Tenable Identity Exposure 3.30 (2022-09-21)
Bug Fixes
Tenable Identity Exposure version 3.30 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
License — Tenable Identity Exposure now bases its count of active users only on the AD objects whose objectClass is strictly User, and not the objectClasses that contain User such as MSMQ-Migrated-User or strongAuthenticationUser. | N/A |
IoA Script — It is again possible to run the Register-TenableIOA script from a domain-joined server using runas. | N/A |
MassiveComputersRecon IoA — Removed the non-relevant option Whitelisted target domain controllers. | N/A |
Trail Flow — You can now copy the SDDL field when using a non-secured HTTP protocol (relevant for some on-premise deployments that either use HTTP or a not recognized HTTPS certificate). | N/A |
Tenable Identity Exposure API Reference Portal — Removed irrelevant entry (events). | N/A |
Indicator of Exposure — Tenable Identity Exposure no longer displays tenable_ad_date tags in the CSV export file. | N/A |
API — Reinforced integer input validation and managing the error appropriately as Bad request instead of Internal server error. | N/A |
Windows Server 2022 — When installing the IoAs on a Windows 2022 Domain Controller, the server no longer needs to reboot. | N/A |