Previous Release Notes for Cisco XDR in 2026
Release Date: April 15, 2026
New Features and Updates
Note: Only sections with new customer-facing features or updates in this release are listed below.
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Response tab update in incident detail |
The Cisco Managed tasks that are automatically generated by AI based on the observables for the incident have been removed from the list of tasks in the Identification phase in the Response tab. You can view AI-generated recommended tasks in the Recommendations panel on the incident detail with AI analysis page, if applicable. |
|
|
Incident detail with AI analysis updates |
The following updates have been made to the incident detail with AI analysis page:
|
|
|
Action count badge added to Actions Taken in node drawer |
If there are more than 50 actions taken, all identical actions will now be aggregated into one action with the action count displayed as a badge to the left of the source in the Actions Taken area of the node drawer. |
|
|
Help updates |
The following updates have been made to the Help:
|
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Account Keys |
For security reasons, HTTP targets with remote no longer support Cisco XDR Token as an account key. Pass an authentication header instead. |
|
|
Automation Remote |
Virtual appliances based on v2.x OVAs are deprecated. The state of connected v2.x Remotes are not impacted, but users should replace their virtual appliances with v3.0 or newer OVAs for continued support. |
|
|
|
You can now set the validity period of certificates up to 2 years on remotes based on v3.0 or newer OVAs. |
|
| Help updates | Added new OVA information to the Configure and Deploy the Virtual Appliance section in the Remote Setup and Deployment topic. | Remote Setup and Deployment |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Unified device status fields |
Fields on the Devices page have been updated to improve filtering and provide an easier way to view the different properties for devices. We've merged the data from previous fields and the following fields have been added:
Rules that included the deprecated fields will be disabled until you update the Rule Criteria. Click Rules on the Devices page to view which rules need to be updated. Saved filters containing deprecated fields have been automatically updated to remove those fields. To include the updated status fields, you will need to create and save new filters. |
|
|
Security and Compliance card |
The Security Products card on the Device Details page has been expanded into the new Security and Compliance card. This card provides the previous fields for Firewall status and Disk encryption, while providing new fields for Device health, Antivirus details, and Compliance status if available. |
|
|
Secure Endpoint source card |
The Cisco Secure Endpoint (AMP) card on the Device Details page has been merged into the Secure Endpoint card in the Seen in Sources section. To see the AV definitions status, Device isolation status, Orbital enablement, and other device data provided by Secure Endpoint, click View full details on the source card. |
|
|
New user fields |
The following fields have been added to the Users page to enable you to evaluate user behavior, risk levels, and take more effective action during incident investigations:
|
|
|
User details |
The User Details page has been reorganized to display the Security and User Details sections. The Security section includes the user's trust level and additional information that was used to determine the user's Trust Level, and the user's multi-factor authentication status and a list of all the identity events from Identity Intelligence. The User Details section includes the identity details, used devices, activity details, and organization details for the user. |
|
|
Help updates |
The following has been updated in the Help:
|
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Endpoint Visibility Module version update |
Endpoint Visibility Module version 1.6.1.9 for Windows has been released. It resolves a performance issue in Endpoint Visibility Module version 1.6 that caused high CPU usage by optimizing file information retrieval. |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Filtered results have been added to the Integrations page |
The total number of integrations is now displayed next to the Detection sources check box on the Integrations page. The results counts are also displayed as badges in the Cisco and Third-party tabs, updating automatically when you search or apply filters. |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Enhanced remote shell session visibility |
When reviewing historical remote shell (interACT) sessions, the session header now shows the specific task name, enabling analysts to quickly identify and navigate between concurrent live-response sessions. This improves investigation context and analyst efficiency. |
_ |
|
MITRE ATT&CK Analyzer version 13.0.1 update |
Added Microsoft 365 detection enhancements to identify unauthorized administrative configuration changes and correlating suspicious activity such as brute-force logins and permission changes. Sigma rule integrations have also been updated with the latest rules for comprehensive endpoint and cloud analysis. Additionally, YARA-based detection signatures for Covenant C2 activities strengthen early adversary infrastructure identification. |
MITRE ATT&CK Analyzer changelog |
Release Date: April 1, 2026
New Features and Updates
Note: Only sections with new customer-facing features or updates in this release are listed below.
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Top Seen Techniques card added to Private Intelligence on Dashboards page |
The Top Seen Techniques card has been added to Private Intelligence in the Customize Dashboards dialog box. It displays the top ten MITRE ATT&CK® techniques seen in incidents within the selected timeframe. |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Filter by evidence type added to Evidence tab in incident detail |
You can now filter the evidence list by evidence type using the new Evidence type drop-down list in the Evidence tab. |
|
| Help updates |
The following updates have been made to the Help:
|
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Getting Started Page |
View a Getting Started page the first time you navigate to Automate > Workspace. |
|
|
Custom security event type |
Added a new Identity security event type to Custom Security Event Workflow. |
|
|
Help updates |
Updated Automate documentation with current procedure to create workflows. |
|
| Integration targets | Added a new Commvault Cloud target. This target does not need to be configured and is not editable. | Targets Created From Integrations |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Commvault Cloud integration added to Integrations page |
The new Commvault Cloud integration has been added to the Third-Party tab on the Integrations page. Integrating Commvault Cloud with Cisco XDR enhances network and data security and inter-operability. Organizations can initiate Commvault protection for VM workloads directly from the Cisco XDR platform, through the Automate functionality, preserving the VM’s current state early in incident response. SOC teams can also create Cleanroom Recovery Groups within Commvault, enabling impacted VMs to be restored into an isolated environment for investigation and, when appropriate, recovered back to production after the incident. |
Cisco and Third-Party Integrations and Supported Capabilities |
|
Microsoft Graph Security API integration update |
The Microsoft Graph Security API integration in the Third-Party tab on the Integrations page has been updated to use the advanced hunting API in Microsoft Graph. This replaces the legacy alerts API that will be deprecated in April 2026. The description and Step 12 in the Integration Guide area on the Microsoft Graph Security API integration page has been updated to reflect the new API change. To ensure continued functionality, you must update your application in Microsoft Azure to use the Threat Hunting.Read.All permission. |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
User role updates |
XDR Forensics Org Admins have been promoted to the Global Admin user role. This will enable admins to have full control over managing 118 specific privileges, allowing the creation of highly customized user roles. This granular access control ensures that each user or group has permissions tailored to their specific needs, such as handling evidence acquisition, interACT sessions, or audit log management. |
|
|
Auto update |
The XDR Forensics console now automatically updates to ensure that customers have access to the latest features. You can schedule a specific time frame for the Responder to update to ensure that updates do not delay or disrupt ongoing investigations. Go to Settings > Assets in XDR Forensics to schedule a specific time frame for the auto updates. |
Release Date: March 18, 2026
New Features and Updates
Note: Only sections with new customer-facing features or updates in this release are listed below.
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Help icons added to drawers |
The |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
New incident detail view with AI analysis |
You can now click Launch New Incident View in the upper right corner of the incident detail to display the new AI-powered incident detail view. This view presents an overview of the AI analysis and evaluation of the incident, indicating whether it is likely a true or false positive threat. The AI assesses incidents in a manner similar to a human analyst, systematically forming and validating hypotheses. It analyzes individual detections, observables, indicators, and their combination, to identify a threat narrative consistent with the incident data. The final classification, along with reasoning, supporting evidence, and recommended response steps, is displayed in the incident detail view. Note: The new incident detail view is currently in Beta and subject to change. |
|
|
Help update |
Updated the Add AI-Generated Note section in the Response topic to clarify the AI-generated note feature. |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Detection findings tab updates |
The following updates have been made to the Detection Findings tab on the Investigate page:
|
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Activities |
Added toggle to fill empty fields with default values in the Parse JSON activity. |
|
| Help updates | Added new OVA information to the Configure and Deploy the Virtual Appliance section in the Remote Setup and Deployment topic. | Remote Setup and Deployment |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Endpoint Visibility Module |
The Endpoint Visibility Module is available for Windows amd64 and macOS deployments. The Endpoint Visibility Module is a critical component for organizations striving for seamless endpoint visibility and advanced threat detection within Cisco XDR. Its comprehensive endpoint telemetry complements Cisco and third-party EDR deployments, adding essential context to threat detections. |
|
|
Endpoint Data Loss Prevention |
The Endpoint Data Loss Prevention module is now available for Windows amd64 deployments. Cisco Endpoint Data Loss Prevention (Endpoint DLP) enables you to protect sensitive data on endpoints by controlling what data is transferred to external devices. It extends your organization’s data protection policies to the endpoint. You can also upload a new Endpoint Data Loss Prevention profile to the Profiles page and select a Endpoint Data Loss Prevention profile when creating new deployments. |
|
|
Help updates |
The following updates have been made to the Help:
|
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Detection sources filter added to Integrations page |
You can now check the new Detection sources check box on the Integrations page to quickly filter the page to only display the source products that continuously provide detections to Cisco XDR. These detections are analyzed by the detection engine and may be correlated into incidents. The new Detection sources check box has also been added to the Capabilities drop-down list on the Integrations page. |
Cisco and Third-Party Integrations and Supported Capabilities |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Help update |
Updated the previous Detection Analytics and Correlation column by splitting it into the following two columns in the Cisco and Third-Party Integrations and Supported Capabilities topic: Detections and Telemetry. |
Cisco and Third-Party Integrations and Supported Capabilities |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Help update |
Added the Endpoint Visibility Module in Cisco XDR topic to provide more information on the capabilities and supported operating systems for the Endpoint Visibility Module. |
Endpoint Visibility Module in Cisco XDR |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Advanced Time Display and Copy Options |
The DateTime component within XDR Forensics now includes a contextual popover to view and copy timestamps in multiple formats including UTC, ISO, local, and relative time. This enhancement streamlines correlation activities across multiple evidence sources and logs during complex investigations. |
|
|
Improved Kerberos Event Collection for KDC Event ID 42 |
Added support for critical Kerberos Key Distribution Center events (Event ID 42) within default Windows event collection profiles. This expands detection visibility for authentication downgrade and anomaly scenarios often relevant in enterprise breaches. |
Release Date: March 4, 2026
New Features and Updates
Note: Only sections with new customer-facing features or updates in this release are listed below.
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Filter by data type added to Observables drawer |
You can now filter the list of observables by data type using the new Type drop-down list at the top of the Observables drawer in the incident detail. The total number of searched or filtered results is now displayed to the right of the Type drop-down list. |
|
|
Evidence tab update |
When you click the evidence name in the Evidence tab, it opens the evidence details directly in the XDR Forensics UI. You no longer need to click the View Investigation Hub icon on the XDR Forensics page before it opens the evidence details in the XDR Forensics UI. |
— |
|
Search Results added to assign incident popup |
When you assign users to an incident, a list of all the users are listed in the new Search Results area. You can narrow the list by entering a user in the Search field. The current user is now displayed as a suggested assignee under the Search field if the incident is assigned to other users. |
|
Feature |
Description |
Help Topic |
|---|---|---|
| AI run summary | You can now view an AI-generated summary of workflow runs. | View, Filter, and Search for Runs |
| Help updates | Updated documentation for reorganized Automation pages and navigation. | About Automation |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Help updates |
Added a note that Cisco Identity Intelligence provides a maximum of 10 groups for a user to the Users topic. |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Help updates |
Updated the steps in the Configure a GCP Subnet to Generate VPC Flow Logs section of the Google Cloud Platform Integration topic. |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Improved Endpoint Name Change Handling to Enhance System Performance |
In certain environments, endpoint name change events could previously be triggered due to misconfigured deployments, particularly in cases involving golden image deployments that did not follow the provided deployment guidelines. This scenario could result in a high volume of asset name changes, generating excessive audit logs and triggering updates on investigations. The combination of frequent asset name updates, audit log generation, and related notifications created significant system load, leading to performance degradation. In addition, audit log generation and event-based notifications related to endpoint name changes have been disabled, as their operational impact outweighed their functional value. To improve overall system performance and protect core AIR functionality, endpoint name change handling on investigations and the related audit log generation have been removed, as their operational impact outweighed their functional value. Additionally, the warning status indicating a high number of endpoint name changes has been removed, as it relied on audit log data. |
— |
|
Improved Auto-Scaling and Recovery Stability for SaaS Tenants |
Some SaaS tenants previously experienced extended auto-scaling and recovery durations due to a potential issue related to database connection handling during application startup. Enhancements have been implemented to improve database connection management during startup, resulting in more stable auto-scaling behavior and reduced recovery times. |
— |
|
Enhanced Export Service Performance for Large Data Sets |
The export service used across multiple features (including Audit Log exports and Investigation Hub Evidence/Finding exports) has been enhanced to better handle large data sets. These improvements increase reliability, stability, and performance when exporting high-volume data. |
— |
Release Date: February 18, 2026
New Features and Updates
Note: Only sections with new customer-facing features or updates in this release are listed below.
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Record screen added to Help menu |
The new Record screen option is now available from a drop-down list access by clicking the |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
New statuses added to the Evidence tab |
The following new statuses have been added to the Evidence tab in the incident detail:
|
|
|
Resize table column width on the Incidents page |
You can now resize the column width in the incident table on the Incidents page. |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Related incidents update on Detection Findings page |
The Not available status is now displayed in the Related incidents column on the Detection Findings page if the related incidents cannot be determined due to the security event being generated prior to the related incidents feature support (September 25th, 2025). The previous em dash (—) status now displays None in the Related incidents column. |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Copy and Download buttons added to Intelligence page |
The new Copy and Download buttons have been added to the JSON panel in the Judgments, Indicators, Events, and Feeds tabs on the Intelligence page. |
|
|
Help update |
Updated screenshots in the Judgments topic to align with the UI. |
|
Feature |
Description |
Help Topic |
|---|---|---|
| Run monitoring | You can view the duration of runs in the new Run time column. You can toggle the display of sub-workflows and atomics by filling a checkbox on the Runs page. The Owner column has been removed. Runs can no longer be deleted from the Runs page. | |
| Help updates | Added new OVA information to the Configure and Deploy the Virtual Appliance section in the Remote Setup and Deployment topic. | Remote Setup and Deployment |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Help update |
Added the int-check-in-ignored event type to the Device Events topic. |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
AppOmni SaaS Security integration added to the Integrations page |
The new AppOmni SaaS Security integration has been added to the Third-Party tab on the Integrations page. AppOmni enriches Cisco XDR investigations with SaaS identity, access, and threat context. Search AppOmni directly from Cisco XDR to understand who a user is, what SaaS applications they can access, and their level of access, including elevated or administrative privileges. |
Cisco and Third-Party Integrations and Supported Capabilities |
|
Talos Intelligence integration update |
The Talos Intelligence integration now uses Talos URS API instead of Talos SDS API. |
— |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Historical data update in Pivot menu |
The Historical button at the top of the Pivot menu has been renamed to Incident time or Investigation time, depending on whether the Pivot menu is opened in an incident or an investigation. |
|
|
Help update |
Added a note to the Investigate Observable section in the Pivot Menu topic to clarify that manual investigations may not always align with incident observables. |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Smarter evidence analyzer behavior for missing artifacts |
DRONE analyzer logic now skips analysis tasks when expected artifacts are absent from collected data. This prevents confusing error messages and makes error logs clearer and more accurate for investigation teams. |
|
|
Investigation Hub asset filter crashes with large cases |
The Asset drop-down list in Investigation Hub could become unresponsive in investigations with thousands of assets. The filter now supports virtualized loading for smoother performance in enterprise-scale environments. |
|
|
Asset registration failure on identical cloud instance IDs |
In environments where multiple assets share the same cloud infrastructure ID, responder registration could fail. XDR Forensics now handles additional identifiers to differentiate assets reliably in these cases. |
— |
|
XDR Forensics MITRE ATT&CK Analyzer |
MITRE ATT&CK Analyzer is now at version 12.2.0, which introduces expanded and enhanced detection capabilities across multiple threat categories, including comprehensive rule coverage for advanced malware families. |
Release Date: February 4, 2026
New Features and Updates
Note: Only sections with new customer-facing features or updates in this release are listed below.
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Help update |
Updated the Sync and Highlight Data section in the Investigation Results topic to remove events highlight. |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Meraki adapter |
Meraki adapter was superseded by Cisco Meraki integration in release 2.29. The current release removes the obsolete adapter. |
|
|
Help updates |
The following updates have been made to the Help:
|
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Rules for users |
You can now create rules that will assign labels and values to users automatically. On the Users page, click Rules to open the drawer to create new rules from search or from scratch. |
|
|
Cisco Meraki Network Devices support |
Meraki Network Devices are now supported on the Devices page, and the Sources page will display a separate cards for Meraki Network Devices. Existing customers do not need to update their Cisco Meraki integration, as the integration module will automatically ingest Meraki Network Devices data. |
|
|
Device type chart |
The device type chart on the Devices page now includes a check box for Other devices, which includes network devices and IoT devices. The Other check box will automatically filter the table for those device types. To filter by a specific type of network device, for example, Firewall devices, use the Type drop-down menu in the Filters drawer. |
|
|
Help updates |
The following updates have been made to the Help:
|
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Help updates |
The following updates have been made to the Help:
|
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Help updates |
Updated the View Git repositories and Used by information and View remotes list and Used by information rows from Yes to No for the Incident Responder and Security Analyst columns in the Roles topic. |
Release Date: January 21, 2026
New Features and Updates
Note: Only sections with new customer-facing features or updates in this release are listed below.
|
Feature |
Description |
Help Topic |
|---|---|---|
| Help update | Updated the onboarding information in the Sign In to Cisco XDR section. | Getting Started |
|
Feature |
Description |
Help Topic |
|---|---|---|
| Help icon updates |
The new Cisco support options are now available from a drop-down list accessed by clicking the Previously, you accessed the Cisco XDR online help by clicking the |
Navigate Cisco XDR |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Assets without XDR Forensics enabled |
The new Assets without XDR Forensics enabled panel has been added to the Acquire forensic evidence and Launch remote shell drawers in the Evidence tab. Click the |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Maximum number of security events displayed on Detection findings page |
The detection findings table now displays the first 10,000 security events only on the Detection findings page. |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Help updates |
The following updates have been made to the Help:
|
|
Feature |
Description |
Help Topic |
|---|---|---|
|
User management in Secure Cloud Control |
The ability to invite users, change user status, and manage user permissions will be moved from the Manage Users page in Cisco XDR to the Administrator Access page in Security Cloud Control. For more information on inviting users and managing permissions in Security Cloud Control, see Managing Role-Based Access Control in the Cisco Security Cloud Control Administration Guide. The Manage Users page will become view-only, displaying all users in your organization along with their assigned roles and current statuses. This change goes into effect on January 28, 2026. If you are an existing Cisco XDR user, your account will be automatically migrated to Security Cloud Control on January 28th, 2026. Your tenant will need to be attached to your Security Cloud Control Enterprise to leverage this functionality. No additional action is required by your organization. |
|
|
Help update |
Updated the My Account topic with a new screenshot to align with the UI. |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Help update |
Updated the Minimum Cisco XDR Licensing Tier Requirement column for the StealthMole integration in the Cisco and Third-Party Integrations and Supported Capabilities topic from Advantage to Essential. |
Cisco and Third-Party Integrations and Supported Capabilities |
|
Feature |
Description |
Help Topic |
|---|---|---|
| Orbital app updates |
The parameter type and the Get parameters from custom script link have been added to the Custom Script area in the Orbital app. |
Orbital App |
|
Feature |
Description |
Help Topic |
|---|---|---|
|
Assets menu |
The Assets menu in XDR Forensics has been separated into Devices, Disk Images, and Cloud Assets. This streamlined layout enables you to locate relevant evidence sources, assess responder status, and initiate investigation workflows with improved clarity. |