4.7.2 Release notes - 10 January 2024
This section lists the changes in version 4.7.2. Every update of the ThreatLockDown solution is cumulative and includes all enhancements and fixes from previous releases.
What's new
This release includes new features or enhancements as the following:
ThreatLockDown manager
#21142 Added minimum time constraint of 1 hour for downloading the Vulnerability Detector feed.
ThreatLockDown agent
#20638 Added request timeouts for the external and cloud integrations. This prevents indefinite waiting for a response.
Ruleset
#17565 Added new SCA policy for Debian 12 systems.
Other
#20798 Upgraded external
aiohttp
library dependency to version3.9.1
to address a security vulnerability.
ThreatLockDown dashboard
Packages
Resolved issues
This release resolves known issues as the following:
ThreatLockDown manager
Reference |
Description |
---|---|
|
|
Fixed a bug within the Windows Eventchannel decoder to ensure proper handling of Unicode characters. |
|
Fixed data validation for decoding Windows Eventchannel XML input strings. |
ThreatLockDown agent
Reference |
Description |
---|---|
Implemented validation for the format of the IP address parameter in the |
|
Fixed a bug in the Windows agent that might lead it to crash when gathering forwarded Windows events. |
|
Fixed issue with the |
|
Fixed parsing and validation for the AWS regions argument, expanding the AWS regions list accordingly. |
Ruleset
Reference |
Description |
---|---|
Updated AWS Macie rules to show relevant fields in alert details. |
ThreatLockDown dashboard
Reference |
Description |
---|---|
Fixed Agents preview page load when there are no registered agents. |
|
Changed the endpoint to get ThreatLockDown server auth configuration to |
|
Fixed error navigating back to agent in some scenarios. |
Packages
Reference |
Description |
---|---|
Fixed warning message when generating certificates. |
Changelogs
More details about these changes are provided in the changelog of each component: