Tenable Identity Exposure 3.7 (2021-10-07)
Note: These Release Notes apply to SaaS,  except when specified as an on-premises version.
                                                New Features
Tenable Identity Exposure version 3.7 includes the following new features:
- 
                                                        
Single domain recrawling to force the refreshing of data for a domain.
 - 
                                                        
New Indicator of Exposure to detect when privileged users are allowed to authenticate on systems that are not considered as trusted.
 
- 
                                                        
Japanese language support.
 
Bug Fixes
Tenable Identity Exposure version 3.7 includes the following bug fixes:
| Bug Fix | Defect ID | 
|---|---|
| The indicator of exposure C-OBSOLETE-SYSTEMS now checks for obsolete versions of Windows 10. | N/A | 
| There is no longer a mismatch error between properties and attributes for indicators of attack. | N/A | 
| The Ceti service can locate the TimeCreated property from an indicator-of-attack event. | N/A | 
| Multi-threading works in the check context. | N/A | 
| Indicator of attack errors are now centralized in Ceti's logs. | N/A | 
| The GetLastEvent command returns correctly the ID of the last event without filtering. | N/A | 
| Tenable Identity Exposure decodes correctly the cACertificate attribute. | N/A | 
| Patch | Defect ID | 
| Users can access the "Email alerts" page in order to create or modify email alerts. | N/A | 
| Sysvol crawling succeeds with SMB mapping. | N/A | 
| Crawling succeeds even when LDAP requests take a long time to initialize. | N/A | 
| SYSVOL crawling completes successfully despite network errors | N/A | 
| The fetching of attribute names no longer fails due to timeout. | N/A | 
| There are no performance issues with the Cygni component. | N/A | 
| The Ceti component asks the Eridanis component to send directories only once. | N/A |