Skip to content

Release notes for the update August, 4 2024

Update Version 4.1.202408022057

New Features

Added service selection dialogue

Added the option to select a network service from the list of entries on policy editing and service request screens. Service selection screens visualizes services configured in the system to simplify the selection.

Note the alternative method to select services by typing service name or a port to the service field.

Service Selector

Added access protection check before enabling asset enforcement.

Added a check that allows management server to access the asset enabling enforcement of firewall rules. Management server access is a default out of the box policy that has to be published on the asset before enforcing the policies to allow management server to still access the asset for the further configuration.

When the management server access policy is not published to the asset, the job that enables the enforcement fails with the corresponding message in the job report.

Enable Aborted

Extensions

  • Added job status Failover (Delayed) to indicate that the job is delayed because some other job already runs on the endpoint.

  • Added asset level statuses report displaying infrastructure information collected from the selected endpoint.

Asset Status

  • Added navigation option to the asset from the asset path on the task editing screen

  • Added context help for the job exit code column.

  • Added the time of the next job execution to the details section of the jobs report.

Job Next Run

  • Added navigation link to the asset view screen from the asset path control of the asset level connection and workloads report.

  • Added refresh button to workloads, interfaces, connections, firewall, events, asset history, net statuses reports.

Bug Fixes

  • Fixed the issue with automatic publishing of newly generated rules to the affected endpoints after applying policies to the modified assets acting as sources for these endpoints.

  • Fixed the issue with Restore the Original action handler applying different logic to the endpoint as compare with Enabling Enforcement action.

  • Fixed the issue with language translations to the job statuses.

  • Fixed the issue with the Enable Enforcement and Restore Original actions applied to the Windows endpoints use the segmentation loginc through the action handler instead of the single script executed on the endpoint.

  • Fixed the issue with periodic scheduled task executions used the same original job record as a collector of job results as well as the record about the job execution. Added the logic that creates new job object for each consecutive execution of the periodic scheduled task.

  • Fixed the issue with defaulting seconds and minutes section of the newly created schedule in the schedule builder to the randomly selected second of a randomly selected minute of each hour.

  • Fixed the issue with enabling save button on the task editing form after modifying the schedule using schedule builder screen.

  • Fixed the issue with the empty message when deleting an API Token with no description.

  • Fixed the issue with re-ordering the list of displayed entities for many reports and lists in response to refresh action.

  • Fixed the issue with selection indicator position on the icon selection component as well as on the application customizer screen.

  • Improved failed jobs error message about connecting to the unreachable endpoints.

  • Fixed the issue with login to the system in the case of configured broken integration with external user directory.

  • Fixed the issue with authenticating to external LDAP directory during the login process.

  • Fixed the error message when accessing My Profile / Account page with the external user directory account.

  • Fixed the issue when host detected firewall rules were deleted even if enforce policy aborted during execution.

  • Fixed the visibility of the checkboxes on the LDAP, SAML, SMTP, and Entra ID editing screens.

  • Fixed the issue with generic error message in response to failed LDAP test.

  • Fixed the issue with occasional error during periodic internal cache clean up.

  • Fixed the issue with connecting to LDAP servers with SSL Certificates not including the ldap server name in their subjects using Linux deployments.

  • Improved troubleshooting message about errors running tenant maintenance process by indicating the name of the tenant.

  • Fixed the issue with inability to login with EntraID user or a user from LDAP or EntraID group after assigning permission to this principal

  • Fixed the issue with the context help for the Name field on the SAML editing screen.

  • Fixed the issue with the keyboard shortcut button to save SAML, SMTP and LDAP configurations.

  • Fixed the issue with creating new SAML configuration.

  • Fixed the issue with too frequent logout events in the event log.

  • Fixed the issue with creating second SAML configuration filled default values with the previous configuration.

  • Fixed the ${dynamic} issuer resolution to include tenant and root space to simplify SAML integrations.

  • Fixed the issue with an inappropriate error message after successful send of the test email on the SMTP configuration.

  • Improved the error message about sending Mail MFA notification.

  • Fixed the issue with the timestamp formatting for SSO requests generated from different environments.