Tenable Identity Exposure 3.6 (2021-09-22)
New Features
Tenable Identity Exposure version 3.6 includes the following new features:
-
A lockout policy to mitigate brute force attacks against authentication mechanisms. It aims to lock out user accounts after too many failed login attempts.
-
New Indicator-of-Attack: PETIT-POTAM to detect attempts by PETIT-POTAM to coerce remote servers to authenticate with another machine on the network due to a Windows vulnerability.
-
A licensing feature to allow you to update your Tenable Identity Exposure license.
Bug Fixes
Tenable Identity Exposure version 3.6 includes the following bug fixes:
Bug Fix | Defect ID |
---|---|
Tenable Identity Exposure does not consider an empty GpcFileSysPath attribute as deviant. | N/A |
The IoA task script supports Windows Server 2008R2. | N/A |
Tenable Identity Exposure no longer considers as deviant alerts from domains that were removed. | N/A |
The Sysvol Crawler continues even if the registry.pol file exceeds a given size. | N/A |
The LDAP initialization succeeds even when it crawls an object that does not have an attribute change. | N/A |
The parsing of POL files now works correctly. | N/A |
There are no longer lost IoA events. | N/A |
When creating a PSO after creating a domain, Tenable Identity Exposure no longer displays the reason "No PSO are applied on the domain". | N/A |