Tenable Identity Exposure 3.7 (2021-10-07)
Note: These Release Notes apply to SaaS, except when specified as an on-premises version.
New Features
Tenable Identity Exposure version 3.7 includes the following new features:
-
Single domain recrawling to force the refreshing of data for a domain.
-
New Indicator of Exposure to detect when privileged users are allowed to authenticate on systems that are not considered as trusted.
-
Japanese language support.
Bug Fixes
Tenable Identity Exposure version 3.7 includes the following bug fixes:
| Bug Fix | Defect ID |
|---|---|
| The indicator of exposure C-OBSOLETE-SYSTEMS now checks for obsolete versions of Windows 10. | N/A |
| There is no longer a mismatch error between properties and attributes for indicators of attack. | N/A |
| The Ceti service can locate the TimeCreated property from an indicator-of-attack event. | N/A |
| Multi-threading works in the check context. | N/A |
| Indicator of attack errors are now centralized in Ceti's logs. | N/A |
| The GetLastEvent command returns correctly the ID of the last event without filtering. | N/A |
| Tenable Identity Exposure decodes correctly the cACertificate attribute. | N/A |
| Patch | Defect ID |
| Users can access the "Email alerts" page in order to create or modify email alerts. | N/A |
| Sysvol crawling succeeds with SMB mapping. | N/A |
| Crawling succeeds even when LDAP requests take a long time to initialize. | N/A |
| SYSVOL crawling completes successfully despite network errors | N/A |
| The fetching of attribute names no longer fails due to timeout. | N/A |
| There are no performance issues with the Cygni component. | N/A |
| The Ceti component asks the Eridanis component to send directories only once. | N/A |