Skip to content

Exabeam Delivers First Configurable Peer Benchmarking for CISO Decision-Making — Read the Release

What’s New in Exabeam Product Development – June 2024

  • Jul 01, 2024
  • Jeannie Warner
  • 3 minutes to read

Table of Contents

    Our June product release introduces three new major features: Proofpoint Targeted Attack Protection (TAP) support, GeoIP field support for visualizations, correlation rule definitions within Threat Center, and more!

    Proofpoint Targeted Attack Protection (TAP) Collector

    Proofpoint Targeted Attack Protection (TAP) can detect, analyze, summarize, and block advanced threats targeting organization email users. It’s been estimated that the majority of cyberattacks start with email. For this reason, it’s no surprise that Proofpoint TAP has been one of the most popular Exabeam data sources over time.

    For the June release, a prebuilt Proofpoint TAP Collector is now generally available on the Exabeam Security Operations Platform. With the Proofpoint TAP Collector, Exabeam can ingest email log data including messages delivered, messages blocked, clicks permitted, and clicks blocked. This Proofpoint log is then normalized into the Exabeam Common Information Model (CIM) and used to strengthen machine-learned user and entity behavior analytics (UEBA), threat investigations, and threat hunting.

    Security teams face the constant challenge of detecting email-based threats. The Proofpoint TAP Collector integrates seamlessly with Exabeam, providing a richer dataset that includes message details, user clicks, and blocking information. This empowers Exabeam machine learning-based AI to identify suspicious user behavior, ultimately improving threat investigations and threat hunting. Additionally, the prebuilt collector streamlines data collection, saving security personnel time and resources.

    GeoIP field support for Dashboards

    You can now add geoIP location fields to your visualizations, allowing for the display of detailed geoIP source and geoIP destination information in your dashboards. The geoIP fields you can visualize include city, country, latitude, longitude, and ISP. ​

    When creating a new visualization for a dashboard, the geoIP location fields are available for selection in the lists of measures and dimensions, as shown below. 

    ​You can also leverage these fields from the Search application by clicking on a geoIP location field and using the​​ Visualize Field​​ option.​

    GeoIP data is crucial for threat hunters as it helps identify the geographic source of attacks, correlate them with known threat actors, and detect suspicious behavior based on location. It aids in incident response through geographical blocking, enhances threat intelligence with contextual information, and supports compliance with regulatory requirements. Additionally, it assists in attack attribution, anomaly detection, and policy enforcement, making it an invaluable tool for improving defenses and effectively mitigating cyberthreats.

    For more information about creating visualizations, see ​Create a Visualization​ in the ​Dashboards Guide​​.

    Correlation rule definitions within Threat Center

    A highly requested Threat Center enhancement, analysts now have the ability to view correlation rule definitions directly from the Threat Timeline while investigating alerts and cases. Previously, there was no capability for analysts to interact with correlation rule triggers within Threat Timelines, leaving them without insights into how a rule worked or why it was triggered. This improvement allows analysts to better understand threats and expedite their investigations, eliminating the need to leave Threat Center to reference rule definitions. This streamlined access enhances threat hunting efficiency and ensures that analysts can conduct thorough investigations with streamlined workflows.

    SSL interception

    SSL interception, also known as HTTPS interception, allows Exabeam customers to decrypt, inspect, and re-encrypt SSL/TLS encrypted traffic between on-premises Site Collector and Exabeam Security Operations Platform. This process enables users to monitor and secure data that would otherwise be hidden from traditional security measures.

    Why is SSL interception valuable?

    1. Enhanced security: Detect and block hidden threats within encrypted traffic, providing an additional layer of defense against cyberattacks.
    2. Data loss prevention (DLP): Prevent unauthorized exfiltration of sensitive information, ensuring your critical data stays protected.
    3. Regulatory compliance: Meet industry standards and regulatory requirements by ensuring encrypted traffic is inspected and logged.
    4. Complete visibility: Gain full visibility across all log sources, enabling better monitoring and anomaly detection.
    5. Optimized performance: Identify and mitigate performance bottlenecks, ensuring efficient and secure data transmission.

    Enterprise specifications for Windows Event Log Collection

    A WELC (Windows Event Log Collection) agent is a software component that runs on Windows systems to collect and forward event log data to a centralized system, such as the Exabeam Security Operations Platform, for analysis and monitoring. Scalable support for Windows Event Log Collection (WELC) agents from an on-prem site ensures comprehensive, scalable security monitoring by collecting detailed logs from numerous endpoints at scale, enhancing threat detection and providing early warning of potential incidents.

    For June, Exabeam has increased enterprise level WELC support from 100 agents up to 500 agents. This allows organizations to easily accommodate growth and increased data volumes without significant infrastructure changes. Supporting an increased number of WELC agents also aids regulatory compliance by providing complete audit trails and detailed reports, crucial for meeting security standards. Operational efficiency is improved with centralized management, simplifying administration and offering a unified view of security events. Scaling up to 500 WELC agents (17K events per second) not only enhances security posture but also optimizes resource utilization, reducing operational costs and overhead. 

    For a detailed list and descriptions of the features introduced in the Exabeam June release, please refer to the Exabeam Security Operations Platform Release Notes.

    Stay up to date with Exabeam Community

    Stay up to date with Exabeam Community

    Dig into the new release in the Exabeam Community. Engage in live ExaExpert Q&A sessions every other week, or join technical discussions at your convenience. Your curiosity and questions are always welcome.

    Jeannie Warner

    Jeannie Warner

    Director, Product Marketing | Exabeam | Jeannie Warner, CISSP, is the Director of Product Marketing at Exabeam. Jeannie is an information security professional with over twenty years in infrastructure operations/security starting her career in the trenches working in various Unix help desk and network operations centers. She started in Security Operations for IBM MSS and quickly rose through the ranks to technical product and security program manager for a variety of software companies such as Symantec, Fortinet, and Synopsis (formerly WhiteHat) Security. She served as the Global SOC Manager for Dimension Data, building out their multi-SOC “follow the sun” approach to security. Jeannie was trained in computer forensics and practices, and plays a lot of ice hockey.

    More posts by Jeannie Warner

    Learn More About Exabeam

    Learn about the Exabeam platform and expand your knowledge of information security with our collection of white papers, podcasts, webinars, and more.

    • Blog

      What’s New in LogRhythm SIEM October 2025

    • Blog

      What’s New with New-Scale in October 2025: Measurable, Automated, Everywhere Security Operations

    • Blog

      Catching the Quiet Threats: When Normal Isn’t Safe

    • Blog

      UEBA vs. XDR: Rethinking SIEM Augmentation in the AI Era

    • Blog

      How Exabeam Helps Organizations Adapt to Australia’s Privacy Reforms

    • Webinar

      New-Scale Security Operations Platform: October 2025 Quarterly Launch

    • Show More