Skip to content

2026

Release notes for the January, 11 2026 update

Update Version 4.1.202601091814

New Features

Added AI-Powered Analysis and Insights option.

AI-Powered Insights applies artificial intelligence to analyze recorded events and remote sessions data and generate summarized outputs and analytical responses.

By providing AI-driven analysis, 12Port enables Administrators, Auditors, and Reviewers to efficiently interpret system usage and activity, supporting improved security posture and governance. This capability reduces the need for manual review of extensive reports or prolonged video recordings.

The option allows to customize out of the box prompts as well as to create new prompts to query the system events and privileged sessions activities.

AI-Powered Analysis and Insights option is currently available in the form of [Ask AI] button for the following reports respecting selected filters and sort options:

  • System and asset level Events report for deep insight into user login and access approval patterns, changes in configuration and policies as well as the assets management.

  • System and asset level Sessions report for general remote access analysis, threat detection or user access patterns.

  • System and session level Session Events report to analyze admin behavior on the remote systems, detect anomalies in remote asset management, data transfers and other activities.

Extensions

  • Relocated Session Intelligence, Analytics and Tagging components to top level AI menu.

  • Added AI Manager site role to manage Cloud AI integrations, AI Prompts, analyze AI Insights, Manage Session Intelligence, Tagging and Analytical Models.

  • Added the option for the client side license activation automation performed through the user browser.

Security

  • Updated WEB application framework to the latest version.

  • Updated server side unit test component to the latest version.

Fixes

  • Fixed the issue with Safe Links REST API documentation.

  • Fixed the issue with displaying Workflow Configuration screen.

  • Fixed the issue with WEB console authentication in the deployments on the hosts with regional language locales.

  • Fixed the issue with switching to English language in the deployments on the hosts with regional language locales.

  • Fixed the issue with incorrect error reporting during deployments on the hosts with regional language locales.

  • Fixed the issue with session event recording for the joined session participant.

  • Fixed the issue with respecting time selector in the workflow configuration.

  • Fixed the issue with hot deployment of the WEB application locking the database.

  • Fixed the issue with the specific error in the exception when reporting failed authentication to Entra ID services.

  • Fixed the issue with the auditor to review Session Intelligence configuration.

  • Fixed the issue with thread leak during the application hot-deployment.

Release notes for the January, 4 2026 update

Update Version 4.1.202601021524

New Features

Added the option to launch desktop applications in Zero Trust session on the RDS jump host using native desktop or mobile RDP clients.

The option enables development of Zero Trust Access with full session recording capabilities and optional MFA enforcement for a wide range of desktop applications ("fat clients") published via Remote Desktop Services (RDS) as Remote Applications accessed by native desktop or mobile RDP clients.

The option injects credentials into the remote application before unblocking user keyboard and mouse controls. The option never releases credentials to the RDS server or to the destination application to the user client.

The option is applicable to multiple use cases such as:

  • Database development.
  • Data analysis.
  • System administration.
  • Shared Web portal access.
  • Digital marketing.

All currently supported remote applications adapted to integrate with Zero Trust sessions established by the native desktop or mobile RDP clients:

  • Active Directory Users and Computers snippet.
  • AWS WEB Console.
  • IBM PC5250 terminal.
  • Mocha TN5250 Terminal.
  • MS SQL Server Studio.
  • PuTTY.
  • Microsoft RDP Client (mstsc).

Zero Trust sessions for remote applications established by the native desktop or mobile RDP clients optionally enforces MFA by interrupting the session at the beginning to interact with the user inside the RDP client to prompt and to confirm the secund authentication factor using various MFA providers such as

  • TOTP using various authenticator apps (Google, Microsoft, etc).
  • TOTP using email of the MFA code.
  • HOTP (Yubikey)
  • Microsoft Entra ID (Office 365) including number matching push.
  • Duo Security
  • RADIUS

Extensions

  • Upgraded the web application to a modern zoneless architecture for faster, more predictable performance.

  • Added the support for Zero Trust WEB sessions launching remote "fat client" applications on the RDS servers to return keyboard and mouse control to the user right after injecting credentials into the destination application without the need to wait for a predefined timeout.

  • Added progress indicator to the Asset Access report during building of the report page.

  • Updated Copyright year in the documentation, application and installers to 2026.

  • Added a progress indicator for the button to unlock the safe link on the safe links list.

  • Updated SMTP object icon on the expanded SMTP integrations list screen to reflect Entra ID or Basic authentication.

  • Added Save button on the bottom of the service request screen.

Security

  • Updated WEB application framework to the latest major version 21.

  • Updated Informix database driver to the latest version.

Fixes

  • Fixed the issue with the tenant label on the exported access profile report.

  • Fixed the issue with the name of the exported Action Request report.

  • Fixed the issue with the availability of the bottom Save button on the inherited asset level password requirements screen.

  • Fixed the issue with initially enabling save button on the peer node selection for the asset.

  • Fixed the issue with generating RDP File to support the option to launch desktop applications in Zero Trust session on the RDS jump host using native desktop or mobile RDP clients.

  • Fixed the issue with client-side license activation.

  • Improved WEB application performance by migrating some components to the standalone architecture.