What's new in Log360

Learn about the new product innovations we deliver every quarter. Read the release notes,
download helpful resources, and register for our release webinars!

  • Newest capabilities
  • Join the Webinars
  • Related Resources

Q3 updates

Detection just got smarter, sharper, and more scalable

This quarter, Log360 introduces major upgrades to its detection capabilities. From engineering-level precision to large-scale performance. Here's what's new:

Detection engineering

We've redesigned how Log360 detects threats. A new centralized detection console now brings together correlation logic, threat intelligence, MITRE ATT&CK mapping, UEBA insights, and a rule builder that supports standard, anomaly-based, and advanced detection logic. Detection insights helps optimize rules with real-world noise levels and usage metrics—enabling focused, high-fidelity alerts.

Object-level filtering for Active Directory and Microsoft 365

Fine-tune alert scope using filters based on users, groups, and OUs. These filters apply across predefined rules for use cases like privilege escalations, suspicious password resets, and admin group changes—helping reduce noise from irrelevant accounts like test users or developer machines. It's precise detection, not suppression.

Scalable log ingestion

Log360 now supports horizontal scalability with clustered log processors and role-based specialization for alerting, correlation, and search. You can also collect logs from distributed sites and process them centrally — ensuring high performance even in large, hybrid environments.

Cloud-delivered detection content

Get continuously updated detection content mapped to MITRE ATT&CK, without manual imports. Delivered securely from the cloud, this content is curated for emerging threats and multivector attacks, ensuring your detection logic stays current.

Re-engineered detection  

Q2 updates

Zia Insights: AI-Driven investigation analytics

Log360 Cloud now features Zia Insights, a contextual AI engine powered by Azure OpenAI (BYOK). Analysts can now:

  • Generate human-readable summaries from alerts, incidents, and logs with a click
  • Map activities to MITRE ATT&CK® techniques for deeper threat context
  • View attack timelines that reconstruct event sequences visually
  • Receive remediation tips, tailored based on log type and context

This release transforms threat investigation workflows— delivering clarity, acceleration, and actionable insights within your SIEM interface.

Zia Insights: AI-Driven investigation analytics  

UEBA: Behavior analytics for proactive threat detection

Log360 Cloud now includes user and entity behavior analytics (UEBA), powered by ML. This capability enables detection of anomalous behavior patterns across your environment:

  • Establishes behavioral baselines for users and devices
  • Detects deviations like unusual logons or data access attempts
  • Assigns contextual risk scores to users and entities
  • Enables real-time alerts, watch lists, and dashboards for quick prioritization

UEBA equips your SOC to proactively detect insider threats, compromised accounts, and lateral movement.

Gain total threat visibility in a unified console  

Watch the launch webinar

ON-DEMAND WEBINAR

Log360 quarterly launch showcase: Q3 2025

Related resources

AI-powered Zia Insights
DATASHEET

AI-powered Zia Insights

Read now
Maching-learning powered UEBA
DATASHEET

Maching-learning powered UEBA

Read now

Want to see Log360's latest capabilities in action?

  • Centralized Log Management & Compliance
  • Automated Threat Detection & Response (TDIR)
  • User & Entity Behavior Analytics (UEBA)
  • GenAI-Powered Investigations (Zia Insights)
  • Proactive Dark Web Monitoring
  • Security & Risk Posture Management