaining the configuration failure.</li>
<li><strong>Prevention of broken feeds</strong>: The system blocks the creation of the feed until valid credentials are provided, preventing the creation of broken feeds that fail to ingest data later.</li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>March 23, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#March_23_2026</id>
    <updated>2026-03-23T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#March_23_2026"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p><strong>New parser documentation now available</strong></p>
<p>New parser documentation is available to help you ingest and normalize logs from the following sources:</p>
<ul>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/umbrella-firewall">Collect Cisco Umbrella Cloud Firewall logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/umbrella-ip">Collect Cisco Umbrella IP logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/medigate-iot">Collect Claroty xDome for Healthcare logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/cloudm">Collect CloudM logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/digitalguardian-edr">Collect Digital Guardian EDR logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/dnsfilter">Collect DNSFilter logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/dope-swg">Collect Dope Security SWG logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/druva-backup">Collect Druva Backup logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/efficientip-ddi">Collect EfficientIP DDI logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/elastic-defend">Collect Elastic Defend logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/elastic-winlogbeat">Collect Elastic Windows Event Log Beats logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/ergon-informatik-airlock-iam">Collect Ergon Informatik Airlock IAM logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/eset-ioc">Collect ESET Threat Intelligence logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/f5-dcs">Collect F5 Distributed Cloud Services logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/f5-shape">Collect F5 Shape logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/f5-silverline">Collect F5 Silverline logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/falco-ids">Collect Falco IDS logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/fastly-cdn">Collect Fastly CDN logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/file-scanning-framework">Collect File Scanning Framework logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/fireeye-etp">Collect FireEye ETP logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/fireeye-hx-audit">Collect FireEye HX Audit logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/fireeye-nx-audit">Collect FireEye NX Audit logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/fivetran">Collect Fivetran logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/forcepoint-mail-relay">Collect Forcepoint Mail Relay logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/gitguardian-enterprise">Collect GitGuardian Enterprise logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/looker-audit">Collect Google Cloud Looker audit logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/guardicore-centra">Collect Guardicore Centra logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/hcl-bigfix">Collect HCL BigFix logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/hid-digitalpersona">Collect HID DigitalPersona logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/ibm-as400">Collect IBM AS/400 logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/informix">Collect IBM Informix logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/ibm-maas360">Collect IBM MaaS360 logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/ibm-mainframe-storage">Collect IBM Mainframe Storage logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/ibm-openpages">Collect IBM OpenPages logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/ibm-sam">Collect IBM Security Access Manager logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/ibm-sim">Collect IBM Security Identity Manager logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/iboss-webproxy">Collect iBoss Web Proxy logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/intel471-watcher-alerts">Collect Intel 471 Watcher Alerts logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/intel-ema">Collect Intel Endpoint Management Assistant logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/ionix">Collect IONIX Attack Surface Management logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/island-browser">Collect Island Enterprise Browser logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/jamf-telemetry-v2">Collect Jamf Protect Telemetry V2 logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/keycloak">Collect Keycloak logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/kong-gateway">Collect Kong Gateway logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/lenel-onguard">Collect LenelS2 OnGuard logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/lookout-mobile-endpoint-security">Collect Lookout Mobile Endpoint Security logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/lucid">Collect Lucid audit logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/manage-engine-reporter-plus">Collect ManageEngine Exchange Reporter Plus logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/mandiant-custom-ioc">Collect Mandiant Threat Intelligence Custom IOC logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/menlo-security">Collect Menlo Security Isolation Platform (MSIP) logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/metabase">Collect Metabase logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/microsoft-defender-endpoint-ios">Collect Microsoft Defender for Endpoint on iOS logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/microsoft-dynamics-365">Collect Microsoft Dynamics 365 User Activity logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/microsoft-ias">Collect Microsoft IAS / Network Policy Server (NPS) logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/microsoft-nps">Collect Microsoft Network Policy Server (NPS) logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/kubernetes-auth-proxy">Collect OAuth2 Proxy logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/office-365-messagetrace">Collect Office 365 Message Trace logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/ipswitch-moveit-transfer">Collect Progress MOVEit Transfer logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/arbor-sightline">Collect Netscout Arbor Sightline logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/mcafee-web-protection">Collect Skyhigh Secure Web Gateway (On-Premises) logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/malwarebytes-edr">Collect ThreatDown EDR logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/trellix-hx-alerts">Collect Trellix Endpoint Security (HX) alert logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/trellix-hx-audit">Collect Trellix Endpoint Security (HX) audit event logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/trellix-hx-hosts">Collect Trellix Endpoint Security (HX) host inventory logs</a></li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>March 20, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#March_20_2026</id>
    <updated>2026-03-20T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#March_20_2026"/>
    <content type="html"><![CDATA[<h3>Feature</h3>
<p><strong>View Triage and Investigation Agent (TIN) results in the Case Summary</strong></p>
<p>This feature is currently in Preview and is part of a gradual rollout.</p>
<p>You can now view TIN results and verdict summaries directly within the <strong>Case Summary</strong> view. This integration provides real-time progress updates and automated verdicts for true or false positives without leaving the case.</p>
<p>For more information, see <a href="https://docs.cloud.google.com/chronicle/docs/secops/triage-investigation-agent#manual_investigations">Use Triage and Investigation Agent (TIN) to investigate alerts</a>.</p>
<h3>Feature</h3>
<p><strong>Agentic Automation</strong></p>
<p>This feature is in Public Preview.</p>
<p>You can now use <strong>Agentic Automation</strong> to embed AI Agents directly into your workflows. This feature lets you integrate AI-driven capabilities into your existing playbooks while staying in charge of critical actions by combining agents with deterministic automation steps.</p>
<p>For more information, see <a href="https://docs.cloud.google.com/chronicle/docs/soar/respond/working-with-playbooks/agentic-automation">Agentic Automation</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>March 18, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#March_18_2026</id>
    <updated>2026-03-18T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#March_18_2026"/>
    <content type="html"><![CDATA[<h3>Feature</h3>
<p><strong>Bindplane features for Google SecOps general availability</strong></p>
<p>The following <a href="https://docs.cloud.google.com/chronicle/docs/ingestion/use-bindplane-agent">Bindplane</a> features that relate to Google SecOps are now in General Availability (GA):</p>
<ul>
<li><p><strong>Single sign-on with custom claims role mapping</strong>: gives a production-ready way to manage Bindplane access through your identity provider. For more information, see <a href="https://docs.bindplane.com/feature-guides/saas-single-sign-on">Single Sign-On (Cloud)</a>.</p></li>
<li><p><strong>SecOps parser validator</strong>: validates that your logs will be parsed correctly by Google SecOps directly from the snapshot view. Get immediate feedback on parsed events or validation errors without waiting for data to appear in Google SecOps. For more information, see <a href="https://docs.bindplane.com/feature-guides/pipeline-intelligence#validate-secops-parser">Validate SecOps Parser</a>.</p></li>
<li><p><strong>Forwarder migration tool</strong>: provides production-ready paths to migrate existing forwarder configurations into Bindplane-managed pipelines. For more information, see <a href="https://docs.bindplane.com/feature-guides/pipeline-intelligence#migrate-configurations">Migrate Configurations</a>.</p></li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>March 17, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#March_17_2026</id>
    <updated>2026-03-17T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#March_17_2026"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>Unified Feature Role-based Access Control (RBAC) is now in General Availability (GA). This enables administrators to manage feature access control for Google SecOps including SOAR by leveraging Google Cloud IAM instead of managing it separately for SIEM and SOAR.</p>
<p>You can enable it by <a href="https://docs.cloud.google.com/chronicle/docs/soar/admin-tasks/advanced/migrate-to-gcp#permissions-iam">migrating</a> the legacy SOAR permission groups and permissions to Google Cloud IAM through a self-service migration available from January 26, 2026. Please check the <a href="https://docs.cloud.google.com/chronicle/docs/soar/admin-tasks/advanced/migrate-soar-permissions-iam">documentation</a> and <a href="https://youtu.be/UBfwcgDvc0s">video</a> for full instructions.</p>
<p>This update is available to all customers who have completed <a href="https://docs.cloud.google.com/chronicle/docs/soar/admin-tasks/advanced/migrate-to-gcp#migration-stage-1-for-google-secops-unified-customers">Stage 1</a> of the SOAR migration to Google Cloud.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>March 16, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#March_16_2026</id>
    <updated>2026-03-16T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#March_16_2026"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>Stage 2 of the SOAR migration to Google Cloud deadline has been extended from June 30th to September 30th, 2026. </p>
]]>
    </content>
  </entry>

  <entry>
    <title>March 12, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#March_12_2026</id>
    <updated>2026-03-12T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#March_12_2026"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p><strong>Manage parser versions</strong></p>
<p>The <a href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#October_07_2025">Manage parser versions</a> feature is in Public Preview for all customers.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>March 10, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#March_10_2026</id>
    <updated>2026-03-10T00:00:00-07:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#March_10_2026"/>
    <content type="html"><![CDATA[<h3>Feature</h3>
<p><strong>Set up and manage data processing pipelines</strong></p>
<p>This feature is currently in Preview.</p>
<p>You can now use the <strong>Data Processing</strong> pipelines to filter, transform, and redact
Google SecOps data before ingestion. This feature provides more
control over ingested data, letting you reduce costs by filtering out
unwanted events, transform data for better compatibility, and protect
sensitive information by redacting or masking values before storage.</p>
<p>You can configure data processing pipelines using the Bindplane console or the
Google SecOps Data Pipeline APIs.</p>
<p>For more information, see <a href="https://docs.cloud.google.com/chronicle/docs/ingestion/data-processing-pipeline">Set up and manage data processing pipelines</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>March 05, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#March_05_2026</id>
    <updated>2026-03-05T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#March_05_2026"/>
    <content type="html"><![CDATA[<h3>Change</h3>
<p>Google SecOps has updated the list of supported default parsers. Parsers are updated gradually, so it might take one to four days before you see the changes reflected in your region. For more information, see <a href="https://docs.cloud.google.com/chronicle/docs/ingestion/parser-list/supported-default-parsers">Supported log types and default parsers</a>.</p>
<p>The following supported default parsers have been updated. Each parser is listed by product name and <code>log_type</code> value, where applicable. This list includes both released default parsers and pending parser updates.</p>
<ul>
<li>Acalvio (<code>ACALVIO</code>)</li>
<li>AIX system (<code>AIX_SYSTEM</code>)</li>
<li>Akamai WAF (<code>AKAMAI_WAF</code>)</li>
<li>Apache (<code>APACHE</code>)</li>
<li>Apache Cassandra (<code>CASSANDRA</code>)</li>
<li>Apache Hadoop (<code>HADOOP</code>)</li>
<li>Arcsight CEF (<code>ARCSIGHT_CEF</code>)</li>
<li>Aruba EdgeConnect SD-WAN (<code>ARUBA_EDGECONNECT_SDWAN</code>)</li>
<li>Attivo Networks (<code>ATTIVO</code>)</li>
<li>AWS Aurora (<code>AWS_AURORA</code>)</li>
<li>AWS Cloudtrail (<code>AWS_CLOUDTRAIL</code>)</li>
<li>AWS CloudWatch (<code>AWS_CLOUDWATCH</code>)</li>
<li>AWS GuardDuty (<code>GUARDDUTY</code>)</li>
<li>AWS Network Firewall (<code>AWS_NETWORK_FIREWALL</code>)</li>
<li>AWS Security Hub (<code>AWS_SECURITY_HUB</code>)</li>
<li>AWS WAF (<code>AWS_WAF</code>)</li>
<li>Azure AD (<code>AZURE_AD</code>)</li>
<li>Azure AD Directory Audit (<code>AZURE_AD_AUDIT</code>)</li>
<li>Azure AD Sign-In (<code>AZURE_AD_SIGNIN</code>)</li>
<li>Azure Firewall (<code>AZURE_FIREWALL</code>)</li>
<li>Azure Front Door (<code>AZURE_FRONT_DOOR</code>)</li>
<li>Barracuda Email (<code>BARRACUDA_EMAIL</code>)</li>
<li>Barracuda Firewall (<code>BARRACUDA_FIREWALL</code>)</li>
<li>Blue Coat Proxy (<code>BLUECOAT_WEBPROXY</code>)</li>
<li>Check Point (<code>CHECKPOINT_FIREWALL</code>)</li>
<li>Check Point Harmony (<code>CHECKPOINT_HARMONY</code>)</li>
<li>Cisco Application Centric Infrastructure (<code>CISCO_ACI</code>)</li>
<li>Cisco ASA (<code>CISCO_ASA_FIREWALL</code>)</li>
<li>Cisco Firepower NGFW (<code>CISCO_FIREPOWER_FIREWALL</code>)</li>
<li>Cisco Internetwork Operating System (<code>CISCO_IOS</code>)</li>
<li>Cisco ISE (<code>CISCO_ISE</code>)</li>
<li>Cisco Router (<code>CISCO_ROUTER</code>)</li>
<li>Cisco Secure Access (<code>CISCO_SECURE_ACCESS</code>)</li>
<li>Cisco Switch (<code>CISCO_SWITCH</code>)</li>
<li>Cisco TACACS+ (<code>CISCO_TACACS</code>)</li>
<li>Cisco UCM (<code>CISCO_UCM</code>)</li>
<li>Cisco Umbrella Audit (<code>CISCO_UMBRELLA_AUDIT</code>)</li>
<li>Citrix Netscaler (<code>CITRIX_NETSCALER</code>)</li>
<li>Claroty Continuous Threat Detection (<code>CLAROTY_CTD</code>)</li>
<li>Claroty Enterprise Management Console (<code>CLAROTY_EMC</code>)</li>
<li>Claroty Xdome (<code>CLAROTY_XDOME</code>)</li>
<li>Cloud SQL (<code>GCP_CLOUDSQL</code>)</li>
<li>Cloudflare (<code>CLOUDFLARE</code>)</li>
<li>Cloudflare Audit (<code>CLOUDFLARE_AUDIT</code>)</li>
<li>Cloudflare WAF (<code>CLOUDFLARE_WAF</code>)</li>
<li>Cloudflare Warp (<code>CLOUDFLARE_WARP</code>)</li>
<li>Corelight (<code>CORELIGHT</code>)</li>
<li>CrowdStrike Alerts API (<code>CS_ALERTS</code>)</li>
<li>CrowdStrike Detection Monitoring (<code>CS_DETECTS</code>)</li>
<li>CrowdStrike Falcon (<code>CS_EDR</code>)</li>
<li>CrowdStrike Falcon Stream (<code>CS_STREAM</code>)</li>
<li>CyberArk (<code>CYBERARK</code>)</li>
<li>CyberArk Endpoint Privilege Manager (EPM) (<code>CYBERARK_EPM</code>)</li>
<li>CyberArk Privileged Access Manager (PAM) (<code>CYBERARK_PAM</code>)</li>
<li>Dell EMC Data Domain (<code>DELL_EMC_DATA_DOMAIN</code>)</li>
<li>Dell Switch (<code>DELL_SWITCH</code>)</li>
<li>Duo Auth (<code>DUO_AUTH</code>)</li>
<li>F5 ASM (<code>F5_ASM</code>)</li>
<li>F5 BIGIP LTM (<code>F5_BIGIP_LTM</code>)</li>
<li>F5 Distributed Cloud Services (<code>F5_DCS</code>)</li>
<li>F5 DNS (<code>F5_DNS</code>)</li>
<li>FireEye NX (<code>FIREEYE_NX</code>)</li>
<li>Forcepoint  NGFW (<code>FORCEPOINT_FIREWALL</code>)</li>
<li>Forcepoint Proxy (<code>FORCEPOINT_WEBPROXY</code>)</li>
<li>FortiGate (<code>FORTINET_FIREWALL</code>)</li>
<li>Fortinet FortiAnalyzer (<code>FORTINET_FORTIANALYZER</code>)</li>
<li>Google Cloud (<code>GCP_SECURITYCENTER_THREAT</code>)</li>
<li>Google Cloud (<code>GCP_MONITORING_ALERTS</code>)</li>
<li>Google Threat Intelligence IOC (<code>GTI_IOC</code>)</li>
<li>GreyNoise (<code>GREYNOISE</code>)</li>
<li>Halcyon Anti Ransomware (<code>HALCYON</code>)</li>
<li>HP Aruba (ClearPass) (<code>CLEARPASS</code>)</li>
<li>Huawei Switches (<code>HUAWEI_SWITCH</code>)</li>
<li>Infoblox DNS (<code>INFOBLOX_DNS</code>)</li>
<li>Island Browser logs (<code>ISLAND_BROWSER</code>)</li>
<li>Kubernetes Node (<code>KUBERNETES_NODE</code>)</li>
<li>Linux Auditing System (AuditD) (<code>AUDITD</code>)</li>
<li>Linux Sysmon (<code>LINUX_SYSMON</code>)</li>
<li>ManageEngine ADAudit Plus (<code>ADAUDIT_PLUS</code>)</li>
<li>Maria Database (<code>MARIA_DB</code>)</li>
<li>McAfee IPS (<code>MCAFEE_IPS</code>)</li>
<li>McAfee Web Gateway (<code>MCAFEE_WEBPROXY</code>)</li>
<li>Microsoft Azure Activity (<code>AZURE_ACTIVITY</code>)</li>
<li>Microsoft Defender For Cloud (<code>MICROSOFT_DEFENDER_CLOUD_ALERTS</code>)</li>
<li>Microsoft Graph API Alerts (<code>MICROSOFT_GRAPH_ALERT</code>)</li>
<li>Microsoft IIS (<code>IIS</code>)</li>
<li>Microsoft SQL Server (<code>MICROSOFT_SQL</code>)</li>
<li>MISP Threat Intelligence (<code>MISP_IOC</code>)</li>
<li>Mobileiron (<code>MOBILEIRON</code>)</li>
<li>MySQL (<code>MYSQL</code>)</li>
<li>NetApp ONTAP (<code>NETAPP_ONTAP</code>)</li>
<li>Netskope V2 (<code>NETSKOPE_ALERT_V2</code>)</li>
<li>NGINX (<code>NGINX</code>)</li>
<li>Nozomi Networks Scada Guardian (<code>NOZOMI_GUARDIAN</code>)</li>
<li>Office 365 (<code>OFFICE_365</code>)</li>
<li>Open Cybersecurity Schema Framework (OCSF) (<code>OCSF</code>)</li>
<li>Orca Cloud Security Platform (<code>ORCA</code>)</li>
<li>Palo Alto Networks Firewall (<code>PAN_FIREWALL</code>)</li>
<li>Palo Alto Panorama (<code>PAN_PANORAMA</code>)</li>
<li>Palo Alto Prisma Cloud Alert payload (<code>PAN_PRISMA_CA</code>)</li>
<li>Ping One (<code>PING_ONE</code>)</li>
<li>PingIdentity Directory Server Logs (<code>PING_DIRECTORY</code>)</li>
<li>PostFix Mail (<code>POSTFIX_MAIL</code>)</li>
<li>PostgreSQL (<code>POSTGRESQL</code>)</li>
<li>Proofpoint On Demand (<code>PROOFPOINT_ON_DEMAND</code>)</li>
<li>Proofpoint Tap Alerts (<code>PROOFPOINT_MAIL</code>)</li>
<li>Proofpoint Threat Response (<code>PROOFPOINT_TRAP</code>)</li>
<li>Radware Web Application Firewall (<code>RADWARE_FIREWALL</code>)</li>
<li>Red Hat OpenShift (<code>REDHAT_OPENSHIFT</code>)</li>
<li>Rubrik Security Cloud (<code>RUBRIK_SECURITY_CLOUD</code>)</li>
<li>SailPoint IdentityIQ (<code>SAILPOINT_IIQ</code>)</li>
<li>Salesforce (<code>SALESFORCE</code>)</li>
<li>SAP Change Document (<code>SAP_CHANGE_DOCUMENT</code>)</li>
<li>SAP Gateway (<code>SAP_GATEWAY</code>)</li>
<li>SAP HANA (<code>SAP_HANA</code>)</li>
<li>SAP Hana Audit (<code>SAP_HANA_AUDIT</code>)</li>
<li>SAP Identity and Authentication Data (<code>SAP_IDENTITY_AND_AUTH_DATA</code>)</li>
<li>SAP Internet Communication Manager (<code>SAP_ICM</code>)</li>
<li>SAP Security Audit (<code>SAP_SECURITY_AUDIT</code>)</li>
<li>SAP Webdispatcher (<code>SAP_WEBDISP</code>)</li>
<li>Security Command Center Posture Violation (<code>GCP_SECURITYCENTER_POSTURE_VIOLATION</code>)</li>
<li>Security Command Center Toxic Combination (<code>GCP_SECURITYCENTER_TOXIC_COMBINATION</code>)</li>
<li>Sophos Central (<code>SOPHOS_CENTRAL</code>)</li>
<li>STIX Threat Intelligence (<code>STIX</code>)</li>
<li>Stormshield Firewall (<code>STORMSHIELD_FIREWALL</code>)</li>
<li>Suricata EVE (<code>SURICATA_EVE</code>)</li>
<li>Symantec Endpoint Protection (<code>SEP</code>)</li>
<li>Sysdig (<code>SYSDIG</code>)</li>
<li>Tableau (<code>TABLEAU</code>)</li>
<li>Teleport Access Plane (<code>TELEPORT_ACCESS_PLANE</code>)</li>
<li>Trend Micro (<code>TIPPING_POINT</code>)</li>
<li>Tripwire (<code>TRIPWIRE_FIM</code>)</li>
<li>TXOne Stellar (<code>TRENDMICRO_STELLAR</code>)</li>
<li>Ubika Waf (<code>UBIKA_WAF</code>)</li>
<li>Unix system (<code>NIX_SYSTEM</code>)</li>
<li>Velo Firewall (<code>VELO_FIREWALL</code>)</li>
<li>Veritas NetBackup (<code>VERITAS_NETBACKUP</code>)</li>
<li>Versa Firewall (<code>VERSA_FIREWALL</code>)</li>
<li>Vmware Avinetworks iWAF (<code>VMWARE_AVINETWORKS_IWAF</code>)</li>
<li>VMware ESXi (<code>VMWARE_ESX</code>)</li>
<li>VMware vCenter (<code>VMWARE_VCENTER</code>)</li>
<li>WatchGuard (<code>WATCHGUARD</code>)</li>
<li>Windows DNS (<code>WINDOWS_DNS</code>)</li>
<li>Windows Event (<code>WINEVTLOG</code>)</li>
<li>Windows Event (XML) (<code>WINEVTLOG_XML</code>)</li>
<li>wiz.io (<code>WIZ_IO</code>)</li>
<li>Workday Audit Logs (<code>WORKDAY_AUDIT</code>)</li>
<li>Zscaler (<code>ZSCALER_WEBPROXY</code>)</li>
<li>ZScaler VPN (<code>ZSCALER_VPN</code>)</li>
</ul>
<p>The following log types were added without a default parser. Each parser is listed by product name and <code>log_type</code> value, where applicable.</p>
<ul>
<li>Alibaba Security Center (<code>ALIBABA_SECURITY_CENTER</code>)</li>
<li>Apache Airflow (<code>APACHE_AIRFLOW</code>)</li>
<li>Baramundi (<code>BARAMUNDI</code>)</li>
<li>Bravura Security (<code>BRAVURA</code>)</li>
<li>Buildkite Audit (<code>BUILDKITE_AUDIT</code>)</li>
<li>Palo Alto Cortex Xpanse (<code>CORTEX_XPANSE</code>)</li>
<li>Cyfirma DeCYFIR ServiceNow (<code>CYFIRMA_DECYFIR</code>)</li>
<li>DATEV (<code>DATEV</code>)</li>
<li>ELO (<code>ELO</code>)</li>
<li>Forcepoint Secure Web Gateway (<code>FORCEPOINT_SWG</code>)</li>
<li>JumpServer PAM (<code>JUMPSERVER_PAM</code>)</li>
<li>Keep Aware (<code>KEEP_AWARE</code>)</li>
<li>Lark Suite (<code>LARK_SUITE</code>)</li>
<li>Macmon (<code>MACMON</code>)</li>
<li>Mamori Database Activity Monitoring (<code>MAMORI_DAM</code>)</li>
<li>N8N Security Audit Logs (<code>N8N_SECURITY_AUDIT_LOGS</code>)</li>
<li>Oracle Cloud Infrastructure LoadBalancer (<code>OCI_LOADBALANCER</code>)</li>
<li>OpenText Self Service Password Reset (<code>OPENTEXT_SSPR</code>)</li>
<li>Rackspace (<code>RACKSPACE</code>)</li>
<li>Secui Bluemax NGF (<code>SECUI_BLUEMAX_NGF</code>)</li>
<li>Symantec Advanced Threat Protection (<code>SYMANTEC_ATP</code>)</li>
<li>Tenable Vulnerabilities Management (<code>TENABLE_VMGNT</code>)</li>
<li>Trellix EDRF Trace Data and Telemetry (<code>TRELLIX_EDRF</code>)</li>
<li>Trend Micro Vision One Endpoint Vulnerabilities (<code>TRENDMICRO_VISION_ONE_ENDPOINT_VULNERABILITIES</code>)</li>
<li>Zafran (<code>ZAFRAN</code>)</li>
</ul>
<h3>Announcement</h3>
<p><strong>Google Agentic SOC Trial</strong></p>
<p>There will be a no-cost trial for the Google SecOps Triage Investigative Agent 
(TIN) from April 1, 2026 to June 30, 2026. TIN is an agentic AI feature for Google 
SecOps that helps automate security investigations. For more information about 
the trial, see <a href="https://docs.cloud.google.com/chronicle/docs/agentic-soc/trial">Google Agentic SOC Trial details</a>. 
For more information about TIN, see 
<a href="https://docs.cloud.google.com/chronicle/docs/secops/triage-investigation-agent">Use Triage and Investigation Agent to investigate alerts</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>March 02, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#March_02_2026</id>
    <updated>2026-03-02T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#March_02_2026"/>
    <content type="html"><![CDATA[<h3>Deprecated</h3>
<p><code>Chronicle.soarAnalyst</code>, <code>chronicle.soarViewer</code>, <code>chronicle.soarEngineer</code> roles in Cloud IAM are being deprecated and will be fully removed in six months. Although these roles were accessible and can historically be assigned to users in Cloud IAM, they were non-operational. SOAR roles were managed through Permission Groups and with its migration to Cloud IAM as part of the <a href="https://docs.cloud.google.com/chronicle/docs/soar/admin-tasks/advanced/migrate-to-gcp#permissions-iam">SOAR Migration to Google Cloud</a>, the preceding roles are being deprecated.</p>
<p>To maintain seamless access and adhere to the principle of least privilege, transition your SOAR users to the following options: </p>
<ul>
<li>Automatically convert your SOAR Permission Groups to custom roles in IAM through <a href="https://docs.cloud.google.com/chronicle/docs/soar/admin-tasks/advanced/migrate-to-gcp#permissions-iam">self-service migration</a>.</li>
<li>Pre-defined roles: Utilize the enhanced Google SecOps <a href="https://docs.cloud.google.com/iam/docs/roles-permissions/chronicle#google-security-operations-roles">pre-defined roles</a> now available in Cloud IAM.</li>
<li>Custom Roles: Create tailored roles with <a href="https://docs.cloud.google.com/iam/docs/roles-permissions/chronicle#google-security-operations-permissions">specific permissions</a> to meet your organization's unique security requirements.</li>
</ul>
<h3>Feature</h3>
<p><strong>New Unified rules interface</strong></p>
<p>This feature is currently in Preview.</p>
<p>Google Secops has launched a unified rules interface that
brings custom and curated rule management into a single, cohesive workflow.
This update optimizes detection engineering with a redesigned dashboard, an
advanced rule editor, and expanded API capabilities to streamline rule
deployment and troubleshooting.</p>
<p><strong>Key enhancements</strong></p>
<p><strong>Developer and IDE enhancements</strong>:</p>
<ul>
<li><p><strong>Centralized management:</strong> A unified, single dashboard lets you browse, filter, and
manage both custom and curated rules from one location. You can also update
configurations for multiple rules simultaneously.</p></li>
<li><p><strong>Curated rule transparency:</strong> You can now view the YARA-L text of
curated rules, search directly within their logic, and independently toggle
individual rule statuses without needing to alter the parent rule pack
deployment.</p></li>
<li><p><strong>Integrated IDE experience:</strong> The rule editor now features an enhanced IDE
experience with inline error highlights, UDM field definitions on hover.</p></li>
</ul>
<p><strong>Expanded API and structured search</strong>:</p>
<p>The Rules API and dashboard have been upgraded to support deeper programmatic
access and complex filtering:</p>
<ul>
<li><p><strong>Robust search syntax:</strong> Both the UI and API now support AIP-160 compliant
structured search. You can filter rules by text, tags, author, and execution
state.</p></li>
<li><p><strong>Batch modifications:</strong> The <code>rules.modifyRules</code> method now supports
non-atomic batch updates, letting you change live status, alerting status, tags,
and archive status across multiple rules in a single API request.</p></li>
<li><p><strong>Advanced resource views:</strong> The <code>rules.list</code> method introduces <code>CONFIG_ONLY</code>
and <code>TRENDS</code> views. These views provide expanded deployment information, access
to curated rule resources, and larger page sizes (up to 5000 results) for
efficient querying.</p></li>
</ul>
<p>For details, see <a href="https://docs.cloud.google.com/chronicle/docs/detection/unified-rules/get-started">Manage unified rules</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>February 25, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#February_25_2026</id>
    <updated>2026-02-25T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#February_25_2026"/>
    <content type="html"><![CDATA[<h3>Feature</h3>
<p><strong>Added support for Google Cloud VPC Service Controls</strong></p>
<p>This feature is currently in Preview.</p>
<p><a href="https://docs.cloud.google.com/chronicle/docs/secops/vpcsc-for-secops">VPC Service Controls</a> helps protect against accidental or targeted action
by external entities or insider entities, which helps to minimize unwarranted
data exfiltration risks from Google Cloud services. You can use VPC Service Controls to create perimeters
that protect the resources and data of services that you explicitly specify. For more information, see <a href="https://docs.cloud.google.com/vpc-service-controls/docs/overview">Overview of VPC Service Controls</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>February 24, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#February_24_2026</id>
    <updated>2026-02-24T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#February_24_2026"/>
    <content type="html"><![CDATA[<h3>Feature</h3>
<p><strong>New: cross joins in multi-stage queries</strong></p>
<p>You can now use cross joins in YARA-L 2.0 multi-stage queries let you compare individual UDM event data against aggregated statistics calculated in previous YARA-L stages. They are supported in:</p>
<ul>
<li>Search</li>
<li>Dashboards</li>
</ul>
<p>For more information, see <a href="https://docs.cloud.google.com/chronicle/docs/investigation/multi-stage-yaral#cross-joins">Cross joins in multi-stage queries</a>.</p>
<h3>Feature</h3>
<p><strong>RBAC for ingestion metrics</strong></p>
<p>Administrators can now use RBAC for ingestion metrics to restrict visibility of system health data, such as ingestion volume, errors, and throughput, based on a user's business scope.</p>
<p>The <strong>Data Ingestion and Health</strong> dashboard now uses Data Access scopes. When a scoped user loads the dashboard, the system automatically filters metrics to show only data that matches their assigned labels: Namespace, Log Type, and Ingestion Source.</p>
<p>For more information, see <a href="https://docs.cloud.google.com/chronicle/docs/reports/native-dashboards#ingestion_metrics">Ingestion metrics</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>February 23, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#February_23_2026</id>
    <updated>2026-02-23T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#February_23_2026"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p><strong>New parser documentation now available</strong></p>
<p>New parser documentation is available to help you ingest and normalize logs from the following sources:</p>
<ul>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/bigswitch-bcf">Collect Big Switch BigCloudFabric logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/bmc-ami-defender">Collect BMC AMI Defender logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/broadcom-support-portal">Collect Broadcom Support Portal Audit logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/ca-acf2">Collect CA ACF2 logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/ca-ldap">Collect CA LDAP logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/chromeos-xdr">Collect ChromeOS XDR logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/chronicle-soar-audit">Collect Chronicle SOAR Audit logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/cisco-cts">Collect Cisco CTS logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/cisco-firesight">Collect Cisco FireSIGHT Management Center logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/cisco-stadiumvision">Collect Cisco Vision Dynamic Signage Director logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/clam-av">Collect ClamAV logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/cofense-triage">Collect Cofense logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/crowdstrike-ioc">Collect Crowdstrike IOC logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/custom-application-access">Collect Custom Application Access logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/custom-security-data-analytics">Collect Custom Security Data Analytics logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/cyber-2-ids">Collect Cyber 2.0 IDS logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/cyberark">Collect CyberArk logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/cybereason-edr">Collect Cybereason EDR logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/dataminr-alert">Collect Dataminr Alerts logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/digital-shadows-ioc">Collect Digital Shadows Indicators logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/mimecast-mail-v2">Collect Mimecast Mail V2 logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/okta-user-context">Collect Okta User Context logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/rh-isac-ioc">Collect RH-ISAC IOC logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/servicenow-cmdb">Collect ServiceNow CMDB data</a></li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>February 22, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#February_22_2026</id>
    <updated>2026-02-22T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#February_22_2026"/>
    <content type="html"><![CDATA[<h3>Change</h3>
<p><strong>Publisher Agent Version 2.6.4</strong> removes support for <strong>Python 3.7</strong> from the remote agent.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>February 20, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#February_20_2026</id>
    <updated>2026-02-20T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#February_20_2026"/>
    <content type="html"><![CDATA[<h3>Feature</h3>
<p><strong>New capabilities in Feeds page</strong></p>
<p>The following options have been added to the <strong>Feeds</strong> page:</p>
<ul>
<li>Search </li>
<li>Filtering (using feed attributes)</li>
<li>Pagination</li>
<li>Last Refreshed Time</li>
<li>Feed Metadata Export to CSV</li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>February 17, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#February_17_2026</id>
    <updated>2026-02-17T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#February_17_2026"/>
    <content type="html"><![CDATA[<h3>Deprecated</h3>
<p>Control of MCP use with organization policies is deprecated. After March 17, 2026, organization policies that use the <code>gcp.managed.allowedMCPServices</code> constraint won't work, and you can control MCP use with IAM deny policies. For more information about controlling MCP use, see <a href="https://docs.cloud.google.com/mcp/control-mcp-use-iam">Control MCP use with IAM</a>.</p>
<h3>Change</h3>
<p>After March 17, 2026, when you enable Google SecOps, the Google SecOps MCP server is automatically enabled.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>February 12, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#February_12_2026</id>
    <updated>2026-02-12T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#February_12_2026"/>
    <content type="html"><![CDATA[<h3>Feature</h3>
<p><strong>Advanced Joins in Search</strong></p>
<p>Google SecOps now supports expanded capabilities for correlating data across
multiple sources. These join operations are also supported in multistage queries.</p>
<p><strong>Joins without a <code>match</code> section</strong>: You can now use join operations to correlate
and combine data from multiple sources based on common field values without
requiring a <code>match</code> section (unlike statistical joins). Results are displayed in a
Joins table, which you can download as a CSV, or for event-to-event joins,
exported to a datatable for further analysis.</p>
<p>For more information, see <a href="https://docs.cloud.google.com/chronicle/docs/investigation/joins-without-match-section">Implement joins without a match section</a>.</p>
<p><strong>Outer joins</strong>: Search now supports left and right outer joins. Unlike standard
inner joins, these operations let you retrieve all records from a primary
data source even if no matching entry exists in the secondary source (unmatched
fields are returned as <code>null</code>). This action lets you correlate data
without losing unmatched events.</p>
<p>For more information, see <a href="https://docs.cloud.google.com/chronicle/docs/investigation/outer-joins">Correlate data with outer joins</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>February 09, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#February_09_2026</id>
    <updated>2026-02-09T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#February_09_2026"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p><strong>Enhanced rule observability: New metadata, visual indicators, and dashboards</strong></p>
<p>Google Security Operations has introduced updates to how detection and alert data is processed and visualized. These changes help Google SecOps teams distinguish between primary rule runs and <em>rule replays</em>, which provides clarity on detection delays and the impact of late-arriving enrichment data.</p>
<ul>
<li><p><strong>Key improvements</strong></p>
<ul>
<li><strong>Enhanced metadata</strong>: Detection and alert objects now include specific metadata that identifies whether they were produced during a primary rule run, or as part of a <em>rule replay</em> or retrohunt.</li>
<li><strong>Improved troubleshooting</strong>: This data lets Google SecOps teams definitively answer critical operational questions, such as the cause of perceived detection delays or the specific impact of late-arriving enrichment data on active rules.</li>
<li><strong>Rule replay insights</strong>: Learn more about the distinction between primary runs and replays to manage the re-enrichment of Unified Data Model (UDM) events. For detailed definitions and technical workflows, see <a href="https://docs.cloud.google.com/chronicle/docs/detection/rule-replays">Understand rule replay</a> and <a href="https://docs.cloud.google.com/chronicle/docs/detection/detection-delays#re-enrichment-of-udm-events">Understand rule detection delays</a>.</li>
<li><strong>New detection dashboard</strong>: To support these backend metadata changes, a new <strong>Detection Health</strong> dashboard is now available. This interface provides a visual representation of rule performance and replay status, letting teams monitor detection health more effectively.</li>
<li><strong>Custom reporting</strong>: There are new fields available in the <a href="https://docs.cloud.google.com/chronicle/docs/reference/sample-yaral-for-native-dashboard#detections">Detections schema</a>, letting you build custom dashboards.</li>
</ul></li>
<li><p><strong>New metadata and third-party integration</strong>: Detections and alerts now emit specific metadata to help customers track timing and latency. This data is available for integration with third-party systems using the following fields:</p>
<ul>
<li><code>detectionTimingDetails</code>: An enum identifying the run type:</li>
<li><code>DETECTION_TIMING_DETAILS_REPROCESSING</code></li>
<li><code>DETECTION_TIMING_DETAILS_RETROHUNT</code></li>
<li><code>DETECTION_TIMING_DETAILS_UNSPECIFIED</code></li>
<li><code>latencyMetrics</code>: Includes timestamps for <code>oldestIngestionTime</code>, <code>newestIngestionTime</code>, <code>oldestEventTime</code>, and <code>newestEventTime</code>.</li>
</ul></li>
<li><p><strong>Enhanced platform and visual indicators</strong>:</p>
<ul>
<li><strong>Alerts and rule details</strong>: A new visual indicator in the <strong>Detection Type</strong> column provides granular details on hover.</li>
<li><strong>Filter facets</strong>: The <strong>Alerts</strong> lister page now includes <em>detection timing details</em> as a filterable facet.</li>
<li><strong>SOAR integration</strong>: In the <strong>Case Overview</strong>, the <strong>Composite Detections</strong> table now carries through the same iconography for a consistent investigation experience.</li>
</ul></li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>February 04, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#February_04_2026</id>
    <updated>2026-02-04T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#February_04_2026"/>
    <content type="html"><![CDATA[<h3>Feature</h3>
<p><strong>The re.capture_all function is now available</strong></p>
<p>The new <a href="https://docs.cloud.google.com/chronicle/docs/yara-l/functions#recapture_all">re.capture_all</a> YARA-L 2.0 function is available in Rules, Search, and Dashboards.</p>
<p>Use the <strong>re.capture_all()</strong> function to extract every non-overlapping match of a regular expression from a string. While the standard <a href="https://docs.cloud.google.com/chronicle/docs/yara-l/functions#recapture"><strong>re.capture</strong></a> function stops after the first match it finds, the <strong>re.capture_all()</strong> function continues through the entire string to identify every instance that matches your pattern.</p>
<h3>Announcement</h3>
<p><strong>New parser documentation now available</strong></p>
<p>New parser documentation is available to help you ingest and normalize logs from the following sources:</p>
<ul>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/forgerock-openidm">Collect ForgeRock OpenIDM logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/forseti">Collect Forseti Open Source logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/fortinet-forticlient">Collect Fortinet FortiClient logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/fortinet-fortiddos">Collect Fortinet FortiDDoS logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/fortinet-fortiedr">Collect Fortinet FortiEDR logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/fortinet-fortimanager">Collect Fortinet FortiManager logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/fortinet-switch">Collect Fortinet Switch logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/fortra-powertech-siem-agent">Collect Fortra Powertech SIEM Agent logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/gcp-app-engine">Collect Google App Engine logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/gcp-dns-atd">Collect Google Cloud DNS Threat Detector log</a>s</li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/gcp-monitoring-alerts">Collect Google Cloud Monitoring alerting activity logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/gcp-ids">Collect Google Cloud Network Connectivity Center logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/gcp-secure-wp">Collect Google Cloud Secure Web Proxy logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/gmail-logs">Collect Gmail logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/h3c-switch">Collect H3C Comware Platform Switch logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/hackerone">Collect HackerOne logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/hillstone-ngfw">Collect Hillstone Firewall logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/hitachi-content-platform">Collect Hitachi Content Platform logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/hypr-mfa">Collect HYPR MFA logs</a></li>
<li><a href="https://docs.cloud.google.com/chronicle/docs/ingestion/default-parsers/ibm-guardium">Collect IBM Guardium logs</a></li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>February 03, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#February_03_2026</id>
    <updated>2026-02-03T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#February_03_2026"/>
    <content type="html"><![CDATA[<h3>Feature</h3>
<p><strong>Share custom column sets</strong></p>
<p>Google SecOps now lets you share custom sets of columns in the <strong>Events</strong> table for
consistent analysis across teams.</p>
<p>For more details, see <a href="https://cloud.google.com/chronicle/docs/investigation/udm-search">Search for events and alerts</a></p>
<h3>Announcement</h3>
<p><strong>Data RBAC global scope changes for ATI</strong></p>
<p>To enhance data security, several features related to Indicators of Compromise
(IOCs) and Emerging Threats now require global scope data RBAC permissions.
Users without global scope will see restricted information in the following areas:</p>
<ul>
<li><p><strong>Emerging threats</strong> page: IOC match counts per campaign are no longer visible.</p></li>
<li><p><strong>Entity widget overlay</strong>: The <strong>Indicators</strong> table is hidden or appears empty.</p></li>
<li><p><strong>Threat details</strong> page: The related entities, IOC matches, and GTI IOC tables are no longer visible.</p></li>
<li><p><strong>Entity summary</strong> widget: GTI scores are excluded from the overlay.</p></li>
<li><p><strong>IOC details</strong> page: The <strong>Indicator Details</strong> tab doesn't populate.</p></li>
</ul>
<p><strong>API impact</strong>: API calls to <code>IocService</code> and <code>ThreatCollectionService</code> now
require global scope. Direct calls made with the CLI or client libraries fail
without this permission.</p>
<p><strong>Required</strong>: Google SecOps administrators should review user roles and
grant global scope to those who require continued access to these threat
intelligence features.</p>
<aside class="note"><strong>Note:</strong><span> This change follows a phased rollout throughout the week of
February 02, 2026 to February 08, 2026.</span></aside>
<h3>Deprecated</h3>
<p><strong>Mute an IoC deprecated</strong></p>
<p>The Mute an IoC feature is deprecated, and the <strong>IOC details</strong> page no longer displays the <strong>Mute</strong> indicator.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>February 02, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#February_02_2026</id>
    <updated>2026-02-02T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#February_02_2026"/>
    <content type="html"><![CDATA[<h3>Change</h3>
<p>Google SecOps has updated the list of supported default parsers. Updates
propagate gradually; changes typically appear in your region within one to four
business days. For more information, see
<a href="https://docs.cloud.google.com/chronicle/docs/ingestion/parser-list/supported-default-parsers">Supported log types and default parsers</a>.</p>
<p>The following supported default parsers have been updated. Each parser is listed
by product name and <code>log_type</code> value, where applicable. This list includes both
released default parsers and pending parser updates.</p>
<ul>
<li>A10 Load Balancer (<code>A10_LOAD_BALANCER</code>)</li>
<li>AIX system (<code>AIX_SYSTEM</code>)</li>
<li>Akamai Cloud Monitor (<code>AKAMAI_CLOUD_MONITOR</code>)</li>
<li>AlgoSec Security Management (<code>ALGOSEC</code>)</li>
<li>Amazon API Gateway (<code>AWS_API_GATEWAY</code>)</li>
<li>Apache (<code>APACHE</code>)</li>
<li>Apple macOS (<code>MACOS</code>)</li>
<li>AppOmni (<code>APPOMNI</code>)</li>
<li>Arcsight CEF (<code>ARCSIGHT_CEF</code>)</li>
<li>Arista Switch (<code>ARISTA_SWITCH</code>)</li>
<li>Aruba (<code>ARUBA_WIRELESS</code>)</li>
<li>Aruba Airwave (<code>ARUBA_AIRWAVE</code>)</li>
<li>Aruba EdgeConnect SD-WAN (<code>ARUBA_EDGECONNECT_SDWAN</code>)</li>
<li>Aruba Switch (<code>ARUBA_SWITCH</code>)</li>
<li>Attivo Networks (<code>ATTIVO</code>)</li>
<li>Auth0 (<code>AUTH_ZERO</code>)</li>
<li>Automation Anywhere (<code>AUTOMATION_ANYWHERE</code>)</li>
<li>Avanan Email Security (<code>AVANAN_EMAIL</code>)</li>
<li>AWS Aurora (<code>AWS_AURORA</code>)</li>
<li>AWS Cloudtrail (<code>AWS_CLOUDTRAIL</code>)</li>
<li>AWS CloudWatch (<code>AWS_CLOUDWATCH</code>)</li>
<li>AWS Elastic Load Balancer (<code>AWS_ELB</code>)</li>
<li>AWS GuardDuty (<code>GUARDDUTY</code>)</li>
<li>AWS RDS (<code>AWS_RDS</code>)</li>
<li>AWS Security Hub (<code>AWS_SECURITY_HUB</code>)</li>
<li>AWS WAF (<code>AWS_WAF</code>)</li>
<li>Azure AD (<code>AZURE_AD</code>)</li>
<li>Azure AD Directory Audit (<code>AZURE_AD_AUDIT</code>)</li>
<li>Azure AD Sign-In (<code>AZURE_AD_SIGNIN</code>)</li>
<li>Azure Front Door (<code>AZURE_FRONT_DOOR</code>)</li>
<li>Barracuda Email (<code>BARRACUDA_EMAIL</code>)</li>
<li>Barracuda WAF (<code>BARRACUDA_WAF</code>)</li>
<li>BeyondTrust (<code>BOMGAR</code>)</li>
<li>BeyondTrust BeyondInsight (<code>BEYONDTRUST_BEYONDINSIGHT</code>)</li>
<li>BeyondTrust Endpoint Privilege Management (<code>BEYONDTRUST_ENDPOINT</code>)</li>
<li>BeyondTrust Secure Remote Access (<code>BEYONDTRUST_REMOTE_ACCESS</code>)</li>
<li>BIND (<code>BIND_DNS</code>)</li>
<li>Bindplane Agent (<code>BINDPLANE_AGENT</code>)</li>
<li>Blue Coat Proxy (<code>BLUECOAT_WEBPROXY</code>)</li>
<li>Box (<code>BOX</code>)</li>
<li>Carbon Black (<code>CB_EDR</code>)</li>
<li>Cato Networks (<code>CATO_NETWORKS</code>)</li>
<li>Check Point (<code>CHECKPOINT_FIREWALL</code>)</li>
<li>CipherTrust Manager (<code>CIPHERTRUST_MANAGER</code>)</li>
<li>Cisco Application Centric Infrastructure (<code>CISCO_ACI</code>)</li>
<li>Cisco ASA (<code>CISCO_ASA_FIREWALL</code>)</li>
<li>Cisco Email Security (<code>CISCO_EMAIL_SECURITY</code>)</li>
<li>Cisco Firepower NGFW (<code>CISCO_FIREPOWER_FIREWALL</code>)</li>
<li>Cisco Internetwork Operating System (<code>CISCO_IOS</code>)</li>
<li>Cisco ISE (<code>CISCO_ISE</code>)</li>
<li>Cisco Meraki (<code>CISCO_MERAKI</code>)</li>
<li>Cisco PIX Firewall (<code>CISCO_PIX_FIREWALL</code>)</li>
<li>Cisco Router (<code>CISCO_ROUTER</code>)</li>
<li>Cisco Stealthwatch (<code>CISCO_STEALTHWATCH</code>)</li>
<li>Cisco Switch (<code>CISCO_SWITCH</code>)</li>
<li>Cisco Umbrella Audit (<code>CISCO_UMBRELLA_AUDIT</code>)</li>
<li>Cisco Umbrella DNS (<code>UMBRELLA_DNS</code>)</li>
<li>Cisco vManage SD-WAN (<code>CISCO_SDWAN</code>)</li>
<li>Cisco WLC/WCS (<code>CISCO_WIRELESS</code>)</li>
<li>Cisco WSA (<code>CISCO_WSA</code>)</li>
<li>Citrix Netscaler (<code>CITRIX_NETSCALER</code>)</li>
<li>Claroty Continuous Threat Detection (<code>CLAROTY_CTD</code>)</li>
<li>Claroty Xdome (<code>CLAROTY_XDOME</code>)</li>
<li>Cloud SQL (<code>GCP_CLOUDSQL</code>)</li>
<li>Cloudflare (<code>CLOUDFLARE</code>)</li>
<li>Cloudflare Audit (<code>CLOUDFLARE_AUDIT</code>)</li>
<li>Compute Engine (<code>GCP_COMPUTE</code>)</li>
<li>Corelight (<code>CORELIGHT</code>)</li>
<li>CrowdStrike Alerts API (<code>CS_ALERTS</code>)</li>
<li>CrowdStrike Detection Monitoring (<code>CS_DETECTS</code>)</li>
<li>CrowdStrike Falcon (<code>CS_EDR</code>)</li>
<li>CrowdStrike Falcon Stream (<code>CS_STREAM</code>)</li>
<li>CyberArk (<code>CYBERARK</code>)</li>
<li>CyberArk Endpoint Privilege Manager (EPM) (<code>CYBERARK_EPM</code>)</li>
<li>CyberArk Privileged Access Manager (PAM) (<code>CYBERARK_PAM</code>)</li>
<li>Cyolo Secure Remote Access for OT (<code>CYOLO_OT</code>)</li>
<li>Darktrace (<code>DARKTRACE</code>)</li>
<li>Delinea Secret Server (<code>DELINEA_SECRET_SERVER</code>)</li>
<li>Dell ECS Enterprise Object Storage (<code>DELL_ECS</code>)</li>
<li>Dell Switch (<code>DELL_SWITCH</code>)</li>
<li>Duo Auth (<code>DUO_AUTH</code>)</li>
<li>ExtraHop RevealX (<code>EXTRAHOP</code>)</li>
<li>Extreme Wireless (<code>EXTREME_WIRELESS</code>)</li>
<li>F5 Advanced Firewall Management (<code>F5_AFM</code>)</li>
<li>F5 ASM (<code>F5_ASM</code>)</li>
<li>F5 BIGIP Access Policy Manager (<code>F5_BIGIP_APM</code>)</li>
<li>F5 BIGIP LTM (<code>F5_BIGIP_LTM</code>)</li>
<li>F5 Distributed Cloud Services (<code>F5_DCS</code>)</li>
<li>Fastly CDN (<code>FASTLY_CDN</code>)</li>
<li>FireEye ETP (<code>FIREEYE_ETP</code>)</li>
<li>FireEye NX (<code>FIREEYE_NX</code>)</li>
<li>Forcepoint Email Security (<code>FORCEPOINT_EMAILSECURITY</code>)</li>
<li>Forescout eyeInspect (<code>FORESCOUT_EYEINSPECT</code>)</li>
<li>FortiGate (<code>FORTINET_FIREWALL</code>)</li>
<li>Fortinet FortiAnalyzer (<code>FORTINET_FORTIANALYZER</code>)</li>
<li>Fortinet Fortimanager (<code>FORTINET_FORTIMANAGER</code>)</li>
<li>Fortinet Web Application Firewall (<code>FORTINET_FORTIWEB</code>)</li>
<li>GCP_APP_ENGINE (<code>GCP_APP_ENGINE</code>)</li>
<li>GCP_MODEL_ARMOR (<code>GCP_MODEL_ARMOR</code>)</li>
<li>GitHub (<code>GITHUB</code>)</li>
<li>GitHub Dependabot (<code>GITHUB_DEPENDABOT</code>)</li>
<li>Google Cloud Audit (<code>GCP_CLOUDAUDIT</code>)</li>
<li>Google Threat Intelligence (<code>GCP_THREATINTEL</code>)</li>
<li>H3C Comware Platform Switch (<code>H3C_SWITCH</code>)</li>
<li>Hashicorp Vault (<code>HASHICORP</code>)</li>
<li>HP Aruba (ClearPass) (<code>CLEARPASS</code>)</li>
<li>Huawei Switches (<code>HUAWEI_SWITCH</code>)</li>
<li>IBM DataPower Gateway (<code>IBM_DATAPOWER</code>)</li>
<li>IBM DB2 (<code>DB2_DB</code>)</li>
<li>Illumio Core (<code>ILLUMIO_CORE</code>)</li>
<li>Imperva (<code>IMPERVA_WAF</code>)</li>
<li>Imperva DRA (<code>IMPERVA_DRA</code>)</li>
<li>Island Browser logs (<code>ISLAND_BROWSER</code>)</li>
<li>Jamf pro context (<code>JAMF_PRO_CONTEXT</code>)</li>
<li>JumpCloud Directory Insights (<code>JUMPCLOUD_DIRECTORY_INSIGHTS</code>)</li>
<li>Juniper MX Router (<code>JUNIPER_MX</code>)</li>
<li>Keycloak (<code>KEYCLOAK</code>)</li>
<li>KnowBe4 PhishER (<code>KNOWBE4_PHISHER</code>)</li>
<li>Kolide Endpoint Security (<code>KOLIDE</code>)</li>
<li>Kubernetes Node (<code>KUBERNETES_NODE</code>)</li>
<li>Linux Auditing System (AuditD) (<code>AUDITD</code>)</li>
<li>McAfee DLP (<code>MCAFEE_DLP</code>)</li>
<li>McAfee ePolicy Orchestrator (<code>MCAFEE_EPO</code>)</li>
<li>McAfee Web Gateway (<code>MCAFEE_WEBPROXY</code>)</li>
<li>Microsoft AD FS (<code>ADFS</code>)</li>
<li>Microsoft Defender For Cloud (<code>MICROSOFT_DEFENDER_CLOUD_ALERTS</code>)</li>
<li>Microsoft Defender for Endpoint (<code>MICROSOFT_DEFENDER_ENDPOINT</code>)</li>
<li>Microsoft Graph API Alerts (<code>MICROSOFT_GRAPH_ALERT</code>)</li>
<li>Microsoft IIS (<code>IIS</code>)</li>
<li>Microsoft Intune (<code>AZURE_MDM_INTUNE</code>)</li>
<li>Microsoft PowerShell (<code>POWERSHELL</code>)</li>
<li>Microsoft SQL Server (<code>MICROSOFT_SQL</code>)</li>
<li>Mimecast Mail V2 (<code>MIMECAST_MAIL_V2</code>)</li>
<li>MISP Threat Intelligence (<code>MISP_IOC</code>)</li>
<li>Mobileiron (<code>MOBILEIRON</code>)</li>
<li>MySQL (<code>MYSQL</code>)</li>
<li>NetApp ONTAP (<code>NETAPP_ONTAP</code>)</li>
<li>Netfilter IPtables (<code>NETFILTER_IPTABLES</code>)</li>
<li>NetIQ Access Manager (<code>NETIQ_ACCESS_MANAGER</code>)</li>
<li>Netskope V2 (<code>NETSKOPE_ALERT_V2</code>)</li>
<li>Netskope Web Proxy (<code>NETSKOPE_WEBPROXY</code>)</li>
<li>Network Policy Server (<code>MICROSOFT_NPS</code>)</li>
<li>NGINX (<code>NGINX</code>)</li>
<li>Nozomi Networks Scada Guardian (<code>NOZOMI_GUARDIAN</code>)</li>
<li>Nutanix Prism (<code>NUTANIX_PRISM</code>)</li>
<li>Obsidian (<code>OBSIDIAN</code>)</li>
<li>Office 365 (<code>OFFICE_365</code>)</li>
<li>Okta (<code>OKTA</code>)</li>
<li>Onapsis (<code>ONAPSIS</code>)</li>
<li>One Identity TPAM (<code>ONEIDENTITY_TPAM</code>)</li>
<li>OneLogin (<code>ONELOGIN_SSO</code>)</li>
<li>Open Cybersecurity Schema Framework (OCSF) (<code>OCSF</code>)</li>
<li>Oracle (<code>ORACLE_DB</code>)</li>
<li>Palo Alto Networks Firewall (<code>PAN_FIREWALL</code>)</li>
<li>Palo Alto Panorama (<code>PAN_PANORAMA</code>)</li>
<li>Ping Identity (<code>PING</code>)</li>
<li>PostFix Mail (<code>POSTFIX_MAIL</code>)</li>
<li>PostgreSQL (<code>POSTGRESQL</code>)</li>
<li>Proofpoint CASB (<code>PROOFPOINT_CASB</code>)</li>
<li>Proofpoint Email Filter (<code>PROOFPOINT_MAIL_FILTER</code>)</li>
<li>Proofpoint On Demand (<code>PROOFPOINT_ON_DEMAND</code>)</li>
<li>Proofpoint Tap Alerts (<code>PROOFPOINT_MAIL</code>)</li>
<li>Pulse Secure (<code>PULSE_SECURE_VPN</code>)</li>
<li>QNAP Systems NAS (<code>QNAP_NAS</code>)</li>
<li>Radware Web Application Firewall (<code>RADWARE_FIREWALL</code>)</li>
<li>Recorded Future (<code>RECORDED_FUTURE_IOC</code>)</li>
<li>Red Hat OpenShift (<code>REDHAT_OPENSHIFT</code>)</li>
<li>Salesforce (<code>SALESFORCE</code>)</li>
<li>SAP Sybase Adaptive Server Enterprise Database (<code>SAP_ASE</code>)</li>
<li>Security Command Center Chokepoint (<code>GCP_SECURITYCENTER_CHOKEPOINT</code>)</li>
<li>Security Command Center Posture Violation (<code>GCP_SECURITYCENTER_POSTURE_VIOLATION</code>)</li>
<li>Security Command Center Threat (<code>GCP_SECURITYCENTER_THREAT</code>)</li>
<li>Security Command Center Toxic Combination (<code>GCP_SECURITYCENTER_TOXIC_COMBINATION</code>)</li>
<li>ServiceNow Audit (<code>SERVICENOW_AUDIT</code>)</li>
<li>Snare System Diagnostic Logs (<code>SNARE_SOLUTIONS</code>)</li>
<li>Snyk Group level audit/issues logs (<code>SNYK_ISSUES</code>)</li>
<li>Solaris system (<code>SOLARIS_SYSTEM</code>)</li>
<li>Sophos Central (<code>SOPHOS_CENTRAL</code>)</li>
<li>STIX Threat Intelligence (<code>STIX</code>)</li>
<li>Stormshield Firewall (<code>STORMSHIELD_FIREWALL</code>)</li>
<li>Sublime Security (<code>SUBLIMESECURITY</code>)</li>
<li>Suricata EVE (<code>SURICATA_EVE</code>)</li>
<li>Swift Alliance Messaging Hub (<code>SWIFT_AMH</code>)</li>
<li>Symantec DLP (<code>SYMANTEC_DLP</code>)</li>
<li>Symantec Endpoint Protection (<code>SEP</code>)</li>
<li>Symantec Messaging Gateway (<code>SYMANTEC_MAIL</code>)</li>
<li>Tableau (<code>TABLEAU</code>)</li>
<li>TCPWave DDI (<code>TCPWAVE_DDI</code>)</li>
<li>TeamViewer (<code>TEAMVIEWER</code>)</li>
<li>Tenable Active Directory Security (<code>TENABLE_ADS</code>)</li>
<li>Tenable OT (<code>TENABLE_OT</code>)</li>
<li>Tenable.io (<code>TENABLE_IO</code>)</li>
<li>Thinkst Canary (<code>THINKST_CANARY</code>)</li>
<li>ThreatConnect IOC V3 (<code>THREATCONNECT_IOC_V3</code>)</li>
<li>Trellix HX Event Streamer (<code>TRELLIX_HX_ES</code>)</li>
<li>Trend Micro (<code>TIPPING_POINT</code>)</li>
<li>Trend Micro Vision One (<code>TRENDMICRO_VISION_ONE</code>)</li>
<li>Trend Micro Vision One Workbench (<code>TRENDMICRO_VISION_ONE_WORKBENCH</code>)</li>
<li>TrendMicro Deep Discovery Inspector (<code>TRENDMICRO_DDI</code>)</li>
<li>TXOne Stellar (<code>TRENDMICRO_STELLAR</code>)</li>
<li>Unifi AP (<code>UNIFI_AP</code>)</li>
<li>Unix system (<code>NIX_SYSTEM</code>)</li>
<li>Vectra Detect (<code>VECTRA_DETECT</code>)</li>
<li>Vectra XDR (<code>VECTRA_XDR</code>)</li>
<li>Veritas NetBackup (<code>VERITAS_NETBACKUP</code>)</li>
<li>Versa Firewall (<code>VERSA_FIREWALL</code>)</li>
<li>VMware ESXi (<code>VMWARE_ESX</code>)</li>
<li>VMware NSX (<code>VMWARE_NSX</code>)</li>
<li>VMware vCenter (<code>VMWARE_VCENTER</code>)</li>
<li>WatchGuard (<code>WATCHGUARD</code>)</li>
<li>Windows DNS (<code>WINDOWS_DNS</code>)</li>
<li>Windows Event (<code>WINEVTLOG</code>)</li>
<li>Windows Event (XML) (<code>WINEVTLOG_XML</code>)</li>
<li>Wiz.io (<code>WIZ_IO</code>)</li>
<li>Workday Audit Logs (<code>WORKDAY_AUDIT</code>)</li>
<li>Workspace Activities (<code>WORKSPACE_ACTIVITY</code>)</li>
<li>Workspace Alerts (<code>WORKSPACE_ALERTS</code>)</li>
<li>Zimperium (<code>ZIMPERIUM</code>)</li>
<li>Zscaler (<code>ZSCALER_WEBPROXY</code>)</li>
<li>Zscaler CASB (<code>ZSCALER_CASB</code>)</li>
<li>Zscaler DLP (<code>ZSCALER_DLP</code>)</li>
<li>ZScaler DNS (<code>ZSCALER_DNS</code>)</li>
<li>Zscaler Internet Access Audit Logs (<code>ZSCALER_INTERNET_ACCESS</code>)</li>
<li>ZScaler NGFW (<code>ZSCALER_FIREWALL</code>)</li>
<li>Zscaler Private Access (<code>ZSCALER_ZPA</code>)</li>
<li>Zscaler Secure Private Access Audit Logs (<code>ZSCALER_ZPA_AUDIT</code>)</li>
<li>Zscaler Tunnel (<code>ZSCALER_TUNNEL</code>)</li>
<li>Zywall (<code>ZYWALL</code>)</li>
</ul>
<p>The following log types were added without a default parser. Each parser is listed by product name and <code>log_type</code> value, where applicable.</p>
<ul>
<li>Aikido (<code>AIKIDO</code>)</li>
<li>Akamai API Security (<code>AKAMAI_API_SECURITY</code>)</li>
<li>Alkira IP Flow (<code>ALKIRA_IP_FLOW</code>)</li>
<li>Atlassian Guard Detect (<code>ATLASSIAN_GUARD_DETECT</code>)</li>
<li>BlinkOps (<code>BLINKOPS</code>)</li>
<li>Canvas LMS (<code>CANVAS_LMS</code>)</li>
<li>Cisco Secure Email Threat Defense (<code>CISCO_SECURE_EMAIL_THREAT_DEFENSE</code>)</li>
<li>Cisco StarOS (<code>CISCO_STAR_OS</code>)</li>
<li>Citadel Identity360 (<code>CITADEL_IDENTITY360</code>)</li>
<li>Cyware Threat Intelligence Exchange (<code>CTIX</code>)</li>
<li>Cyberark Identity Audit (<code>CYBERARK_IDENTITY_AUDIT</code>)</li>
<li>CyCognito ASM (<code>CYCOGNITO_ASM</code>)</li>
<li>Dell VxRail (<code>DELL_VXRAIL</code>)</li>
<li>Gene6 FTP Server (<code>GENE6_FTP</code>)</li>
<li>IBM Copy Services Manager (<code>IBM_CSM</code>)</li>
<li>LangSmith Audit (<code>LANGSMITH_AUDIT</code>)</li>
<li>Mellanox Switch (<code>MELLANOX_SWITCH</code>)</li>
<li>Microsoft Entra ID Protection (<code>MICROSOFT_ENTRA_ID_PROTECTION</code>)</li>
<li>NSFOCUS Next Generation Intrusion Prevention System (<code>NSFOCUS_NGIPS</code>)</li>
<li>Perplexity (<code>PERPLEXITY</code>)</li>
<li>Pleasant Password Server (<code>PLEASANT_PASSWORD_SERVER</code>)</li>
<li>Prompt Security (<code>PROMPT_SECURITY</code>)</li>
<li>Qualtrics Audit (<code>QUALTRICS_AUDIT</code>)</li>
<li>Rancher API Audit Log (<code>RANCHER_API_AUDIT_LOG</code>)</li>
<li>Rubrik Security Cloud (<code>RUBRIK_SECURITY_CLOUD</code>)</li>
<li>SAP Business Warehouse (<code>SAP_BW</code>)</li>
<li>SAP Change Document (<code>SAP_CHANGE_DOCUMENT</code>)</li>
<li>SAP Gateway (<code>SAP_GATEWAY</code>)</li>
<li>SAP Hana Audit (<code>SAP_HANA_AUDIT</code>)</li>
<li>Scale Computing (<code>SCALE_COMPUTING</code>)</li>
<li>Slack API (<code>SLACK_API</code>)</li>
<li>Snowplow (<code>SNOWPLOW</code>)</li>
<li>Sterling Order Management System Data (<code>STERLING_OMS_DATA</code>)</li>
<li>Strivacity (<code>STRIVACITY</code>)</li>
<li>Tencent CloudAudit (<code>TENCENT_CLOUD_AUDIT</code>)</li>
<li>Trellix EX (<code>TRELLIX_EX</code>)</li>
<li>Unifi System (<code>UNIFI_SYSTEM</code>)</li>
<li>Windows Bindplane (<code>WINDOWS_BINDPLANE</code>)</li>
<li>Witness AI Control (<code>WITNESS_AI_CONTROL</code>)</li>
<li>Zendesk Advanced Data Privacy and Protection (<code>ZENDESK_ADPP</code>)</li>
</ul>
]]>
    </content>
  </entry>

  <entry>
    <title>February 01, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#February_01_2026</id>
    <updated>2026-02-01T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#February_01_2026"/>
    <content type="html"><![CDATA[<h3>Change</h3>
<p>The <strong>Case Federation</strong> feature is no longer dependent on the <strong>Case Federation</strong> integration in the primary platform.</p>
<p>The primary platform sync job is now disabled. Do not attempt to re-enable it.</p>
<p>For more information, see <a href="https://docs.cloud.google.com/chronicle/docs/soar/admin-tasks/environments/case-federation-secops">Set up federated case access for SecOps</a>.</p>
]]>
    </content>
  </entry>

  <entry>
    <title>January 30, 2026</title>
    <id>tag:google.com,2016:chronicle-security-operations-release-notes#January_30_2026</id>
    <updated>2026-01-30T00:00:00-08:00</updated>
    <link rel="alternate" href="https://docs.cloud.google.com/chronicle/docs/secops/release-notes#January_30_2026"/>
    <content type="html"><![CDATA[<h3>Announcement</h3>
<p>The following v2 connectors, which utilize Google Storage Transfer Service (STS), are now in General Availability:</p>
<ul>
<li>Google Cloud Storage v2</li>
<li>Amazon S3 v2</li>
<li>Google Cloud Storage (Event Driven)</li>
<li>Amazon SQS v2</li>
<li>Azure Blobstore v2</li>
</ul>
]]>
    </content>
  </entry>

</feed>
