• Support
  • Forums
  • Blogs

Best Recent Content

  • What We're Working On - USM Appliance

    Updated Date: January 15, 2019

    Product teams should be like restaurants with open kitchens. Rather than bring your next meal or software update from behind a mysterious curtain, we’d like to give you a sneak peek into what we’re up. So here are a few things you can expect in upcoming releases.

      • A configuration option to stream logs from the USM Appliance Logger to an ELK stack
      • An OS Upgrade
      • Efforts to fix defects and add new features to Reporting
      • Synchronization of Alarm Status and Label changes with USM Central
      • Support for JSON plugins
      • Support for asset identification in DHCP environments
      • Continued investment in test automation to improve product and upgrade stability
      • Numerous other defect fixes and more!


      AlienVault considers various features and functionality prior to any final generally available release. As such, comments given in this forum are not (nor should they be interpreted to be) a commitment from AlienVault that it will deliver any specific feature or, if it delivers such feature, any time frame when that feature will be delivered. AlienVault is always trying to improve and enhance its products. All discussions herein are based upon AlienVault’s current interests, and product team plans and priorities can change at any time.
    • Updated USM Appliance Release Schedule

      January 15th, 2019 Update: v5.7.1 is now available for all AlienVault USM Appliance customers and OSSIM users. This release is the latest functional update from v5.6.6, v5.6.5, and previous versions of USM Appliance. You can view the release notes here.

      December 7th, 2018 Update: v5.7 is now scheduled to be released during the week of January 14th. 

      Original Post

      We have recently updated the upcoming release schedule to resolve several outstanding issues with USM Appliance. Over the next few weeks, we will release updates that will patch vulnerabilities and fix major defects for all customers. Please note: the upgrade path for you will depend on which version of USM Appliance you are currently on. Please read the plan of action below carefully to ensure you are aware of which releases will apply to you.

      If you are on v5.5.x or earlier versions of USM Appliance - We will release v5.6.5 during the week of November 5th. This release will patch vulnerabilities and update vulnerability scanning to resolve defects, and will not include the functional updates that were previously part of v5.6. Please note that the subsequent release, v5.6.6 described below is a forked release and does not apply to you. In December, we will release v5.7 to all customers.

      If you are on v5.6 of USM Appliance - We will release v5.6.6 during the week of November 12th. This release will patch vulnerabilities, update vulnerability scanning to resolve defects, and fix a bug that prevents email actions from working correctly. Please note that the preceding v5.6.5 release, planned for the week of November 5th, is a forked release and does not apply to you. In December, we will release v5.7 to all customers.

      To find out which version of USM Appliance you are currently using, navigate to the Configuration menu → Deployments → System Detail (the “magnifying glass” icon) → Software Updates.

      Why multiple releases? Due to the unexpected and extended timelines for releasing v5.6, we missed our regular vulnerability patch timelines and a key date to update vulnerability scanning functionality. We understand that separate releases may create some confusion, however, we determined this to be the best path forward to ensure that all customers are able to patch the outstanding vulnerabilities and address the major defects while we work towards a v5.7 release.

      We apologize for the disruption caused by these defects and release delays. We’re committed to continuing to invest significant R&D resources into the USM Appliance. Please feel free to reach out to us with any questions or concerns at [email protected]