Tenable Identity Exposure 2023 Release Notes
Tenable Identity Exposure 3.61 (2023-12-27)
-
Trail Flow — Tenable Identity Exposure receives events from Active Directory promptly as soon as changes appear. However, for high-frequency changes in large groups, it applies a 10-minute delay to aggregate events before notifying the rest of the system, preventing performance issues.
Tenable Identity Exposure version 3.61 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
Tenable Identity Exposure improved the performance of the IoA export process. | N/A |
The Detection of Password Weaknesses IoE now exhibits enhanced performance levels as part of the full security check, which occurs following a service reboot or after the completion of an Active Directory crawl. | N/A |
Tenable Identity Exposure addressed the issue of lengthy labels affecting the display within the expanded application menu, particularly in localized languages. | N/A |
Tenable Identity Exposure resolved dashboard creation errors arising from template issues in localized languages. | N/A |
Tenable Identity Exposure rectified potential issues with trusted certificate erasure resulting from updates to various system configurations, such as SMTP server settings. | N/A |
Tenable Identity Exposure now shows the selected Relay correctly on the LDAP configuration page. | N/A |
Tenable Identity Exposure 3.60 (2023-12-13)
-
Missing MFA for Non-Privileged Account — Multi-Factor Authentication (MFA) provides strong protection for accounts against weak or breached passwords. Security best practices and standards recommend that you enable MFA, even for non-privileged accounts. Accounts without an MFA method registered cannot benefit from it. A new Indicator of Exposure (IoE) alerts you when an account does not have a registered MFA method or if you enforce MFA without registering a method, which can allow attackers with a password to register their own MFA methods and create a security risk.
-
Unsecure Dynamic DNS Zone Updates Allowed — A new Indicator of Exposure (IoE) identifies unsecure configuration of dynamic DNS zone updates, which can lead to unauthenticated editing of DNS records, making them vulnerable to rogue DNS records.
Tenable Identity Exposure version 3.60 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
Tenable Identity Exposure now shows correctly the list of alerts in Japanese. | N/A |
The public API endpoint /profiles/:profileId/attacks with parameter order=ASC now returns results in ascending order. | N/A |
If the Trail Flow is idle for 10 minutes, Tenable Identity Exposure pauses it to save resources. | N/A |
The terminology used in the French translation for the health check feature is now consistent throughout. | N/A |
When editing a role, deselecting "read by default" or "edit by default" for an entity without data no longer triggers an error during the save process. | N/A |
The default "Defer time" on the DCSync Indicator of Attack (IoA) has changed from 10 minutes to 1 hour. Tenable Identity Exposure recommends applying this change on existing custom profiles to ensure a more efficient whitelisting of legitimate applications. | N/A |
The Application of Weak Password Policies on Users IoE has enhancements to handle better edge cases related to options' limits. | N/A |
Tenable Identity Exposure 3.59 (2023-11-29)
-
Property Sets Sanity — A new Indicator of Exposure (IoE) checks for any misconfiguration or backdoor from malicious actors present in Property Sets and their attributes within the AD schema. While there are currently no known public attack vectors associated with the use of property sets, this IoE focuses primarily on identifying misconfigurations or peculiarities stemming from third-party products that use this feature.
-
Secure Relay — The API key renews automatically with each SaaS release.
Tenable Identity Exposure version 3.59 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
Tenable Identity Exposure reinstated the successful delivery of reporting emails that impacted a subset of customers. | N/A |
During role configuration, unchecking "read by default" or "edit by default" for an entity without data no longer results in an error upon saving. | N/A |
Entra ID Indicators of Exposure now accurately compute the total number of findings, and the last pages show the latest findings instead of a blank page. | N/A |
Tenable Identity Exposure resolved a Role-Based Access Control (RBAC) issue and now allows privileged users to configure Indicators of Attack. | N/A |
Enhancements to Attack Path traversal algorithms have resulted in significant improvements in both response time and memory efficiency. | N/A |
Tenable Identity Exposure 3.58 (2023-11-01)
-
Privileged Entra Account Synchronized With AD (Hybrid) — A new Indicator of Exposure checks for hybrid accounts, specifically those synchronized from Active Directory that have privileged roles in Entra ID. These accounts pose a security risk because they allow attackers who compromise AD to pivot to Entra ID. Privileged accounts in Entra ID must be cloud-only accounts.
-
Entra ID security analysis — Tenable Identity Exposure enhanced the relevance of Entra ID security analysis by incorporating the Microsoft property isPrivileged to determine a role's privileged status. This refinement results in a more precise analysis, consequently increasing the number of security findings, as it now classifies a broader range of roles as privileged.
-
Authentication via the Relay— Secure Relay users can now configure LDAP authentication by selecting one of their Relays. This chosen relay connects to their LDAP Server to authenticate the user.
Tenable Identity Exposure version 3.58 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
Tenable Identity Exposure now detects new versions of the PetitPotam attack following the Microsoft patch. | N/A |
Tenable Identity Exposure improved DCSync correlation rules. | N/A |
Tenable Identity Exposure 3.57 (2023-10-18)
-
WSUS Dangerous Misconfigurations — A new Indicator of Exposure checks Windows Server Update Services (WSUS), a Microsoft product that deploys Windows updates to workstations and servers, for misconfigured settings that can lead to an elevation to administrator privileges from a standard account.
-
Search — The System --> Forests or Domains page now includes a new search function to help you locate and access specific forest and domain configurations in larger environments.
Tenable Identity Exposure version 3.57 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
The Indicator of Attack events listener now functions again on Windows Server versions predating 2016. | N/A |
Tenable Identity Exposure now considers credentials update for Azure AD in future scans. | N/A |
Tenable Identity Exposure enhanced Secure Relay reliability when applying Indicators of Attack with extensive Active Directory infrastructures. | N/A |
Tenable Identity Exposure 3.56 (2023-10-04)
-
The user interface's Trail Flow and drawer functions now feature the updated Tenable design.
Tenable Identity Exposure version 3.56 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
Receiving an empty DNS record no longer holds up the platform on the corresponding AD object. | N/A |
For the following Indicators of Exposure, the default "Tenable" profile changed the option to keep disabled accounts in the analysis from "true" to "false":
|
N/A |
Tenable Identity Exposure no longer flags deleted accounts as problematic in Security Descriptors. Even though the Security Descriptor may not adhere to good hygiene practices, it does not pose a security risk. | N/A |
The Tenable Identity Exposure API no longer allows the addition of permissions to unknown entities. | N/A |
A new option is now available for the Dangerous Trust Delegation IoE to allow you to specify that the check is unnecessary because the domain controllers' operating systems are up to date. | N/A |
The logic of the Zerologon Indicator of Attack has changed to decrease the occurrence of false positives. To revert to the previous behavior, you must enable the "Advanced" option in the security profile. | N/A |
Tenable Identity Exposure 3.55 (2023-09-20)
Tenable Identity Exposure version 3.55 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
Indicators of Exposure (IoE) no longer contain references to deleted objects. | N/A |
The Indicator of Attack engine now has support for IPv4-mapped IPv6 addresses. | N/A |
The IoE Unlinked, Disabled, or Orphan Group Policy Object (GPO) is now more effective in managing scenarios with removed GPOs. | N/A |
The relay now shuts down when it receives an order from the SaaS platform, even if it cannot connect to an alert server. When it restarts, the relay processes any unsent alerts. | N/A |
Tenable Identity Exposure Tenable One Platform Updates (2023-9-20)
The Workspace page appears when you log in to Tenable. In addition, administrators can change which custom roles can access which Tenable One apps.
-
To set a default app on the Workspace page, click on the app tile and select Make Default Login. This app now appears when you log in.
-
To remove a default app on the Workspace page, click on the app tile and select Remove Default Login Page. The Workspace page now appears when you log in.
-
(Tenable One-only) To control which custom roles can access which Tenable One apps, use new role settings. For more information, see Create a Custom Role.
Tenable Identity Exposure 3.54 (2023-09-11)
Tenable Identity Exposure version 3.54 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
Tenable Identity Exposure successfully addressed and resolved issues related to the Secure Relay installation. | N/A |
The Trail Flow can now effectively manage customers with extensive event histories. | N/A |
The Entra ID (previously known as Azure AD) findings date column now clearly indicates the date/time format. | N/A |
Tenable Identity Exposure resolved several memory leaks in the collector service. | N/A |
The Indicator of Attack (IoA) computer mapping now shows the latest DNS entry rather than displaying all of them. | N/A |
Tenable Identity Exposure now removes DNS entries used in IoAs when they are deleted from the Active Directory. | N/A |
Tenable Identity Exposure 3.53 (2023-08-23)
-
Detection of Password Weaknesses — A new Tenable Identity Exposure Indicator of Exposure checks for robust passwords to ensure the security of Active Directory authentication. Weak passwords arise from factors such as insufficient complexity, outdated hashing algorithms, shared passwords, and exposure in leaked databases. Attackers exploit these weaknesses to mimic accounts, particularly concerning privileged ones, enabling unauthorized access within the Active Directory.
Tenable Identity Exposure version 3.53 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
The health check status no longer switches to "Unknown" after the product runs for 30 minutes. | N/A |
Tenable Identity Exposure corrected another correlation logic that had an impact on the following IoAs: NTDS Extraction and DC Password Change. | N/A |
Tenable Identity Exposure now removes any permission for "NT AUTHORITY\Authenticated Users" on the installation folder when installing the Secure Relay. | N/A |
Tenable Identity Exposure 3.52 (2023-08-09)
-
Updated legal terms in Tenable Identity Exposure to reflect the Tenable Legal Policy for 2023.
Tenable Identity Exposure version 3.52 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
Tenable Identity Exposure fixed a correlation logic that had an impact on the following Indicators of Attack (IoA): DCSync, DCShadow, DPAPI Domain Extraction, DC Suspicious Password Change, DNSAdmins Exploitation, Massive Computers Reconnaissance, NTDS Extraction, OS Credential Dumping: LSASS Memory, SAMaccountName Impersonation, and Zerologon Exploitation. | N/A |
Privileged Analysis now supports Active Directory with an SID history containing the domain administrator (not recommended). | N/A |
The IoA engine has improved to support PTR and CNAME DNS records when performing event logs correlation. | N/A |
When filtering a specific domain and showing all Indicators of Exposure (IoEs), the IoE page no longer shows all IoEs. | N/A |
The migration from the SaaS-VPN platform to SaaS Secure Relay now removes previous unused resources reported in health checks. | N/A |
Tenable Identity Exposure 3.51 (2023-07-31)
-
DFS Misconfiguration — A new Indicator of Exposure checks that SYSVOL uses Distributed File System Replication (DFSR), a mechanism that replaced the File Replication Service (FRS) for better robustness, scalability, and replication performance.
Tenable Identity Exposure version 3.51 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
Tenable Identity Exposure provides localized resources in regional languages when users request Microsoft Entra ID-related tabs, such as IoEs, deviances, and more. | N/A |
Tenable Identity Exposure now excludes the files that the Indicator of Attack uses from regular SYSVOL crawling. | N/A |
Tenable Identity Exposure improved the stability of the Secure Relay lifecycle. | N/A |
The Secure Relay health check now provides information even if the corresponding relay is not started and/or reachable. | N/A |
Tenable Identity Exposure enhanced the scheduling process for scans for Microsoft Entra ID tenants to ensure fairness. | N/A |
Tenable Identity Exposure performs Secure Relay health checks even when these relays are not linked to an Active Directory domain. | N/A |
When rolling back an upgrade, the Secure Relay feature now also restores the auto-upgrade scheduled task. | N/A |
Tenable Identity Exposure renewed the code signing certificate for the Secure Relay. | N/A |
Migration from the cloud VPN infrastructure to cloud Secure Relay now removes previous resources that are now unused from the health check reports. | N/A |
Tenable Identity Exposure updated the Attack Path module to filter out new entities associated with passwordHash to resolve Attack Path issues. | N/A |
Tenable Identity Exposure restored the ability to send unencrypted emails over SMTP. | N/A |
Tenable Identity Exposure can retrieve sensitive data even with renamed Active Directory Domains. | |
Dangerous Sensitive Privileges Indicator of Exposure:
|
N/A |
Tenable Identity Exposure 3.50 (2023-07-12)
-
Trail Flow — Tenable Identity Exposure now allows you to filter trail flow events by both date and time.
Tenable Identity Exposure version 3.50 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
The Indicator of Attack security analysis can once again correlate incoming Windows event logs with stored security events. | N/A |
Tenable Identity Exposure regained the ability to retrieve information from a SYSVOL source using the FRS protocol. | N/A |
Tenable Identity Exposure improved the resiliency of the LDAP connection to the domain controller. | N/A |
Tenable Identity Exposure 3.49 (2023-06-28)
-
Platform health check capabilities — Tenable Identity Exposure lists the platform health checks it performed in a consolidated view to enable you to investigate and resolve configuration anomalies promptly. For more information, see Health Checks in the Tenable Identity Exposure Administrator Guide.
-
Reporting Center — This feature offers a way to export important data as reports to key stakeholders in an organization using a streamlined report creation process. For more information, see the Reporting Center in the Tenable Identity Exposure Administrator Guide.
-
Indicators of Exposure (IoE) — Exclusion allowed for deviant objects in selected IoEs, including:
-
Group: Logon Restrictions for Privileged Users
-
Operating System: Computers Running an Obsolete OS
-
Organizational Unit: Logon Restrictions for Privileged Users, Computers Running an Obsolete OS, Application of Weak Password Policies on Users, Dormant Accounts, User Account Using Old Password
-
-
Dashboard templates — Ready-to-use templates help you focus on the priority issues that concern your organization such as compliance, risk, password management, and user/admin monitoring. For more information, see Dashboards in the Tenable Identity Exposure User Guide.
-
Workspace — The Workspace feature allows you to see and access all of your Tenable products in one location. For more information, see Workspace in the Tenable Identity Exposure User Guide.
Tenable Identity Exposure version 3.49 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
Customers using Tenable Identity Exposure with an IPSEC VPN infrastructure can now see health checks. | N/A |
When users change their password, Tenable Identity Exposure invalidates all of their sessions. | N/A |
For the ADCS Dangerous Misconfigurations IoE, it is now possible to exclude the trustees from other AD domains using their samAccountName or userPrincipalName from the certificates templates analysis. | N/A |
Tenable Identity Exposure 3.48 (2023-06-14)
-
Built-in health check capabilities — Health checks provide you with real-time visibility into the configuration of your domains and service accounts in one consolidated view, from which you can drill down to investigate and remedy any configuration anomalies leading to connectivity or other issues in your infrastructure. For more information, see Health Checks in the Tenable Identity Exposure Administrator Guide.
-
Search — The search function is now available for Relay Management and Roles Management.
Tenable Identity Exposure version 3.48 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
Tenable Identity Exposure now reads event log files in gz format with fewer retry attempts to address potential issues caused by open file handles on these files. | N/A |
Enhanced security analysis for Indicators of Attack (IoAs) can better handle RabbitMQ failures to ensure greater resilience. | N/A |
When on the dashboard page and using the browser's previous page button, the dashboard now correctly populates with the relevant data. | N/A |
The last digit on the widget abscissa is now fully visible. | N/A |
The application switcher now uses an appropriate token to retrieve the list of available Tenable applications. | N/A |
Tenable Identity Exposure now compresses and rotates Secure Relay logs for optimal storage and easier management. | N/A |
When there is no IoA module installed, Tenable Identity Exposure does not report an error. | N/A |
Indicators of Exposure (IoE)
|
N/A |
Alerting using the SYSLOG protocol supports non-English characters such as Japanese. | N/A |
A newly implemented mechanism enhances the resilience of the database when there are numerous attribute modifications. | N/A |
The IoA security analysis now falls back to a previous Windows event log version when necessary. | N/A |
The security analysis now limits the generation of error logs when it encounters an incorrect regular expression from an IoE option. | N/A |
Tenable Identity Exposure 3.47 (2023-05-31)
DC Password Change — Related to Zerologon, this new Indicator of Attack focuses on a specific post-exploitation activity that attackers commonly use in conjunction with the Netlogon vulnerability: the modification of the Domain Controller machine account password. For more information, see the Tenable Identity Exposure Indicators of Attack Reference Guide.
Tenable Identity Exposure version 3.47 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
Transcript files that the Indicator of Attack module produces on domain controllers can now replicate with complete information. | N/A |
Tenable Identity Exposure detects whether or not the SMTP server is configured. | N/A |
Tenable Identity Exposure 3.46 (2023-05-17)
Zerologon — A new Indicator of Attack detects a failure in the Netlogon authentication process which indicates that attackers are trying to exploit the Zerologon vulnerability to gain privileges on the domain. For more information, see the Tenable Identity Exposure Indicators of Attack Reference Guide.
Tenable Identity Exposure version 3.46 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
The custom CA certificate trash bin removes the certificates as designed. | N/A |
A profile is now mandatory when configuring SYSLOG alerts for Indicators of Attack. | N/A |
An additional parameter, -EventLogsFileWriteFrequency X, in the Indicator of Attack deployment script allows you to address potential issues with slow or broken Distributed File System (DFS) replication that you may experience. For more information, see DFS Replication Issues Mitigation in the Administrator Guide. | N/A |
Tenable Identity Exposure 3.45 (2023-05-03)
Secure Relay — The Secure Relay now supports Syslog and SMTP alerting. For more information, see Secure Relay in the Tenable Identity Exposure Administrator Guide.
Syslog and SMTP alertings can now send alerts to private servers through a Secure Relay. When creating an alert, Secure Relay platforms now ask you to select a Relay. You can set up Relays and use them for either domain monitoring and alerting, or both.
If you use Secure Relay and have existing alerts, the Tenable Identity Exposure 3.45 update automatically assigns a Relay to them for service continuity. You can edit this Relay for reasons related to your Relay-VM network rules or your preferences.
Tenable Identity Exposure version 3.45 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
Indicators of Attack — The customization of Tenable Identity Exposure IoAs now works as expected. | N/A |
Secure Relay Updater — Can now launch itself without an open user session. |
N/A |
Alerting — Tenable Identity Exposure no longer shows a drop-down menu to VPN users that was intended for Secure Relay users only. | N/A |
User Interface
|
N/A |
Tenable Identity Exposure 3.44 (2023-04-19)
-
Domain Backup Key Extraction — A new Indicator of Attack detects a wide variety of attack tools that use LSA RPC calls to access backup keys. For more information, see the Tenable Identity Exposure Indicators of Attack Reference Guide.
-
Calibration for Indicator of Attacks — New recommendations on how to adapt IoAs to your environment based on the size of your Active Directory and authorized known tools, etc. For complete information, see the Tenable Identity Exposure Indicators of Attack Reference Guide.
Tenable Identity Exposure version 3.44 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
Tenable Identity Exposure updated its password policy to require a minimum password length of 12 characters. This update ensures consistency across all cases, as some previously only required 8 characters. | N/A |
The alerting screens now hide in-development information. | N/A |
Tenable Identity Exposure now allows you to delete custom trusted Certificate Authorities (CAs). | N/A |
The email alerting tab shows the correct name. | N/A |
Tenable Identity Exposure removes the AD objects from the Tenable Cloud platform when you delete the corresponding directory in Tenable Identity Exposure. | N/A |
If the Recycle bin is enabled, the relevance of the event type in the Trail Flow increases when you delete a user. | N/A |
The active user count now counts restored AD objects. | N/A |
Tenable Identity Exposure should now always display attack names in the Indicator of Attack investigation view. | N/A |
The Tenable Identity Exposure IoA GPO audit.csv file now gets generated using results from Windows APIs instead of auditpol.exe output (which is localizable). | N/A |
It is now faster to export deviances from Indicators of Exposure. | N/A |
The Secure Relay updater now verifies its configuration before validating any updates and rolls back the update if the configuration check fails. | N/A |
Tenable Identity Exposure 3.43 (2023-03-22)
-
Secure Relay — The Secure Relay now supports HTTP proxy without authentication if your network requires a proxy server to reach the internet. For more information, see Secure Relay in the Tenable Identity Exposure Administrator Guide.
- Onboarding — For enhanced security, the onboarding process now requires that users change the default credentials provided for the initial login when they log in for the first time. Tenable Identity Exposure also enhanced the rules for a new password.
-
Scalability — Tenable Identity Exposure improved the performance of Indicators of Attack on the service side to handle events of interest on a greater scale for better IoA accuracy and latency.
-
New Indicator of Attack — A new IoA called Unauthenticated Kerberoasting detects stealthy Kerberoasting attacks that bypass numerous detections.
Tenable Identity Exposure version 3.43 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
Tenable Identity Exposure improved the Indicator of Exposure Application of Weak Password Policies on Users for heavy workload scenarios. | N/A |
Tenable Identity Exposure removed the RBAC permission related to workload quota. | N/A |
It is now possible to install the Relay on virtual machine servers that do not have Internet Explorer. | N/A |
The IoA setup script now handles edge cases where a Resultant Set of Policy (RSOP) computation is not possible for the user running the script. | N/A |
The IoA NTDS Extraction can now exclude any configured process from its analysis. | N/A |
Tenable Identity Exposure 3.42 (2023-03-08)
Tenable Identity Exposure version 3.42 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
Indicators of Exposure
|
N/A |
Indicators of Attack
|
N/A |
Secure Relay
|
N/A |
Tenable Identity Exposure no longer pushes an IoA configuration on the PDC in a deleted GPO. It now uses the installed IoA configuration for a more robust IoA automatic update experience. | N/A |
The Tenable Identity Exposure (Compliance) Score through the Public API now excludes deactivated checkers for the provided profile. This had led to an incorrect score via the Public API. This is now improved and consistent with the Compliance Score available in the Tenable Identity Exposure user interface. | N/A |
After deleting a directory, the Attack Path now refreshes its Tier 0 graph. | N/A |
Tenable Identity Exposure improved the resiliency of the IoA setup script for subsequent installations of the script. | N/A |
Tenable Identity Exposure 3.41 (2023-02-23)
Tenable Identity Exposure version 3.41 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
The renaming of the Tenable Identity Exposure GPO no longer has an impact on the automatic update feature of the Tenable Identity Exposure Indicator of Attack configuration. |
N/A |
Tenable Identity Exposure now requires fewer permissions to obtain the same Indicator of Attack analysis. | N/A |
The Indicator of Attack PDF report no longer shows an erroneous header on the cover page. | N/A |
Elimination of false positives on the Tenable Identity Exposure GPO for these Indicators of Exposure: Verify Sensitive GPO Objects and Files Permissions and Domain Controllers Managed by Illegitimate Users. | N/A |
Tenable Identity Exposure 3.40 (2023-02-13)
-
LDAPS connection — Tenable Identity Exposure can use the LDAPS (TCP/636) port to connect to your Active Directory in the Secure Relay architecture. This configuration is not possible in the IPSEC VPN environment.
Tenable Identity Exposure version 3.40 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
Secure Relay:
|
N/A |
Authentication — Tenable Identity Exposure now logs a successful login attempt after it validates it. | N/A |
Indicators of Attack:
|
N/A |
Tenable Identity Exposure 3.39 (2023-01-25)
-
Quicker and easier deployment of Indicators of Attack — Tenable Identity Exposure can now add or remove Indicators of Attack automatically from configured domain controllers without any manual intervention. For more information, see Install Indicators of Attack in Tenable Identity Exposure Administrator Guide.
-
Roles — Role configuration now allows you to set access to the Relay configuration.
Tenable Identity Exposure version 3.39 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
Attack Path:
|
N/A |
Security — GraphQL suggestions no longer appear. | N/A |
Relay — The Relay can now resolve domains FQDNs. This allows you to use Kerberos on Secure Relay environments, if you also use it with a username in the UPN format in the Forest configuration. | N/A |
Bug Fix | Defect ID |
---|---|
The event log consumption and other Relay events now occur in parallel to avoid memory leak issues. |
N/A |
The Relay uninstaller no longer stops the Tenable Nessus Agent service. | N/A |
Relay installer:
|
N/A |
Tenable Identity Exposure 3.38 (2023-01-11)
Tenable Identity Exposure version 3.38 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
Tenable Identity Exposure dashboard widgets now show "0" instead of "No data" when it does not detect any deviants. | N/A |
Bug Fix | Defect ID |
---|---|
Tenable Identity Exposure now checks for Secure Relay automatic updates every 15 minutes instead of daily. | N/A |