In February, we announced the beta release of Blumira’s Public API, allowing customers to request access to on-demand findings data outside of the application. We also added new detection rules to our suite, including those for Windows login tampering and suspicious service creation, along with various improvements and bug fixes.
Public API Beta: Customers can now request access to Blumira’s Public API to access findings data on-demand outside of the application. As we continue to work on our API capabilities, we welcome early testers on paid Blumira editions to click here to request beta access and give ongoing feedback.
Note: The API currently does not grant MSPs access to sub-accounts; this is planned work for full release as we continue to actively build on the API.
Field Sorting: When editing reports in Report Builder, fields now appear alphabetically in the dropdown menu for easier navigation to the fields you are most interested in.
Error Handling: We improved our error handling/messaging for when a user attempts to add a filter without selecting a data source in the Report Builder.
Log Type | Detection Rule Name | Details |
---|---|---|
Windows | NEW - Winlogon Registry Tampering: Change to Startup Behavior | This detection alerts on attempts to manipulate the Windows login process by modifying critical registry paths related to Winlogon. Attackers can exploit these registry locations to force the system to run unauthorized programs during user authentication, creating persistent threats that activate whenever users log in. Default state: Enabled |
NEW - New Service Creation Using Sc.EXE |
This detection identifies potentially malicious service creation using the “Sc.exe” utility. This detection triggers when a service is created with a suspicious executable path, such as those located in user directories or temporary folders, which is uncommon for legitimate services. This technique is used by threat actors to establish persistence or execute malicious code on the system. Default state: Enabled |
In case you missed the January updates, you can find and review those notes here.