Tenable Identity Exposure 3.7 (2021-10-07)
Note: These Release Notes apply to SaaS, except when specified as an on-premises version.
New Features
Tenable Identity Exposure version 3.7 includes the following new features:
-
Single domain recrawling to force the refreshing of data for a domain.
-
New Indicator of Exposure to detect when privileged users are allowed to authenticate on systems that are not considered as trusted.
-
Japanese language support.
Bug Fixes
Tenable Identity Exposure version 3.7 includes the following bug fixes:
Bug Fix | Defect ID |
---|---|
The indicator of exposure C-OBSOLETE-SYSTEMS now checks for obsolete versions of Windows 10. | N/A |
There is no longer a mismatch error between properties and attributes for indicators of attack. | N/A |
The Ceti service can locate the TimeCreated property from an indicator-of-attack event. | N/A |
Multi-threading works in the check context. | N/A |
Indicator of attack errors are now centralized in Ceti's logs. | N/A |
The GetLastEvent command returns correctly the ID of the last event without filtering. | N/A |
Tenable Identity Exposure decodes correctly the cACertificate attribute. | N/A |
Patch | Defect ID |
Users can access the "Email alerts" page in order to create or modify email alerts. | N/A |
Sysvol crawling succeeds with SMB mapping. | N/A |
Crawling succeeds even when LDAP requests take a long time to initialize. | N/A |
SYSVOL crawling completes successfully despite network errors | N/A |
The fetching of attribute names no longer fails due to timeout. | N/A |
There are no performance issues with the Cygni component. | N/A |
The Ceti component asks the Eridanis component to send directories only once. | N/A |