Middleware 11.23

Features

  • Whitelist Updates

    • Implemented the ability to create an exception with the parent program path and arguments

    • Implemented the ability to create an exception to match extortion responses when there are only trusted certs, match only when there are no related injections, and match only when there is no modified memory

    • Implemented the ability to create an exception to match specific file access triggers

  • Implemented group setting for automatically freeing licenses for inactive agents

    • Updated Group model to have setting for when to free licenses from inactive agents in the group. Options are 30/60/90 days, or have this setting turned off

    • Updated Agent model to have new inactive status

    • Implemented service to automatically free inactive agents' licenses according to their group setting

  • Updated the endpoint for the retrieving extortion responses to include the parent program path and arguments

    • The parent program path and arguments are now also included in the unique extortion response counts for the Web Application, Security Notification alerts, and Executive Summaries

  • Updated our Executive Summary Reports to separate out the Licenses slide to individual Desktop and Server Licenses slides

  • Updated Security Email Notification model and the Security Notification service to include two new alert types

    • Behavioral Model Tuned

    • New Agent Version

      • When a group’s managed update settings are changed to have auto update turned off, a New Agent Version notification is automatically created for the group

  • User Role/Permission Updates

    • Updated the Role model Incident Manager permissions to now only have view/edit for whitelists and silent response rules

    • Groups now have 3 default roles that are not user editable:

      • Admin

      • Read Only

      • Guest

    • Users added to a group by default are assigned the Guest Role

  • Implemented endpoints for the Web Application Browser Utility Process Tuning Modal to easily manage how agents in groups should respond to chrome utility processes

  • Updated the endpoint for the Agents page chart to be able to limit counts to agents that have called in over the past 30/60/90 days

  • Updated the Security Notification Ransomware Activity email alert to include a link that will automatically redirect users to the Extortion Responses page with the a filter to show the responses the alert was for

  • Implemented group setting for agents in a group to run in safe mode or not

  • Implemented a powershell script option for installing agents

  • Upgrading our Spring Boot to the latest version

  • Various updates to our list of default data + identity + cert whitelists for AVs

Â