Monthly Release Notes - October 2018

Jump to:

Automate

Automate and Automate Enterprise

Version: 11.1.10

This release includes all patches from the 11.1.2 - 11.1.9 releases.

  • [24591] Corrected long term Management Server resource issue.
  • [24542] "Resume from point of failure" now works for sub-workflows.
  • [24552] Install corrected so that the server components can be installed separate from the development tools.
  • [24311] Tasks no longer terminates when closing a terminal connection.
  • [24553] In Task Administrator, triggered and manually run tasks that encountered a runtime error in a function now terminate properly.
  • [24215] In Task Administrator, Task Timeout runs as expected when set in Managed Task properties on Automate and in Workflow Item properties on Automate Enterprise.
  • [24578] Single character evaluation works as expected with 'Evaluation' object in workflows.
  • [24583] Impersonation works as expected in the Exchange action.
  • [24584] Impersonation for Exchange Mail Server works as expected.
  • [24634] Label - Goto works as expected in a nested IF statement.

Automate Schedule

Version: 4.3.1
New Features
  • Added a progress bar to the job instance records on the Job History page. The progress bar will show a percentage completed for jobs based on estimated run times.
  • Added Estimated Completion Time to the job instance records on the Job History page.
  • Added the option to include the Universal Connector log in the Automate Schedule Job Log.
Enhancements
  • Added support for SQL Server 2017 to the SQL Server Job commands.

  • Added support for Suse Linux Enterprise 15.
  • Added support for CentOS 6 and CentOS 7.
  • Added the content type 'text/xml;charset=utf-8' to the Universal Connector Extract Value action.
Other Fixes
  • Replication status queries now have correct column names and work correctly after a database migration.
  • FTPS file transfer runs as expected when the server is set up with option 'Require TLS session resumption on data connection when using PROT P'.
  • SFTP commands have been fixed and work as expected.
  • Added ability for SAP process chain names to begin with a number.
  • Fixed error message when posting a job without target/target_name.

 

Back to Top

 

Document Management (RJS)


DeliverNow

Version: 1.2.14
Fix
  • Fixed an issue when checking in reports to Lotus Notes where timestamps have the AM/PM reversed.

Webdocs Office Add-Ins

Version: 3.0.0
NOTE:

This version requires Webdocs Windows version 2.1.2.

Enhancement
  • Completely re-engineered using the latest technologies while preserving all current functionality.

  • Updated, modern UI.

Webdocs Windows

Version: 2.1.2
Enhancements
  • The URL search page now displays column heading labels per document type if a document type filter is requested.
  • The web application debug log is now visible and downloadable to Webdocs administrators within the "Settings" area of the web UI.
Other Fixes
  • Sorting documents in a user inbox now sorts across all pages of inbox results instead of just the currently visible documents.
  • Clicking on a high priority document in a user inbox no longer goes to a 404 error page.
  • A user's active status can now be set via the "Update User" REST endpoint.

Back to Top

 

GoAnywhere


GoAnywhere MFT
Version: 5.7.7
  • Updated the SFTP client to properly handle signature verification failures that occasionally occur against some servers. This was added in version 5.6.5 and was enabled by including a system property. In this version, this fix is included as the default behavior.
  • Updated the JNQ API used by SMB Network Shares from version 1.0.1 S7 R2750.7 to jNQ-1.0.2.br-1.1
  • Fixed an issue with SCP where certain special characters in a file name could cause a file transfers to fail.
  • Fixed an issue where an API call to the Secure Mail Request Files feature would not send the file request if a message was not supplied.
  • Fixed an issue in the Project Designer where copy and paste operations were no longer working. This issue was introduced in version 5.7.6.

Back to Top

 

Insite


Version: 2.6
New Features
  • An 'All Users' security group has been added that includes all of your Insite users. This group will be helpful when setting permissions and sharing objects throughout Insite and Insite modules.

  • 'Compare with Previous Period' functionality has been added to Chart and Key Indicator Dashboard Widgets. This enables users to see data from a past time period alongside the current time period to better understand the current data.

  • You can now insert links to existing dashboards or external URLs into Title Widgets in Advanced Settings so that clicking on the Title Widget link will take the user to a specific dashboard or location.

  • Includes Powertech Multi-Factor Authentication 1.3.2
Enhancements
  • Widget sizing increments have changed from 5% to 1% to allow for greater user control of widget sizes.

  • Robot Monitor has been added to Deployment Manager.

  • The Diagnostics and Logging page has been enhanced to provide greater usability.

  • Display masks have been added to date/time and duration fields within dashboard widgets.

Other Fixes
  • There was an error that occurred when setting a shared dashboard as a homepage in Preferences, but this has now been fixed.
  • There was an issue with editing Edit Rights on dashboards while using the IE11 browser, but this has now been fixed.
  • The error message shown after attempting to view a widget after removing its connection has been corrected.
  • On the Add Product Connections panel, the Password label has been changed from User Password to Password.

Version: 2.5
New Features
  • A Startup Wizard has been implemented that displays after a successful initial installation to guide you through HelpSystems Insite’s basic configuration steps.
  • Within a Query in Insite Analytics, a user can now specify up to 10 columns to be displayed in a table when the user chooses to drill down into that grouping.
  • Includes Insite Analytics 1.2
  • Webdocs for IBM i has been removed from Insite.
  • Connection security has been improved, which includes:
    • New library 'INSITELIB' will be added to all iSeries that Insite is connected to. Upon initial iSeries connection creation through the Startup Wizard or the Add Product Connections panel, you will be required to provide a *SECOFR login, but this login will not be saved. It will only serve to allow Insite to install the INSITELIB library. Two new users will be added as well:
      • INSITEUSR and INSITEADM - These users function similarly to how RBTADMIN, PTADMIN and RBTUSER, PTUSER behave upon installation of Robot and Powertech products. They are designed to own all connected product objects so that you are not required to create a profile in Insite with *SECOFR permissions to interact with your iSeries.
      • INSITELIB inherits permissions from RBTUSER and PTUSER.
    • NOTE: For Powertech Network Security users, in order to have *USER on the profile connection and use Powertech products, the profile with the connection MUST be added to the PTADMIN authorization list.
      NOTE: IBM i systems that will be connecting to your Insite Server must be at V7R2 or higher.
Enhancements
  • Query Builder no longer supports the joining of tables containing multi-field Primary Keys.
  • Enhanced Product Connection forms have been implemented.
  • Provided better alignment for displaying decimal data in Preview Pane.
  • The time periods 'This Year' and 'Past Year' have been added as available Time Range selections for Dashboards, Dashboard widgets, and PTEM Event Analysis.
  • Users can now override the default unit label of a key indicator widget by toggling on the 'custom' selection and entering their own label.
  • Within Insite Analytics, users can now choose which credentials to use to run a query.

Other Fixes
  • Fixes for Password Self Help for Insite.
  • Fixes for Event Manager for Insite.
  • Fixes for Vityl IT & Business Monitoring for Insite.
  • Fixes for Automate Schedule for Insite.
  • Fixes for Network Security for Insite.
  • There was a lag after attempting to check a connection on the Product Connection page, but this has now been fixed.
  • A more user-friendly error page now displays when a user attempts to view the 'Insite Server Diagnostics' page without the necessary permissions.
  • Fixed an issue on the Product Connections page where footer information was not displayed correctly when there was more than 100 connections.
  • Fixed an issue with time range not displaying on widget header when fixed time range options have been set to This/Past year.
  • Performance improvements have been implemented when loading assets.
  • There was an issue with the 'guest' user showing up in the role and security group forms, but this has now been fixed.
  • There was an issue when backing up and restoring the database in a Linux environment after creating a data connection and query in Insite Analytics, but this has now been fixed.
  • Fixed an issue where Automate Schedule queries and data connections were being displayed in the Insite Analytics homepage when Automate Schedule had not been selected for install.

  • Toggling 'Allow Guest Login' to On within Authentication and then providing mismatched entries in the password fields now correctly displays an error message to the user.

Back to Top

 

Intermapper


Version: 6.2.3
Enhancement
  • A new probe, the Cisco Firepower Threat Defence ASA probe, has been added. It monitors Firepower clusters, with each device appearing on the map.
Other Fix
  • An issue with editing device notifiers for multiple devices in Linux installs has been fixed.
  • The UPS Autodetect probe now loads correctly. Note: This is true for fresh installations only.
  • A note about Layer 2 scan reliability has been added to Mapping with Layer 2 Knowledgebase article .
  • Unchecking the Use Server Defaults for all three types of Interface Thresholds no longer causes the map to appear to be corrupted.
  • An issue that required closing and re-opening a map to continue editing has been fixed.
  • Notifications for a device's UP and OK status are now sent only if a prior DOWN or non-OK notification was sent.
  • Intermapper server no longer requires availability of TLS 1.0 for client connections. Both TLS 1.0 and TLS 1.1 can now be disabled in the ssl.conf file.
  • Thresholds are now displayed correctly in Japanese-localized installations.

Back to Top

 

Powertech


BoKS Web Service Interface

Version: 7.1.0.1
  • Jetty library has been updated to version 9.4.12. The Jetty version used in Web Service Interface 7.1 is vulnerable to two reported vulnerabilities (CVE-2017-7658 and CVE-2017-7656).

  • Security response headers: #14480 - MDS web api vulnerability (CAS-189043-S9V0N3).

  • The following response headers have been added to the Web Service API responses for improved security:

    • Content-Security-Policy, X-Frame-Options, X-Content-Type-Options, X-XSS-Protection, Strict-Transport-Security, Pragma, Cache-Control.

    • Forced rejecting of client initiated TLS renegotiation.

  • Embedded Java Runtime Environment is updated to version 8u181

  • Updated default enabled TLS protocols and cipher suites.
  • Default enabled protocol is:

    > TLSv1.2

    New default enabled ciphers are:

    > TLS_DHE_RSA_WITH_AES_256_GCM_SHA384

    > TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

    > TLS_DHE_RSA_WITH_AES_256_CBC_SHA256

    > TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384

  • The certificate keystore jks file is created in PKCS format instead of Sun proprietary format which previously caused warnings at installation.
  • #10313 The Access Rule valid time was previously incorrectly converted with the the validFrom and validTo date fields being specified without timezone. When the rule is added to BoKS the time is now not dependent on the local timezone.

  • License.txt in installation package is updated.
  • NOTE: WSI 7.1.0.1 does not support Solaris x86 32 bit, which was supported for the 7.1.0 release. The reason for this is that Oracle Java does not include support for that platform.
Version: 7.0.0.1
  • Jetty library has been updated to version 9.4.12. The Jetty version used in Web Service Interface 7.0 is vulnerable to two reported vulnerabilities (CVE-2017-7658 and CVE-2017-7656).

  • Security response headers: #14480 - MDS web api vulnerability (CAS-189043-S9V0N3).

  • The following response headers have been added to the Web Service API responses for improved security:

    • Content-Security-Policy, X-Frame-Options, X-Content-Type-Options, X-XSS-Protection, Strict-Transport-Security, Pragma, Cache-Control.

    • Enabled rejecting of client initiated TLS renegotiation.

  • Embedded Java Runtime Environment is updated to version 8u181.

  • Updated default enabled TLS protocols and cipher suites.

  • Default enabled protocol is:

    > TLSv1.2

    New default enabled ciphers are:

    > TLS_DHE_RSA_WITH_AES_256_GCM_SHA384

    > TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

    > TLS_DHE_RSA_WITH_AES_256_CBC_SHA256

    > TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384

  • License.txt in installation package updated.

  • NOTE: WSI 7.0.0.1 does not support Solaris x86 32 bit, which was supported for the 7.0.0 release. The reason for this is that Oracle Java does not include support for that platform.
Version: 6.7.0.1
  • Jetty library has been updated to version 9.4.12. The Jetty version used in Web Service Interface 6.7 is vulnerable to two reported vulnerabilities (CVE-2017-7658 and CVE-2017-7656).

  • Security response headers: #14480 - MDS web api vulnerability (CAS-189043-S9V0N3).

  • The following response headers have been added to the Web Service API responses for improved security:

    • Content-Security-Policy, X-Frame-Options, X-Content-Type-Options, X-XSS-Protection, Strict-Transport-Security, Pragma, Cache-Control.

    • Enabled rejecting of client initiated TLS renegotiation.

  • Embedded Java Runtime Environment is updated to version 8u181.

  • Updated default enabled TLS protocols and cipher suites.

  • Default enabled protocol is:

    > TLSv1.2

    New default enabled ciphers are:

    > TLS_DHE_RSA_WITH_AES_256_GCM_SHA384

    > TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

    > TLS_DHE_RSA_WITH_AES_256_CBC_SHA256

    > TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384

  • The certificate keystore jks file is created in PKCS format instead of Sun proprietary format which previously caused warnings at installation.

  • License.txt in installation package is updated.

  • NOTE: WSI 6.7.0.1 does not support Solaris x86 32 bit, which was supported for the 6.7.0 release. The reason for this is that Oracle Java does not include support for that platform.

Crypto Complete

Version: 3.59
Enhancements
  • Object lock checks have been added to the update procedure in order to determine if automatic IFS encryption has been configured, and to determine if there is a lock on a Crypto Complete menu.
  • A check is now performed for PTF MF64712 (IBM i 7.2) or PTF MF64713 (IBM i 7.3) during the update procedure. These PTFs resolve an issue that can cause some fields on a file to become hex 00s when multiple fields are encrypted.
Other Fixes
  • An issue regarding object allocation during failed updates has been resolved.
  • A check is now performed while updating to confirm the existence of the VERSION data area if the CRVERSION data area is not found.

FoxT Control Center

Version: 7.1.0.3
  • Updated libraries due to reported vulnerabilities:

    • Jetty library has been updated to version 9.4.12 (CVE-2017-7658, CVE-2017-7656).

    • Spring Framework libraries have been updated to version 4.3.9 (CVE-2018-1272, CVE-2018-11039, CVE-2018-11040)

    • Guava library has been updated to version 26.0 (CVE-2018-10237)
    • Commons-fileupload has been updated to version 1.3.3 (CVE-2016-1000031).

  • Security headers:

  • The following response headers have been added to the http responses for improved http security:

    • Content-Security-Policy, X-Frame-Options, X-Content-Type-Options, X-XSS-Protection, Strict-Transport-Security.

    • Enabled rejecting of client initiated TLS renegotiation.

  • Embedded Java Runtime Environment is updated to version 8u181.

  • The certificate keystore jks file is created in PKCS format instead of Sun proprietary format which previously caused warnings at installation.

  • Updated default enabled TLS protocols and cipher suites.

  • Default enabled protocol is:

    • TLSv1.2

    New default enabled ciphers are:

    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
  • License.txt in installation package is updated.

  • NOTE: FCC 7.1.0.3 does not support Solaris x86 32 bit, which was supported for the 7.1.0.2 release. The reason for this is that Oracle Java does not include support for that platform.
Version: 7.0.1.1
  • Updated libraries due to reported vulnerabilities:

    • Jetty library has been updated to version 9.4.12 (CVE-2017-7658, CVE-2017-7656).

    • Spring Framework libraries have been updated to version 4.3.9 (CVE-2015-3192, CVE-2015-5211)

    • Wicket Framework libraries have been updated to version 6.29.0 (CVE-2015-5347)

  • Security headers:

  • The following response headers have been added to the http responses for improved http security:

    • Content-Security-Policy, X-Frame-Options, X-Content-Type-Options, X-XSS-Protection, Strict-Transport-Security.

    • Enabled rejecting of client initiated TLS renegotiation.

  • Embedded Java Runtime Environment is updated to version 8u181.

  • The certificate keystore jks file is created in PKCS format instead of Sun proprietary format which previously caused warnings at installation.

  • Updated default enabled TLS protocols and cipher suites.

  • Default enabled protocol is:

    • TLSv1.2

    New default enabled ciphers are:

    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
  • License.txt in installation package is updated.

  • NOTE: FCC 7.0.0.1 does not support Solaris x86 32 bit, which was supported for the 7.0.0 release. The reason for this is that Oracle Java does not include support for that platform.
Version: 6.7.0.2
  • Updated libraries due to reported vulnerabilities:

    • Jetty library has been updated to version 9.4.12 (CVE-2017-7658, CVE-2017-7656, CVE-2017-9735).

    • Spring Framework libraries have been updated to version 3.2.18 (CVE-2014-3578, CVE-2013-7315, CVE-2015-3192, CVE-2014-0225, CVE-2013-6429, CVE-2014-0054, CVE-2015-5211)

    • Wicket Framework libraries have been updated to version 6.29.0 (CVE-2013-2055, CVE-2014-7808, CVE-2015-5347)

  • Security headers:

  • The following response headers have been added to the http responses for improved http security:

    • Content-Security-Policy, X-Frame-Options, X-Content-Type-Options, X-XSS-Protection, Strict-Transport-Security.

    • Enabled rejecting of client initiated TLS renegotiation.

  • Embedded Java Runtime Environment is updated to version 8u181.

  • The certificate keystore jks file is created in PKCS format instead of Sun proprietary format which previously caused warnings at installation.

  • Updated default enabled TLS protocols and cipher suites.

  • Default enabled protocol is:

    • TLSv1.2

    New default enabled ciphers are:

    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
  • License.txt in installation package is updated.

  • NOTE: FCC 6.7.0.2 does not support Solaris x86 32 bit, which was supported for the 6.7.0.1 release. The reason for this is that Oracle Java does not include support for that platform.

Multi-Factor Authentication

Version: 1.3.2
New Features
  • A new error handling and messaging mechanism has been added to the Desktop Agent that enables important messages about upgrades to be displayed.
  • Administrators can now make changes to the initial program that is now stored in the configuration file for each user profile being authenticated by Access Authenticator. This can be done without deactivating and reactivating the user. A new option (option 5) on the Main Menu, and the CHGAAINITP command, have been added for this purpose.
Other Fixes
  • Desktop Agent: You are now logged out of the Desktop Agent after changing HelpSystems Insite addresses.
  • The Windows version of the backup/restore database script that is packaged with the Authentication Manager has been repaired.
  • The HelpSystems Insite server address on the IBM i agent is now updated with each Activation from Insite.
  • The 'Select All' check box on the Users screen is now cleared after deleting all users.
  • Service scripts are now always upgraded during installation on Linux.
  • Extra license expiry emails are no longer sent when the license expiry email feature is active.
  • The character limit of the LDAP Context field in Access Authenticator's LDAP screen has been increased to 300 characters.
  • Green screen authentication is no longer disabled when the Kafka server is down or unreachable.
  • The Insite Server address (listed in the Insite Server Configuration panel) is now cleared if the IBM i agent is removed from HelpSystems Insite.
  • The Insite server address on the Access Authenticator IBM i agent is now updated with each Activation from HelpSystems Insite.

Network Security

Version: 7.20
New Feature
  • Network Security now supports Rules (User, Location, Memorized, and Object Lists) for objects residing in an iASP.
Other Fix
  • An issue subsetting the 'Transaction' field by value using F16=Sort/Subset in the Work with Memorized Transactions screen has been corrected.

Security Auditor

NOTE: Prior to version 4.2.1, Security Auditor was called Policy Minder.
Version: 4.2.1
New Feature
  • New Product Name. Powertech Policy Minder has been renamed "Powertech Security Auditor."
Other Fixes
  • Spring Framework dependency has been removed, addressing a security vulnerability (CVE-2018-1272).
  • Failure from collection of ACL information for protected system files on Windows 2008R2 and earlier has been addressed.
  • Default SMTP server support has been removed. Sending email from Security Auditor now requires a user-defined SMTP server on the Preferences page.
  • When adding a new server, Security Auditor no longer incorrectly shows "null" as part of a message.
  • When the Polling is successful, but Security Auditor fails to add a discovered Server, the AWS Accounts page no longer shows a "tick" for "Polling Status" indicating success.

Back to Top

 

Robot


Robot Monitor

Version: 14.1.6
New Features
  • Users can now monitor the health of their Robot HA environment by using the new Import Preset Elements feature on the Data Definitions screen to select and import Robot HA elements to monitor within a dashboard or view.
  • A Current Thresholds widget that displays the list of Current Thresholds being exceeded is now available to add to a dashboard.
  • The ability to add a widget to a dashboard that displays a list of the Highest CPU Jobs has now been provided.
  • System has been added as a sort by value on the Data Definition view.
  • An SQL tab has been added to the Work with Jobs screen to allow you to monitor SQL statements that are causing performance issues.
Enhancements
  • The previously saved location will now be the defaulted location when using the Backup to File function.
  • A Refresh option has been added to the drop down fields in the User Data Collection Job screen and a Reset Object Cache button has been added to the Miscellaneous section of the Options screen.
  • The display joblog feature now shows the Date and Time stamp per line.
  • A Show Summary of Elements (selected by default) option has been added to the widget. Deselecting the option shows all selected elements.
  • A new "Resize Icon" option has been added. Once selected, the icon and its text can be resized in a similar manner as any other widget.
  • The Host's TLS version is now displayed in the verification data.
  • Disk and disk adapter usage metrics are now being updated correctly under the conditions of volume group activation and filesystem resize.
  • Upon drilldown from the High CPU Jobs view, you can now view the library list and call stack of a job via the new Library List and Call Stack tabs on the Work with Job screen.
Other Fixes
  • A general failure issue causing high CPU usage has been fixed.
  • Additional models (22A, 41A and 42A) have been added to the MONCPW file.
  • There was an issue with first-time installations onto IBMi partitions, but this has now been fixed.
  • On the Robot Monitor connection screen, the text 'Use Secure Sockets Layer' has been changed to 'Use Secure Connection'.
  • Various variables connected to the Robot Monitor GUI have been changed from type float to double to accommodate for the maximum value of 999999999999.999 (15,3).
  • The Accounting Summary Color Set option is now working the same way as on other views.
  • The user cannot configure a Robot Alert setting on a threshold if the threshold is a Local Threshold. Local Thresholds are only relevant on the PC using the monitor and should not have been used to raise alerts.
  • IBM has released two PTFs (V7R2 SI66890 and V7R3 SI66901) dealing with files larger than 2.2TB. These are recommended for customers to install if they have files greater than 2.2TB.
  • The long description for the Default Threshold for W/I over A/W has changed to "W/I over A/W is high". To correct the description on this threshold, access the "Global Threshold" for the "W/I Over A/W" definition and select the "Replace all values with defaults option".
  • Tool Tips now appear as expected on History Summary views.
  • The History Summary view options now persist after being selected.
  • Disk Summary view options now persist after being selected.

Back to Top

 

 

Copyright © HelpSystems, LLC.
All trademarks and registered trademarks are the property of their respective owners.
Last Published: 201812060924