Skip to content

Release notes for the update July, 14 2024

Update Version 4.1.202407121357

New Features

Added signatures to the application installation and update scripts on Windows platforms.

While Windows Server OS does not trust the installer right away (although it might start doing this following enough executions from different locations), it prints the vendor information during the launch of the script and offers to establish permanent trust with the vendor's certificate. This is a good progress as compare to the unsigned script considering that the script itself comes from the WEB site mentioned in the certificate.

Add or Edit Service Request

Default setting on the Windows Server platforms allows signed script executions and prompts to establish the trust with the vendor. There is nothing special needs to be done on Servers to install and to update the application.

Default setting on the Windows Desktop blocks any script executions. To start deploy the application on Windows Desktops the script execution should be enabled by using the following PowerShell command:

Set-ExecutionPolicy -ExecutionPolicy RemoteSigned

The command should remain in effect on Windows Desktop platforms during application life time to ensure application updates that are also script driven.

Another advantage of the script signatures is that the script download using WEB browser does not produce warning messages from the WEB browser about unknown origins of the downloaded scripts.

Added offline installer accessible using the following URL

https://bin.12port.com/product/12port-offline.tgz

Added support for Handler script orchestration type

Handlers allow the application to expose customizable parts of the complex network management workflows as editable scripts in the script library while preserving proprietary micro-segmentation logic inside the application core. This approach simplifies customizations and development of new device types.

Handlers

Example of a handler is the action that enables policy rules enforcement. The action collects current asset status and the firewall configuration from the asset endpoint using the scripts from the script library. Then the action analyses the result using the proprietary logic. Finally, the action enables the firewall enforcement using another script from the script library.

Added support to enforce application license expiration.

While waiting for the License Server implementation, current expiration date is set for now to October, 18th with the expectation we will move the date forcing the current users to update until the proper licensing system will be implemented.

In the expired state the application prohibits creating, updating and deleting Assets, Network Services and Segmentation Policies as well as moving, copying assets and promoting objects to major version.

Both server side restrictions and client side helpers are implemented.

Added the notification box about the license expiration to the home screen as well as to the asset, services and policies lists.

Home Screen License Expiration Notification

Added license expiration entry to the system About screen.

License Expiration on About screen

Extensions

  • Added Japanese translation for server- and client-side labels and messages.

  • Added the option to use note element > in the context help markdown files.

  • Added context help for the Users Report

  • Added context help to the Service Request report as well as to Add and Edit Service Requests screens.

  • Added context help to the Network Status report.

  • Added context help to the Workloads report.

  • Added context help to the Connections report.

  • Added context help to the Firewall report.

  • Added context help to the Network Service management screens.

  • Added context help for Policy management screens.

  • Added context help for Policy Query Preview screen.

  • Added context help to the About screen

  • Added context help to the SSL Key Import screen

  • Added context help to the Time Range picker dialogue

Bug Fixes

  • Fixed the issue with unnecessary creating new local database when testing database connection for the new tenant created with the embedded database.

  • Fixed the issue with XSLT parser processing empty list results.

  • Fixed the issue with the availability of the option to edit detected firewall rule.

  • Fixed the issue with deleting an asset associated with the collected data.

  • Fixed the issues with successful and un-successful message confirmation when changing password on My Profile / Account page.

  • Fixed the issue with resetting password update fields on the My Profile / Account screen after successful update of the password.

  • Fixed the issue with out of the box assets and policies appear in the draft state.

  • Fixed the issue with automatic publishing of the firewall rules generated after publishing a policy.

  • Fixed the issue with passing PowerShell script parameters from handlers.

  • Fixed the issue with missing Firewall Management task in the out of the box Windows Host asset type

  • Fixed the issue with disabling default RDP and WinRM rules when enabling enforcement on the Windows hosts as well as re-enabling them when restoring firewall to the original state.

  • Fixed the issue with increasing asset minor version when switching status of the segmentation policy affecting the asset.

  • Fixed the issue with asset copy preserving secure fields.

  • Fixed the issue with placeholder for the asset displayed on the success message after the individual asset copy, move and delete operations.

  • Fixed the issue with detecting terms match using Same policy source criteria.

  • Fixed the issue with inability to delete all values from multi-values fields.