Monthly Release Notes - September 2020

Jump to:

CCSS


QMessage Monitor

Version 8.14

Sep 3, 2020

  • Fixed issue with event escalating after already being fulfilled.
  • Fixed issue with MMCLRMSG causing queue monitoring to end.

Back to Top

Clearswift

ARgon For Email

Version 5.0.0

Sep 08, 2020

New Features
  • Red Hat Cockpit replaces server console for administrators. Cockpit is an integrated web interface used for managing your network configuration, software updates, and system management.
Enhancements
  • This version of the ARgon Server runs on RHEL 7.8, enabling more accessible software updates, a number of technical improvements from RHEL 6, timely security fixes, and a more robust operating system.
  • You can now use the Search text box at the top of a reference list to search for a particular entry within a list. This includes Lexical Expressions, Content Rules, Hosted Domains, Email Routing, and MTA Groups.
  • Support for the SMBv1 protocol is no longer mandatory, due to security vulnerabilities. This version of Clearswift ARgon For Email still supports SMBv1, but SMBv2 will take precedence if available. The ARgon Server no longer requires a server to support SMBv1 in order to establish a connection.
  • You can now configure a lexical expression to ignore any duplicates of a unique string that matches that expression. This reduces false positives, where a string might be repeated in a file or attachment.
  • Detection of lexical expressions has been enhanced, so that the count of multiple matches is recorded per attachment or document.
  • The user interface has been resized to be more responsive to screen-size. Additionally, sensitive terminology has been updated where possible, replacing slave/master with worker/controller in log files. Blacklists and whitelists are now referred to as block lists and allow lists respectively.
Other Fixes
  • A weighted term now only counts once if it is repeated across multiple worksheets, if ‘Each expression may trigger only once for each part of the message’ is selected.
  • UI access controls have been significantly updated and tightened, restricting permissions to the correctly privileged users.
  • An admin account opening multiple tabs while logged in to the Gateway, presented the risk of cross-site-request forgery (CSRF) if a malicious page was open in a browser. This vulnerability has been resolved in this release.
  • Only the Installation Wizard page is accessible if the Gateway has not been fully configured.
  • The certificate store is now automatically restarted if it crashes.
  • The branding text appears on the login page, and was editable without authentication. This has been resolved in this release.
  • Failure to detect 'undisclosed-recipients:;' in the To: field when configured as a lexical expression. This issue has been resolved.

SECURE Email Gateway

Version 5.0.0

Sep 08, 2020

New Features
  • As well as an update to Mailshell SDK 8.2.1, this release includes a number of new services designed to significantly improve spam detection rates. Additionally, a new Rspamd anti-spam engine is now configurable alongside Mailshell as part of the Gateway spam detection and filtering system. Rspamd is not enabled by default on upgrades.
  • Red Hat Cockpit replaces server console for administrators. Cockpit is an integrated web interface used for managing your network configuration, software updates, and system management.
Enhancements
  • This version of the Gateway runs on RHEL 7.8, enabling more accessible software updates, a number of technical improvements from RHEL 6, timely security fixes, and a more robust operating system.
  • You can now use the Search text box at the top of a reference list to search for a particular entry within a list. This includes Lexical Expressions, Content Rules, Hosted Domains, Email Routing, and MTA Groups.
  • Support for the SMBv1 protocol is no longer mandatory, due to security vulnerabilities. This version of the Clearswift SECURE Email Gateway still supports SMBv1, but SMBv2 will take precedence if available. The Gateway no longer requires a server to support SMBv1 in order to establish a connection.
  • You can now configure a lexical expression to ignore any duplicates of a unique string that matches that expression. This reduces false positives, where a string might be repeated in a file or attachment.
  • Detection of lexical expressions has been enhanced, so that the count of multiple matches is recorded per attachment or document.
  • The user interface has been resized to be more responsive to screen-size. Additionally, sensitive terminology has been updated where possible, replacing slave/master with worker/controller in log files. Blacklists and whitelists are now referred to as block lists and allow lists respectively.
Other Fixes
  • A weighted term now only counts once if it is repeated across multiple worksheets, if ‘Each expression may trigger only once for each part of the message’ is selected.
  • UI access controls have been significantly updated and tightened, restricting permissions to the correctly privileged users.
  • An admin account opening multiple tabs while logged in to the Gateway, presented the risk of cross-site-request forgery (CSRF) if a malicious page was open in a browser. This vulnerability has been resolved in this release.
  • Only the Installation Wizard page is accessible if the Gateway has not been fully configured.
  • The branding text appears on the login page, and was editable without authentication. This has been resolved in this release.
  • The certificate store is now automatically restarted if it crashes.
  • TrustCenter Connection check is now working as expected.
  • The Kaspersky anti-virus engine now installs correctly.
  • Failure to detect 'undisclosed-recipients:;' in the To: field when configured as a lexical expression. This issue has been resolved.

SECURE Exchange Gateway

Version 5.0.0

Sep 08, 2020

New Features
  • Red Hat Cockpit replaces server console for administrators. Cockpit is an integrated web interface used for managing your network configuration, software updates, and system management.
Enhancements
  • This version of the Gateway runs on RHEL 7.8, enabling more accessible software updates, a number of technical improvements from RHEL 6, timely security fixes, and a more robust operating system.
  • You can now use the Search text box at the top of a reference list to search for a particular entry within a list. This includes Lexical Expressions, Content Rules, Hosted Domains, Email Routing, and MTA Groups.
  • Support for the SMBv1 protocol is no longer mandatory, due to security vulnerabilities. This version of the Clearswift SECURE Exchange Gateway still supports SMBv1, but SMBv2 will take precedence if available. The Gateway no longer requires a server to support SMBv1 in order to establish a connection.
  • You can now configure a lexical expression to ignore any duplicates of a unique string that matches that expression. This reduces false positives, where a string might be repeated in a file or attachment.
  • Detection of lexical expressions has been enhanced, so that the count of multiple matches is recorded per attachment or document.
  • The user interface has been resized to be more responsive to screen-size. Additionally, sensitive terminology has been updated where possible, replacing slave/master with worker/controller in log files. Blacklists and whitelists are now referred to as block lists and allow lists respectively.
Other Fixes
  • A weighted term now only counts once if it is repeated across multiple worksheets, if ‘Each expression may trigger only once for each part of the message’ is selected.
  • UI access controls have been significantly updated and tightened, restricting permissions to the correctly privileged users.
  • An admin account opening multiple tabs while logged in to the Gateway, presented the risk of cross-site-request forgery (CSRF) if a malicious page was open in a browser. This vulnerability has been resolved in this release.
  • Only the Installation Wizard page is accessible if the Gateway has not been fully configured.
  • The branding text appears on the login page, and was editable without authentication. This has been resolved in this release.
  • The Kaspersky anti-virus engine now installs correctly.
  • Failure to detect 'undisclosed-recipients:;' in the To: field when configured as a lexical expression. This issue has been resolved.

SECURE ICAP Gateway

Version 5.0.0

Sep 08, 2020

New Features
  • Red Hat Cockpit replaces server console for administrators. Cockpit is an integrated web interface used for managing your network configuration, software updates, and system management.
Enhancements
  • This version of the Gateway runs on RHEL 7.8, enabling more accessible software updates, a number of technical improvements from RHEL 6, timely security fixes, and a more robust operating system.
  • You can now configure a lexical expression to ignore any duplicates of a unique string that matches that expression. This reduces false positives, where a string might be repeated in a file or attachment.
  • Detection of lexical expressions has been enhanced, so that the count of multiple matches is recorded per attachment or document.
  • The user interface has been resized to be more responsive to screen-size. Additionally, sensitive terminology has been updated where possible, replacing slave/master with worker/controller in log files. Blacklists and whitelists are now referred to as block lists and allow lists respectively.
  • You can now configure the Gateway to scan files up to 16 GB.
Other Fixes
  • A weighted term now only counts once if it is repeated across multiple worksheets, if ‘Each expression may trigger only once for each part of the message’ is selected.
  • UI access controls have been significantly updated and tightened, restricting permissions to the correctly privileged users.
  • An admin account opening multiple tabs while logged in to the Gateway, presented the risk of cross-site-request forgery (CSRF) if a malicious page was open in a browser. This vulnerability has been resolved in this release.
  • Only the Installation Wizard page is accessible if the Gateway has not been fully configured.
  • The branding text appears on the login page, and was editable without authentication. This has been resolved in this release.
  • The Kaspersky anti-virus engine now installs correctly.

SECURE Web Gateway

Version 5.0.0

Sep 08, 2020

New Features
  • Red Hat Cockpit replaces server console for administrators. Cockpit is an integrated web interface used for managing your network configuration, software updates, and system management.
Enhancements
  • This version of the Gateway runs on RHEL 7.8, enabling more accessible software updates, a number of technical improvements from RHEL 6, timely security fixes, and a more robust operating system.
  • Support for the SMBv1 protocol is no longer mandatory, due to security vulnerabilities. This version of the Clearswift SECURE Web Gateway still supports SMBv1, but SMBv2 will take precedence if available. The Gateway no longer requires a server to support SMBv1 in order to establish a connection.
  • You can now configure a lexical expression to ignore any duplicates of a unique string that matches that expression. This reduces false positives, where a string might be repeated in a file or attachment.
  • Detection of lexical expressions has been enhanced, so that the count of multiple matches is recorded per attachment or document.
  • The user interface has been resized to be more responsive to screen-size. Additionally, sensitive terminology has been updated where possible, replacing slave/master with worker/controller in log files. Blacklists and whitelists are now referred to as block lists and allow lists respectively.
Other Fixes
  • A weighted term now only counts once if it is repeated across multiple worksheets, if ‘Each expression may trigger only once for each part of the message’ is selected.
  • UI access controls have been significantly updated and tightened, restricting permissions to the correctly privileged users.
  • An admin account opening multiple tabs while logged in to the Gateway, presented the risk of cross-site-request forgery (CSRF) if a malicious page was open in a browser. This vulnerability has been resolved in this release.
  • Only the Installation Wizard page is accessible if the Gateway has not been fully configured.
  • The branding text appears on the login page, and was editable without authentication. This has been resolved in this release.
  • The Kaspersky anti-virus engine now installs correctly.

Back to Top

 

Core Security


Core Impact

Version: 20.2

Sep 29, 2020

Enhancements
  • New Exploits

    • Microsoft SharePoint Server DataSet Deserialization Remote OS Command Injection Exploit: A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the process responsible for deserialization of the XML content. (CVE-2020-1147)
    • Docker Desktop Local Privilege Escalation Exploit: Docker Desktop allows local privilege escalation to NT AUTHORITY\SYSTEM because it mishandles the collection of diagnostics with Administrator privileges, leading to arbitrary DACL permissions overwrites and arbitrary file writes. This affects Docker Desktop Enterprise before 2.1.0.9, Docker Desktop for Windows Stable before 2.2.0.4, and Docker Desktop for Windows Edge before 2.2.2.0 (CVE-2020-10665)

    • Microsoft Windows DNS Server SIGRed Local Privilege Escalation Exploit: An elevation of privilege vulnerability exists in Windows when the DNS server fails to properly handle SIG responses. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-1350)

    • EVGA Precision X1 WinRing Local Privilege Escalation Exploit: The driver in EVGA Precision X1 (aka WinRing0x64.sys) allows any user to read and write to arbitrary memory. (CVE-2020-14979)

New Features
  • Enable the configuration of WebServer parameters (source agent and port) when running Network RPT AP.
Other Fixes
  • AMSI Bypass Implementation for Exploits and Agents: This update implements a new technique to avoid or reduce detection of remoteCommandExecution attack methods and commands executed on powershell consoles that are monitored by AMSI (Anti-Malware Scan Interface).

  • Microsoft Windows Netlogon CVE-2020-1472 Vulnerability Checker: An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'. This module tries to determine remotely, if the target host is either vulnerable to CVE-2020-1472 or not.

  • Exploits Maintenance CVE Numbers 23: This update add CVE numbers to 42 Exploits that were released prior to a CVE number being assigned (typically noted as NOCVE) with the correct CVE number as well as updating modules with invalid CVE numbers.

  • Assorted Improvements for Exploits: This update contains minor improvements and fixes to several exploit modules.

  • Update Metasploit Framework Integration: This update makes Metasploit Framework v6.0.7 the new recommended and tested version to integrate with Impact.

Core Network Insight

Version: 7.1.0

Sep 28, 2020

Enhancements
  • The major versions upgrade process has been made more reliable and faster to avoid service outages.

  • Hardware footprint has been reduced on sensors.

  • RADIUS authentication can now be validated

  • Easier configuration of the authentication settings. Authentication settings have been merged to improve its usability and user experience.

  • New help texts have been added to Asset identification settings and it is possible now to validate the Domain Controller asset resolution settings.

  • New help texts have been added to the UI to make the configuration process easier.

New Features
  • Hardware footprint has been reduced by 70% to ensure cheaper deployments and better resources usage.

  • We now support the XDP currently emerging standard for network data processing ensuring a faster packet processing and even faster detections. Up to 10 Gbps can be processed now with the adequate network card.

Other Fixes
  • End User License Agreement has been updated

  • SNMP polling not working properly due to a missing file. [CAS-0010220058]

  • Detection Engine stopped Suddenly and no further detection is taking place. [CAS-0010215812]

  • Detection Engine stopped Suddenly and no further detection is taking place. [CAS-0010215812]

  • The config_export script fails sometimes while using the force option. [CAS-0010213843]

  • Unable to change user password post creating the account. [CAS-0010211129]

  • After changing the time zone in user settings, the time zone does not reflect the report when generated. [CAS-0010210874]

  • Fiber card installation can't break configuration of the primary interface. [CAS-0010207331]

  • High packet loss rate with Speedracer driver enabled under certain circumstances. [CAS-0010175598]

Access Assurance Suite (AAS)

Version: 9.3

Sept 16, 2020

New Features
  • The data collection process is now configurable using a newly designed user interface that enables administrators to control and automate data collection procedures. In addition, the data collection process has also been extended to synchronize the compliance review tables with the newly collected data, such that a compliance review can be initiated any time.

  • The AAS data collection process contains a new high-performance data collector. In addition, new collectors for Office 365, CSV, SQL Exchange 2013, and Workday are integrated into AAS.

  • Improved and automated installation process reduces the time and reduces potential errors associated with manual deployments. All required AAS software components install automatically to enable the first AAS login.

  • A new tool enables administrators to access and update specific sets of database tables with the user interface instead of accessing the database directly. Modifications are tracked with an integrated logging feature.

  • All AAS users are provided with a dashboard landing page. This initial page contains quick links for easy navigation to frequently used sections and performance-indicating charts can be enabled to provide at-a-glance information about the system.

  • Reporting for AAS is enhanced by integration with HelpSystems Insite and Insite Analytics products. A free license for specific use in conjunction with AAS reporting is included.
  • AAS now contains deployment support to private cloud instances within Amazon Web Services (AWS). AAS components must share space along with the target systems in the same environment either together on-premise or in an AWS private cloud environment.

  • The AAS suite supports Microsoft Windows Server 2019 and Microsoft SQL Server 2017 and 2019, enabling administrators to maintain server environments with the latest versions of Microsoft products.
Enhancements
  • New Login page to the Access Assurance Portal.

  • The menu style has been changed to a pop-out style that remains present on the side bar.

  • Access Assurance portal now has a global config: “PortalUserDisplayNameFormat” to configure the format to display names of users.

  • View My Request page provides the Admin and requesting user the ability to cancel request if approval is not processed.

  • Approve Requests and View My Requests have an enhanced filter mechanism to provide better search results.

  • A daily scheduler job added to the suite pushes the compliance data for following review cycle from the production table to the certification table.

  • Access Assurance Portal pages re-written and enhanced for better performance include:

    • ARM Delegate Privileges

    • Manage Identity Map

    • Data Security

    • Email templates

    • Global Options

    • Macros

  • A set of workflow templates are included in the suite to assist admins getting AAS up and running

  • A set of configurable Email templates has been provided and updated for use.

  • Custom Macros have been modified and a new macro VBS.Is AD Portal Admin has been added to AAS 9.3

  • There is a new dynamic community: Portal Admins added in 9.3.

  • Eight new Global Options have been added. For details, see the AAS 9.3 Readme.

Other Fixes
  • AAS branding has been updated to reflect Core Security as a HelpSystems company.
Version: 9.2.2
Access Assurance Portal Enhancements
  • The login process is updated to work correctly when the Forget Password link is configured on the login page.
  • User Display name format - The access Assurance portal now has a global config “PortalUserDisplayNameFormat” which is used to configures the format to display names of users.
  • The Access Assurance Portal menu is enhanced to show menu in the pop-out menu style.
  • The Default Menu Items examples text file is updated with correct URLs.
Identity Mapping Solution Enhancements
  • If the staging table does not have a TargetID column, choose any column name and mapping will use that column as TargetID.
Enhancements to the Provisioning Platform
  • Administration Manager:
    • Updated to display correct Help Text icons.
    • Shows the Search field box for macro selection popup on the Google Chrome browser.
    • Password dictionary check now supports additional symbols replacement:
      @=a, !=l, 8=b, !=i, (=c, 6=d, #=f, 9=g, #=h, <=k, 9=q, 5=s, +=t, >=v, <=v, %=x, ?=y
  • Custom Macro.JS.IdentityMap.Restriction macro in XMLAOProvisioning workflow is updated to pick the user account correctly if multiple accounts exist on the same target for a profile.
  • Workflows now handle the attributes of NVARCHAR(max) and allow users to modify the value.
  • The client IP address is logged correctly when a load balancer is used.
Core Compliance Enhancements
  • The user interface was updated to be more intuitive and better performing.
  • My Certifications list page:
    • Summary bar is improved to present overall certification review cycle information.
    • “% Complete” column is renamed to “Progress” and includes a progress bar as well as the percent complete.
    • More flexible column sorting and filtering.
  • Review Cycle page:
    • A back button added to return to the list of certifications.
    • A new Progress bar is introduced for the end-user to view the status of the review cycle and to filter the current decision status with a single click.
    • More flexible column sorting and filtering.
    • Bulk comment functionality is introduced for any decisions that require a comment.
    • Actions column is replaced with the menu-based selection for per row decision selection.
    • New approach for detail view:
      • Detail view is displayed in a popup window with decision buttons available.
      • Detail view is configurable in the ‘CustomUserControlConfiguration’ column in the CertificationTypeDetailView table.
    • A Preferences button is added to select the columns to hide in the review cycle display.
    • A new macro “Restrictions.Access Certification Reassignee Profile Search” is added to restrict the profile search the reassignee.
    • The functionality supplied by the previous Expand All\Collapse All buttons is now available in a single button that toggles between Expand All and Collapse All.
  • The old interface is accessible if needed, change the global config value for “ShowOldMyCertificationPage” to true in Global Options.
Core Access Enhancements
  • Manage Access improvements:
    • Users search panel shows vertical scroll bar works correctly on Microsoft Internet Explorer 11 browser.
    • Selected access panels minimize automatically upon request submission.
    • Advanced search functionality is updated to support CustomAttrStr and other attributes from vw_Profile sql view.
    • The dropdown entitlements are parsed correctly when there is a space in the value.
    • Tag, Intelligent Modelling, and Categories list on Select Filters panel font size is increased for better user experience.
    • The request creation process is updated to not create a duplicate request of the roles\entitlements which are already assigned.
    • Categories and Tags are filtered based on the access present in the Available Access panel.
    • Manage Access page is modified to show Available Access panel and Current Access panel correctly on Microsoft Internet Explorer 11 and Google Chrome browser.
  • Approve and View Requests improvements:
    • Shows RequestID and Requester attribute for each request.
    • By default, shows the list of entitlements without the user having to click on show button.
    • A new option of “View all requests as administrator” is added on the View Request page to show all the requests. This option is only available for admin users who are part of ARM Admins community.
    • An admin and a requester can cancel a request if the approval is not processed on view request page.
    • When there is no request to approve or deny, the Approve All & Deny All buttons are disabled on approve request page.
    • Enhanced with a new filter mechanism to narrow down the search.
  • Courion Request Service:
    • The Courion Request service is updated to pick the request as per the “SleepTime.InSeconds” configuration.

Back to Top

 

Document Management (RJS)


DeliverNow

Version: 1.2.17

Sep 4, 2020

Enhancements
  • Added TLS 1.2 setting to sources, to allow users to force the TLS version to use 1.2 and not negotiate with IBM connections. This is an optional setting, on upgrade this will default to false.

Back to Top

 

GoAnywhere


Version 6.6.1
Enhancements

  • Added support for adding and deleting EDI components in the Edit EDI Definition mapper.
  • Updated Mail Box resource and Retrieve Mail task to support OAuth2 for IMAP protocol.
  • Added additional audit logging to the Quick Upload and Quick Download features.

Updates
  • Removed unused geronimo-mail and geronimo-stax jars.

Fixes
  • Fixed an issue causing private key lookup via alias to fail. This issue was introduced in 6.6.0.
  • Fixed issues with enforcing Strict Hostname Verification policy. This was introduced in 6.6.0.
  • Fixed a threading issue related to setting up proxied agent requests.
  • Fixed an issue where passwords in project tasks failed to decrypt in certain scenarios.
  • Fixed an issue where new SAML Login Methods would fail to be created in certain scenarios.
  • Fixed an issue that could cause monitors to fire when changing the Client Type of the Network Share resource in certain situations.
  • Fixed columns on the Project Execution History and Scheduled Job History pages to remain persistent according to user preference.
  • Fixed an issue where file based JKS trust stores were not being loaded on admin service listeners if a provider was not specified.
  • Fixed an issue where hostnames were being resolved to IP addresses resulting in failed hostname validation for FTPS connections.
  • Fixed an issue where hostnames were being resolved to IP addresses resulting in failed hostname validation for database connections.
  • Fixed issues where an error would occur when exporting multiple projects or submitting multiple projects to batch.

Back to Top

 

Halcyon


Advanced Reporting Suite

Version 11.1

Sep 17, 2020

New Features
  • A new setting has been added to allow the logging of additional debug messages in the Data Collector log file in order to aid troubleshooting.
  • A new setting, 'Verify Databases On Startup' has been added against the Data Collector and Data Service settings. If set to true, then each plugin will verify its SQL database when the Data Collector or Data Processor service starts.
Enhancements
  • The Connection and Read Timeout values against a Collection will be displayed in seconds rather than milliseconds.
  • The SMTP Components used to send email messages have been updated and now support SSL/TLS.
  • The time zone is now displayed against each collection in the collection list.
Other Fixes
  • You can now scroll through groups which previously didn't fit on the page when exporting reports.
  • Data handling has been improved when the time changes on a system whilst the Data Collector service is running.
  • The Data Collector service will continue to collect data for all plugins after SQL interruptions such as SQL database backups.

Code Uploader

Version 11.1

Sep 17, 2020

Enhancements
  • The dependency on MSXML 4.0 has been removed.

Document Management System GUI

Version 6.1.2020.197

Sep 17, 2020

Other Fixes
  • A fix has been applied to the Graphical User Interface so that registered users can now log on after an upgrade.
  • In the Graphical User Interface, the "View Archived Files" and "View Indexed Files" entries are no longer duplicated when defining roles.
  • The page controller on the user list in the Graphical User Interface has been fixed to allow the use of multiple pages.
  • To comply with GDPR, all references to Gender have been removed from the product.

Network Server Suite

Version 11.1

Sep 17, 2020

Enhancements
  • Enterprise Console: Closed/Purged alerts are now in separate tables to improve performance when viewing and processing active alerts.
  • Log files now preserve the file extension when rolled over once the maximum file size has been reached.
  • The dependency on MSXML 4.0 has been removed.
  • The functionality to log an alert using either the local Enterprise Server's date and time or using the remote device's date and time has been restored.
Other Fixes
  • Enterprise Console: Alert text will no longer wrap to the next line.
  • Enterprise Console: Any user can now create private layouts.
  • Enterprise Console: Emailing a Unix alert which contained carriage returns and line feeds resulted in a malformed email. This has been fixed.
  • Enterprise Console: Fixed an intermittent access violation issue when switching from CLOSED to OPEN alerts in the EC Client.
  • Enterprise Console: Forwarded alerts will now include the Trace information.
  • Enterprise Console: Notes added against a Device Group in Device Manager can be viewed in the details window in the Enterprise Console Client when a user clicks on the group.
  • Enterprise Console: On some operating systems, the 'Activate On New Alert' feature didn't work. This has been corrected.
  • Enterprise Console: The 'Search For' setting option on a rule's criteria now saves correctly.
  • Enterprise Console: The device group reference of a forwarded alert will now be retained. This value is used to add the originating device to a matching device group reference. This is only relevant to forwarded alerts received for which a source device hasn't been defined in Device Manager.
  • Enterprise Console: The number of alerts received wasn't being logged for reporting purposes. This has been fixed.
  • Linux Agent: The agent has been updated to ignore connections from port scanner applications.
  • Linux Agent: The issue "Error Retrieving SystemUpTime Integer Value From ServerData" when adding CPU, Filesystem and Memory criteria has been fixed.

  • Missing icons have been restored on the Device Manager toolbar.
  • There was an issue generating the Machine Reference value used by the license key. This has been corrected.
  • To comply with GDPR, all references to Gender in NSS have been removed.

Back to Top

 

IBM Partnership


Backup, Recovery, and Media Services (BRMS)

Version: PTF 7.4 SI73678, 7.3 SI73677, 7.2 SI73676

Sept. 11, 2020

Enhancements

In version 7.2 and later:

  • BRMS provides SQL services to view, order, and subset BRMS media.
  • The BRMS move policy has been enhanced to support the movement of full volumes to a new location.
  • WRKOBJBRM has been enhanced with a START() parameter to specify which saved objects entries to display first.

Other Fixes

In version 7.3 and later:

  • Fixed issue where DSPASPBRM reports the wrong IASP utilization information while an IASP is being varied off.

In Version 7.2 and later:

  • Fixed issue of BRMS expected logical files missing from QUSRBRM after an upgrade to a new release.
  • A cloud full system recovery incorrectly sets user *PUBLIC with *EXCLUDE authority for the directories in the BRMS shipped QCLDIPL *LNK list was fixed.
  • Cloud and automatic virtual backups to optical that append, may fail with messages MSGOPT2500 and MSGOPT1321 when the backup spans multiple volumes has been fixed.
  • Fixed issue where RSTLIBBRM may restore the wrong library if more than 9,999,999 records exist in the history file.
  • The issue of sync job that will not process any more entries until the Q1ABRMNET subsystem is restarted was fixed.
  • Fixed issue when restoring from a parallel backup, BRMS incorrectly attempts to restore the *CUM before the *FULL backup.
  • BRMS created outfiles with the prefix q1asav in directory '/tmp/brms' are not removed issue has been fixed.
  • STRMNTBRM with parameter PRTRCYRPT(*ALL) or PRTRCYRPT(*SAVEXCP) was enhanced to log message MSGBRM1571 in the BRMS log with severity 0 if zero objects were not saved.

Back to Top

 

Intermapper


Version: 6.5.1

Sept 17, 2020

Enhancements
  • Updated OpenSSL to version 1.0.2u on MacOS, Linux, and Microsoft Windows systems.

  • Updated CloneIM.sh for Linux/Mac and Cygwin (Windows) for robustness and error handling.

  • Updated CloneIM.VBS for Windows for robustness and error handling.

  • Addressed the CVE-2016-2107 vulnerability.

  • Links with status Admin down can be acknowledged, not only as a Basic acknowledgement.

  • Added the ability of non-root users to use Java.

Other Fixes
  • Fixed Kali UI client crashes on AIOOBE in Layer-2 Switches.

  • Fixed the map list to represent correct statuses.

  • Fixed down interfaces to be displayed in a down status, rather than in red and with an OK status.

  • Fixed excess Event Log messaging from built-in NetScreen VPN probes.

  • Fixed the issue where databases have frequent ERROR logs after upgrading to version 6.5b1.

  • Fixed the issue where Intermapper crashes with ASSERT if it cannot load file from Icons.

  • Fixed missing IANA-CHARSET-MIB in IM Settings.

  • Fixed the Trial license expired window so it is no longer cropped on SUSE Linux Enterprise systems.

  • Fixed the Intermapper update mechanism so it no longer sends users to an obsolete link.

  • Fixed incorrect dates and times when changing a chart scale.

  • Fixed dropping Ignore settings for interface windows.

  • Fixed the Alarm Point delay, repeat, and count controls.

  • Fixed the group email notifier service so it no longer crashes.

  • Fixed CISCO-VIRTUAL-SWITCH-MIB error at startup.

  • Fixed SSL errors and datapoints report synchronization issues that were causing executions to hang.

  • Fixed the tcpInfo device list sort flags so they no longer create ASSERT errors.

  • Fixed a memory problem which could result in service crashes showing an Unknown Signal -6 error.

  • Fixed insertion errors in multiple database tables that caused IMDC to crash and exit.

Back to Top

 

TeamQuest


Automated Analytics

Version 11.3.24

Sept 15, 2020

Enhancements
  • Added support for the Last 30 Day time interval for VMware (vSphere).

  • Added a 2-Hour point and 1-Day point size to the VMware vSphere module.

  • Updated the VCM vSphere module to connect to a VMware vCenter with a certificate using the RSASSA-PSS algorithm.
  • Updated the VCM Metrics API module with new optional functions (getRealUsedMinusBuffersCache and getRealUtilizationMinusBuffersCache) to subtract Memory Cache and Memory Buffers from Real Used and Real Utilization calculations by using the functions in the metric query.

TeamQuest CMIS for Storage

TeamQuest CMIS for Storage Version 9.25.0

Sept 15, 2020

This is a maintenance release.

TeamQuest CMIS for Storage Collector Version 4.5.12

Sept 15, 2020

This is a maintenance release.

TeamQuest View

Version 11.4.3

Sept 15, 2020

This is a maintenance release.

VCM

Version 2.8.0

Sept 15, 2020

Enhancements
  • Updated the end user license agreement.

  • Added the Utility view.
  • Added scripts to configure secondary instances of Automated Analytics for alerting

  • Added AWS tags to Amazon AWS CloudWatch properties.

  • Added script to check the Collector stack component status.

  • Updated the Kubernetes module so it can connect to the Kubernetes secure port.
  • Added VMware Guest Efficiency KPI with pricing and cost information to automatically determine if a lower cost instance can be used to save the organization money.

  • Added pricing and cost information to the Amazon AWS EC2 Efficiency KPI to automatically determine if a lower cost instance can be used to save the organization money.

  • Added pricing and cost information to the Google Cloud Efficiency KPI to automatically determine if a lower cost virtual machine can be used to save the organization money.

  • Added non-VMware virtualized and Other Efficiency KPI with pricing and cost information to automatically determine if a lower cost instance can be used to save the organization money.
  • Added pricing and cost information to the Microsoft Azure Efficiency KPI to automatically determine if a lower cost virtual machine can be used to save the organization money.

  • Updated the VCM Metrics API module with new optional functions (getRealUsedMinusBuffersCache and getRealUtilizationMinusBuffersCache) to subtract Memory Cache and Memory Buffers from Real Used and Real Utilization calculations by using the functions in the metric query.

  • Added a vertical slider to menus to allow you to scroll through the menu options.

  • Updated the Data Availability view so the ArrayIndexOutOfBoundsException error does not occur when you add System Metrics level metrics.

Other Fixes
  • Improved the response time for large number of disks.

Back to Top