Monthly Release Notes - January 2023

Jump to:

 

Boldon James


Mobile Classifier

Mobile Classifier is no longer being released by Fortra. If you are currently using Mobile Classifier, please contact Customer Support for more details.

Back to Top

 

Clearswift


Secure Email Gateway

Version 5.5.1

January 12, 2023

Fixes
  • This release corrects a problem introduced in V5.5.0 where TLS would fail if the TLS configuration depended on CA/Intermediate certificates which were in the Gateway configuration but not in the Red Hat certificate store. The fix is applied automatically when the system is upgraded to V5.5.1.

Back to Top

 

Core Security


Core Impact

Version: 21.3

January 8, 2023

New Features
  • New Modules:
    • Post exploitation module to execute .NET assemblies
    • Post exploitation module to simulate a Ransomware attack
  • Support Beacon Object File (BOF) execution from any Windows agent. Core Impact can now leverage from the extensive BOF library created by the community as well as enabling execution of any custom BOF.
  • Added capability to tunnel traffic through a SOCKSProxy Server, thus enabling exploit execution through a Cobalt Strike beacon for example.
Enhancements
  • Added support to UNICODE environments. Expanding systems that Core Impact can pentest and hosts where it can be installed as well.
  • Dependencies updated:
    • OpenSSL
    • mimikatz
  • Updated support to OWASP Top10 2021 in WebApps RPT.
  • Allow triggering one-shot-exploits (modules that could leave the exploited service unavailable) when running a Vulnerability Scanner Validation.
  • Added option to trigger Metasploit exploits when running a Vulnerability Scanner Validation. In order to do so Metasploit integration has to be setup within Core Impact.
Fixes
  • Core Impact agent through HTTP / HTTPS channel can be deployed in Ubuntu 22.04.

  • Enlarged length of commands that could be executed in shells.

  • Showing full output of commands in Powerhsell shell.

  • Enhanced exception handling in Attack Map View.

  • Customer reported issues when importing scan result from Acunetix / Burp / Nexpose / Nessus.

  • DNS Channel now responds to NS requests, allowing usage with OpenDNS.

Back to Top

 

Digital Defense


Frontline Vulnerability Manager

Version 6.5.1.9

January 27, 2023

Enhancements
  • Added a new command in RNA utils to grab scan status from RNAs.
Fixes
  • PCI Self Service: Reports - Assets with different IPs and same DNS Name is not being reported.
  • Error generating Language localization Reports with size that exceeds the limit.
  • Creating new Business Groups will not allow assigning Group Members.

Frontline Agent

Version 1.53.1

January 20, 2023

Current Windows agent version: 1.53.0

Current macOS agent version: 1.53.0

Enhancements
  • Implemented the following new vulnerability checks:

    • 150812 APSB22-46: Security Updates Available for Adobe Acrobat and Reader (High) - Windows, Mac
    • 150811 APSB23-01: Security Updates Available for Adobe Acrobat and Reader (High) - Windows, Mac
    • 150810 APSB23-07: Security Updates Available for Adobe InDesign (High) - Windows
    • 150792 Foxit PhantomPDF: Multiple Vulnerabilities in Version 10.1.9.37808 and Earlier (Low) - Windows
    • 150806 Google Chrome: Multiple Vulnerabilities in Versions Less Than 107.0.5304.122 (High) - Windows, Mac
    • 150809 Google Chrome: Multiple Vulnerabilities in Versions Less Than 108.0.5359.72 (High) - Windows, Mac
    • 150808 Google Chrome: Multiple Vulnerabilities in Versions Less Than 108.0.5359.95 (High) - Windows, Mac
    • 150807 Google Chrome: Multiple Vulnerabilities in Versions Less Than 109.0.5414.74 (High) - Windows, Mac
    • 150813 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 108 (High) - Windows, Mac
    • 150814 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 102.6 (High) - Windows, Mac
    • 150815 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.5.1 (High) - Windows
    • 150817 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.6.1 (High) - Windows
    • 150816 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.6 (High) - Windows
    • 150795 MS23-JAN: Microsoft Exchange Server Security Update (Medium) - Windows
    • 150794 MS23-JAN: Microsoft Office Security Update (High) - Mac
    • 150796 MS23-JAN: Microsoft Sharepoint Server Security Update (High) - Windows
    • 150793 MS23-JAN: Microsoft Windows Security Update (High) - Windows
Fixes
  • Updated Vulnerability Descriptions:
    • 118973 Microsoft Internet Explorer End of Life (High)
    • 150237 MS22-NOV: Microsoft Exchange Server Security Update (High)

Frontline NIRV Scanner

Version 4.14.1

January 31, 2023

Enhancements

Updated authenticated scanning checks and network explicit checks listed:

  • 151423 AIX Security Advisory: bind_advisory22 (High)
  • 151424 AIX Security Advisory: java_dec2022_advisory (Medium)

  • 151425 AIX Security Advisory: kernel_advisory5 (Medium)

  • 151426 AIX Security Advisory: lpd_advisory3 (Medium)

  • 151427 AIX Security Advisory: openssl_advisory37 (High)

  • 151428 AIX Security Advisory: python_advisory3 (High)

  • 151429 AIX Security Advisory: rmmlcache_advisory (High)

  • 151430 AIX Security Advisory: rmrlcache_advisory (High)

  • 151431 AIX Security Advisory: smbcd_advisory2 (Medium)

  • 151432 AIX Security Advisory: x11_advisory (Medium)

  • 151412 Amazon Linux 2 Security Advisory: ALAS-2023-1904 (High)

  • 151403 Amazon Linux 2 Security Advisory: ALAS-2023-1905 (Medium)

  • 151410 Amazon Linux 2 Security Advisory: ALAS-2023-1906 (Medium)

  • 151413 Amazon Linux 2 Security Advisory: ALAS-2023-1907 (Low)

  • 151408 Amazon Linux 2 Security Advisory: ALAS-2023-1908 (Low)

  • 151411 Amazon Linux 2 Security Advisory: ALAS-2023-1909 (High)

  • 151409 Amazon Linux 2 Security Advisory: ALAS-2023-1910 (Low)

  • 151404 Amazon Linux 2 Security Advisory: ALAS-2023-1911 (Low)

  • 151406 Amazon Linux 2 Security Advisory: ALAS-2023-1912 (Low)

  • 151407 Amazon Linux 2 Security Advisory: ALAS-2023-1913 (Low)

  • 151416 Amazon Linux 2 Security Advisory: ALAS-2023-1914 (Low)

  • 151405 Amazon Linux 2 Security Advisory: ALAS-2023-1915 (Low)

  • 151418 Amazon Linux 2 Security Advisory: ALAS-2023-1916 (Low)

  • 151415 Amazon Linux 2 Security Advisory: ALAS-2023-1917 (Low)

  • 151417 Amazon Linux 2 Security Advisory: ALAS-2023-1918 (Low)

  • 151414 Amazon Linux 2 Security Advisory: ALAS-2023-1919 (Low)

  • 151388 Amazon Linux Security Advisory: ALAS-2023-1657 (Medium)

  • 151398 Amazon Linux Security Advisory: ALAS-2023-1658 (Medium)

  • 151400 Amazon Linux Security Advisory: ALAS-2023-1659 (Medium)

  • 151384 Amazon Linux Security Advisory: ALAS-2023-1660 (Medium)

  • 151389 Amazon Linux Security Advisory: ALAS-2023-1661 (Medium)

  • 151390 Amazon Linux Security Advisory: ALAS-2023-1662 (Low)

  • 151391 Amazon Linux Security Advisory: ALAS-2023-1663 (Low)

  • 151397 Amazon Linux Security Advisory: ALAS-2023-1664 (Low)

  • 151394 Amazon Linux Security Advisory: ALAS-2023-1665 (Low)

  • 151401 Amazon Linux Security Advisory: ALAS-2023-1666 (Low)

  • 151386 Amazon Linux Security Advisory: ALAS-2023-1667 (Low)

  • 151402 Amazon Linux Security Advisory: ALAS-2023-1668 (Low)

  • 151399 Amazon Linux Security Advisory: ALAS-2023-1669 (High)

  • 151387 Amazon Linux Security Advisory: ALAS-2023-1670 (High)

  • 151385 Amazon Linux Security Advisory: ALAS-2023-1671 (High)

  • 151393 Amazon Linux Security Advisory: ALAS-2023-1672 (High)

  • 151392 Amazon Linux Security Advisory: ALAS-2023-1673 (High)

  • 151395 Amazon Linux Security Advisory: ALAS-2023-1674 (High)

  • 151396 Amazon Linux Security Advisory: ALAS-2023-1675 (Low)

  • 151381 Azul Zulu Critical Patch Update: JANUARY-2023 (High)

  • 151435 Borland InterBase Remote Code Execution Vulnerability (High)

  • 151181 Compliance: (BL) Ensure 'Allow access to BitLocker-protected fixed data drives from earlier versions of Windows' is set to 'Disabled' (Trivial)

  • 150927 Compliance: (BL) Ensure 'Allow access to BitLocker-protected removable data drives from earlier versions of Windows' is set to 'Disabled' (Trivial)

  • 150841 Compliance: (BL) Ensure 'Allow enhanced PINs for startup' is set to 'Enabled' (Trivial)

  • 150947 Compliance: (BL) Ensure 'Allow Secure Boot for integrity validation' is set to 'Enabled' (Trivial)

  • 151221 Compliance: (BL) Ensure 'Allow standby states (S1-S3) when sleeping (on battery)' is set to 'Disabled' (Trivial)

  • 151079 Compliance: (BL) Ensure 'Allow standby states (S1-S3) when sleeping (plugged in)' is set to 'Disabled' (Trivial)

  • 151046 Compliance: (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered' is set to 'Enabled' (Trivial)

  • 151112 Compliance: (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Allow data recovery agent' is set to 'Enabled: True' (Trivial)

  • 151050 Compliance: (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Configure storage of BitLocker recovery information to AD DS' is set to 'Enabled: Backup recovery passwords and key packages' (Trivial)

  • 151105 Compliance: (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Do not enable BitLocker until recovery information is stored to AD DS for fixed data drives' is set to 'Enabled: False' (Trivial)

  • 151082 Compliance: (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Omit recovery options from the BitLocker setup wizard' is set to 'Enabled: True' (Trivial)

  • 150928 Compliance: (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Recovery Key' is set to 'Enabled: Allow 256-bit recovery key' (Trivial)

  • 151142 Compliance: (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Recovery Password' is set to 'Enabled: Allow 48-digit recovery password' (Trivial)

  • 151134 Compliance: (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Save BitLocker recovery information to AD DS for fixed data drives' is set to 'Enabled: False' (Trivial)

  • 150983 Compliance: (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered' is set to 'Enabled' (Trivial)

  • 150833 Compliance: (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered: Allow data recovery agent' is set to 'Enabled: False' (Trivial)

  • 150991 Compliance: (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered: Configure storage of BitLocker recovery information to AD DS:' is set to 'Enabled: Store recovery passwords and key packages' (Trivial)

  • 151106 Compliance: (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered: Do not enable BitLocker until recovery information is stored to AD DS for operating system drives' is set to 'Enabled: True' (Trivial)

  • 151027 Compliance: (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered: Omit recovery options from the BitLocker setup wizard' is set to 'Enabled: True' (Trivial)

  • 150964 Compliance: (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered: Recovery Key' is set to 'Enabled: Do not allow 256-bit recovery key' (Trivial)

  • 151064 Compliance: (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered: Recovery Password' is set to 'Enabled: Require 48-digit recovery password' (Trivial)

  • 150944 Compliance: (BL) Ensure 'Choose how BitLocker-protected operating system drives can be recovered: Save BitLocker recovery information to AD DS for operating system drives' is set to 'Enabled: True' (Trivial)

  • 150868 Compliance: (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered' is set to 'Enabled' (Trivial)

  • 150905 Compliance: (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Allow data recovery agent' is set to 'Enabled: True' (Trivial)

  • 150872 Compliance: (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Configure storage of BitLocker recovery information to AD DS:' is set to 'Enabled: Backup recovery passwords and key packages' (Trivial)

  • 150907 Compliance: (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Do not enable BitLocker until recovery information is stored to AD DS for removable data drives' is set to 'Enabled: False' (Trivial)

  • 150823 Compliance: (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Omit recovery options from the BitLocker setup wizard' is set to 'Enabled: True' (Trivial)

  • 151184 Compliance: (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Recovery Key' is set to 'Enabled: Do not allow 256-bit recovery key' (Trivial)

  • 150977 Compliance: (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Recovery Password' is set to 'Enabled: Do not allow 48-digit recovery password' (Trivial)

  • 150891 Compliance: (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Save BitLocker recovery information to AD DS for removable data drives' is set to 'Enabled: False' (Trivial)

  • 150988 Compliance: (BL) Ensure 'Configure use of hardware-based encryption for fixed data drives' is set to 'Disabled' (Trivial)

  • 150921 Compliance: (BL) Ensure 'Configure use of hardware-based encryption for operating system drives' is set to 'Disabled' (Trivial)

  • 151219 Compliance: (BL) Ensure 'Configure use of hardware-based encryption for removable data drives' is set to 'Disabled' (Trivial)

  • 151069 Compliance: (BL) Ensure 'Configure use of passwords for fixed data drives' is set to 'Disabled' (Trivial)

  • 151218 Compliance: (BL) Ensure 'Configure use of passwords for operating system drives' is set to 'Disabled' (Trivial)

  • 150848 Compliance: (BL) Ensure 'Configure use of passwords for removable data drives' is set to 'Disabled' (Trivial)

  • 150914 Compliance: (BL) Ensure 'Configure use of smart cards on fixed data drives' is set to 'Enabled' (Trivial)

  • 151111 Compliance: (BL) Ensure 'Configure use of smart cards on fixed data drives: Require use of smart cards on fixed data drives' is set to 'Enabled: True' (Trivial)

  • 151101 Compliance: (BL) Ensure 'Configure use of smart cards on removable data drives' is set to 'Enabled' (Trivial)

  • 150906 Compliance: (BL) Ensure 'Configure use of smart cards on removable data drives: Require use of smart cards on removable data drives' is set to 'Enabled: True' (Trivial)

  • 151020 Compliance: (BL) Ensure 'Deny write access to removable drives not protected by BitLocker' is set to 'Enabled' (Trivial)

  • 150979 Compliance: (BL) Ensure 'Deny write access to removable drives not protected by BitLocker: Do not allow write access to devices configured in another organization' is set to 'Enabled: False' (Trivial)

  • 151131 Compliance: (BL) Ensure 'Disable new DMA devices when this computer is locked' is set to 'Enabled' (Trivial)

  • 151089 Compliance: (BL) Ensure 'Enumeration policy for external devices incompatible with Kernel DMA Protection' is set to 'Enabled: Block All' (Trivial)

  • 150918 Compliance: (BL) Ensure 'Interactive logon: Machine account lockout threshold' is set to '10 or fewer invalid logon attempts, but not 0' (Trivial)

  • 151015 Compliance: (BL) Ensure 'Prevent installation of devices that match any of these device IDs' is set to 'Enabled' (Trivial)

  • 150920 Compliance: (BL) Ensure 'Prevent installation of devices that match any of these device IDs: Also apply to matching devices that are already installed.' is set to 'True' (checked) (Trivial)

  • 151001 Compliance: (BL) Ensure 'Prevent installation of devices that match any of these device IDs: Prevent installation of devices that match any of these device IDs' is set to 'PCI\CC_0C0A' (Trivial)

  • 150999 Compliance: (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes' is set to 'Enabled' (Trivial)

  • 151177 Compliance: (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Also apply to matching devices that are already installed.' is set to 'True' (checked) (Trivial)

  • 151156 Compliance: (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes' (Trivial)

  • 150981 Compliance: (BL) Ensure 'Require additional authentication at startup' is set to 'Enabled' (Trivial)

  • 150878 Compliance: (BL) Ensure 'Require additional authentication at startup: Allow BitLocker without a compatible TPM' is set to 'Enabled: False' (Trivial)

  • 151073 Compliance: (L1) Configure 'Accounts: Rename administrator account' (Trivial)

  • 150895 Compliance: (L1) Configure 'Accounts: Rename guest account' (Trivial)

  • 151072 Compliance: (L1) Configure 'Create symbolic links' (Trivial)

  • 150835 Compliance: (L1) Configure 'Interactive logon: Message text for users attempting to log on' (Trivial)

  • 151122 Compliance: (L1) Configure 'Interactive logon: Message title for users attempting to log on' (Trivial)

  • 151180 Compliance: (L1) Ensure 'Access Credential Manager as a trusted caller' is set to 'No One' (Trivial)

  • 150943 Compliance: (L1) Ensure 'Access this computer from the network' is set to 'Administrators, Remote Desktop Users' (Trivial)

  • 150846 Compliance: (L1) Ensure 'Account lockout duration' is set to '15 or more minute(s)' (Trivial)

  • 151057 Compliance: (L1) Ensure 'Account lockout threshold' is set to '5 or fewer invalid logon attempt(s), but not 0' (Trivial)

  • 151108 Compliance: (L1) Ensure 'Accounts: Administrator account status' is set to 'Disabled' (Trivial)

  • 150934 Compliance: (L1) Ensure 'Accounts: Block Microsoft accounts' is set to 'Users can't add or log on with Microsoft accounts' (Trivial)

  • 151097 Compliance: (L1) Ensure 'Accounts: Guest account status' is set to 'Disabled' (Trivial)

  • 150844 Compliance: (L1) Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled' (Trivial)

  • 151190 Compliance: (L1) Ensure 'Act as part of the operating system' is set to 'No One' (Trivial)

  • 150828 Compliance: (L1) Ensure 'Adjust memory quotas for a process' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE' (Trivial)

  • 150821 Compliance: (L1) Ensure 'Allow Basic authentication' is set to 'Disabled' (Trivial)

  • 150822 Compliance: (L1) Ensure 'Allow Basic authentication' is set to 'Disabled' (Trivial)

  • 150870 Compliance: (L1) Ensure 'Allow clipboard sharing with Windows Sandbox' is set to 'Disabled' (Trivial)

  • 150866 Compliance: (L1) Ensure 'Allow Cortana above lock screen' is set to 'Disabled' (Trivial)

  • 150886 Compliance: (L1) Ensure 'Allow Cortana' is set to 'Disabled' (Trivial)

  • 151157 Compliance: (L1) Ensure 'Allow Diagnostic Data' is set to 'Enabled: Diagnostic data off (not recommended)' or 'Enabled: Send required diagnostic data' (Trivial)

  • 150826 Compliance: (L1) Ensure 'Allow indexing of encrypted files' is set to 'Disabled' (Trivial)

  • 151032 Compliance: (L1) Ensure 'Allow log on locally' is set to 'Administrators, Users' (Trivial)

  • 150819 Compliance: (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' (Trivial)

  • 151109 Compliance: (L1) Ensure 'Allow Microsoft accounts to be optional' is set to 'Enabled' (Trivial)

  • 151061 Compliance: (L1) Ensure 'Allow network connectivity during connected-standby (on battery)' is set to 'Disabled' (Trivial)

  • 151165 Compliance: (L1) Ensure 'Allow network connectivity during connected-standby (plugged in)' is set to 'Disabled' (Trivial)

  • 150862 Compliance: (L1) Ensure 'Allow networking in Windows Sandbox' is set to 'Disabled' (Trivial)

  • 151152 Compliance: (L1) Ensure 'Allow Print Spooler to accept client connections' is set to 'Disabled' (Trivial)

  • 151103 Compliance: (L1) Ensure 'Allow search and Cortana to use location' is set to 'Disabled' (Trivial)

  • 150884 Compliance: (L1) Ensure 'Allow unencrypted traffic' is set to 'Disabled' (Trivial)

  • 151115 Compliance: (L1) Ensure 'Allow unencrypted traffic' is set to 'Disabled' (Trivial)

  • 150843 Compliance: (L1) Ensure 'Allow user control over installs' is set to 'Disabled' (Trivial)

  • 151188 Compliance: (L1) Ensure 'Allow users to enable online speech recognition services' is set to 'Disabled' (Trivial)

  • 150942 Compliance: (L1) Ensure 'Allow widgets' is set to 'Disabled' (Trivial)

  • 151078 Compliance: (L1) Ensure 'Allow Windows Ink Workspace' is set to 'Enabled: On, but disallow access above lock' OR 'Disabled' but not 'Enabled: On' (Trivial)

  • 151116 Compliance: (L1) Ensure 'Allow Windows to automatically connect to suggested open hotspots, to networks shared by contacts, and to hotspots offering paid services' is set to 'Disabled' (Trivial)

  • 150949 Compliance: (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled' (Trivial)

  • 151183 Compliance: (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled' (Trivial)

  • 151198 Compliance: (L1) Ensure 'Always prompt for password upon connection' is set to 'Enabled' (Trivial)

  • 150858 Compliance: (L1) Ensure 'Application: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' (Trivial)

  • 150937 Compliance: (L1) Ensure 'Application: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater' (Trivial)

  • 150997 Compliance: (L1) Ensure 'Apply UAC restrictions to local accounts on network logons' is set to 'Enabled' (Trivial)

  • 151143 Compliance: (L1) Ensure 'Audit Account Lockout' is set to include 'Failure' (Trivial)

  • 151209 Compliance: (L1) Ensure 'Audit Application Group Management' is set to 'Success and Failure' (Trivial)

  • 151201 Compliance: (L1) Ensure 'Audit Audit Policy Change' is set to include 'Success' (Trivial)

  • 151203 Compliance: (L1) Ensure 'Audit Authentication Policy Change' is set to include 'Success' (Trivial)

  • 150825 Compliance: (L1) Ensure 'Audit Authorization Policy Change' is set to include 'Success' (Trivial)

  • 151223 Compliance: (L1) Ensure 'Audit Credential Validation' is set to 'Success and Failure' (Trivial)

  • 150990 Compliance: (L1) Ensure 'Audit Detailed File Share' is set to include 'Failure' (Trivial)

  • 151037 Compliance: (L1) Ensure 'Audit File Share' is set to 'Success and Failure' (Trivial)

  • 151178 Compliance: (L1) Ensure 'Audit Group Membership' is set to include 'Success' (Trivial)

  • 151021 Compliance: (L1) Ensure 'Audit IPsec Driver' is set to 'Success and Failure' (Trivial)

  • 150894 Compliance: (L1) Ensure 'Audit Logoff' is set to include 'Success' (Trivial)

  • 151208 Compliance: (L1) Ensure 'Audit Logon' is set to 'Success and Failure' (Trivial)

  • 151185 Compliance: (L1) Ensure 'Audit MPSSVC Rule-Level Policy Change' is set to 'Success and Failure' (Trivial)

  • 150882 Compliance: (L1) Ensure 'Audit Other Logon/Logoff Events' is set to 'Success and Failure' (Trivial)

  • 151071 Compliance: (L1) Ensure 'Audit Other Object Access Events' is set to 'Success and Failure' (Trivial)

  • 150836 Compliance: (L1) Ensure 'Audit Other Policy Change Events' is set to include 'Failure' (Trivial)

  • 151005 Compliance: (L1) Ensure 'Audit Other System Events' is set to 'Success and Failure' (Trivial)

  • 151147 Compliance: (L1) Ensure 'Audit PNP Activity' is set to include 'Success' (Trivial)

  • 151172 Compliance: (L1) Ensure 'Audit Process Creation' is set to include 'Success' (Trivial)

  • 150963 Compliance: (L1) Ensure 'Audit Removable Storage' is set to 'Success and Failure' (Trivial)

  • 151196 Compliance: (L1) Ensure 'Audit Security Group Management' is set to include 'Success' (Trivial)

  • 151083 Compliance: (L1) Ensure 'Audit Security State Change' is set to include 'Success' (Trivial)

  • 150930 Compliance: (L1) Ensure 'Audit Security System Extension' is set to include 'Success' (Trivial)

  • 151014 Compliance: (L1) Ensure 'Audit Sensitive Privilege Use' is set to 'Success and Failure' (Trivial)

  • 151119 Compliance: (L1) Ensure 'Audit Special Logon' is set to include 'Success' (Trivial)

  • 151074 Compliance: (L1) Ensure 'Audit System Integrity' is set to 'Success and Failure' (Trivial)

  • 150863 Compliance: (L1) Ensure 'Audit User Account Management' is set to 'Success and Failure' (Trivial)

  • 150916 Compliance: (L1) Ensure 'Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings' is set to 'Enabled' (Trivial)

  • 151160 Compliance: (L1) Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled' (Trivial)

  • 150925 Compliance: (L1) Ensure 'Back up files and directories' is set to 'Administrators' (Trivial)

  • 151110 Compliance: (L1) Ensure 'Block all consumer Microsoft account user authentication' is set to 'Enabled' (Trivial)

  • 151034 Compliance: (L1) Ensure 'Block user from showing account details on sign-in' is set to 'Enabled' (Trivial)

  • 151126 Compliance: (L1) Ensure 'Boot-Start Driver Initialization Policy' is set to 'Enabled: Good, unknown and bad but critical' (Trivial)

  • 150877 Compliance: (L1) Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE' (Trivial)

  • 150829 Compliance: (L1) Ensure 'Change the time zone' is set to 'Administrators, LOCAL SERVICE, Users' (Trivial)

  • 151075 Compliance: (L1) Ensure 'Computer Browser (Browser)' is set to 'Disabled' or 'Not Installed' (Trivial)

  • 150851 Compliance: (L1) Ensure 'Configure Attack Surface Reduction rules' is set to 'Enabled' (Trivial)

  • 150932 Compliance: (L1) Ensure 'Configure Attack Surface Reduction rules: Set the state for each ASR rule' is configured (Trivial)

  • 151085 Compliance: (L1) Ensure 'Configure Automatic Updates' is set to 'Enabled' (Trivial)

  • 150900 Compliance: (L1) Ensure 'Configure Automatic Updates: Scheduled install day' is set to '0 - Every day' (Trivial)

  • 151141 Compliance: (L1) Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled: Block' (Trivial)

  • 150970 Compliance: (L1) Ensure 'Configure DNS over HTTPS (DoH) name resolution' is set to 'Enabled: Allow DoH' or higher (Trivial)

  • 151094 Compliance: (L1) Ensure 'Configure enhanced anti-spoofing' is set to 'Enabled' (Trivial)

  • 151086 Compliance: (L1) Ensure 'Configure local setting override for reporting to Microsoft MAPS' is set to 'Disabled' (Trivial)

  • 151003 Compliance: (L1) Ensure 'Configure Offer Remote Assistance' is set to 'Disabled' (Trivial)

  • 151168 Compliance: (L1) Ensure 'Configure registry policy processing: Do not apply during periodic background processing' is set to 'Enabled: FALSE' (Trivial)

  • 151056 Compliance: (L1) Ensure 'Configure registry policy processing: Process even if the Group Policy objects have not changed' is set to 'Enabled: TRUE' (Trivial)

  • 151033 Compliance: (L1) Ensure 'Configure SMB v1 client driver' is set to 'Enabled: Disable driver (recommended)' (Trivial)

  • 151049 Compliance: (L1) Ensure 'Configure SMB v1 server' is set to 'Disabled' (Trivial)

  • 151104 Compliance: (L1) Ensure 'Configure Solicited Remote Assistance' is set to 'Disabled' (Trivial)

  • 151042 Compliance: (L1) Ensure 'Configure Windows Defender SmartScreen' is set to 'Enabled' (Trivial)

  • 151113 Compliance: (L1) Ensure 'Configure Windows Defender SmartScreen' is set to 'Enabled: Warn and prevent bypass' (Trivial)

  • 151228 Compliance: (L1) Ensure 'Configure Windows spotlight on lock screen' is set to Disabled' (Trivial)

  • 151125 Compliance: (L1) Ensure 'Continue experiences on this device' is set to 'Disabled' (Trivial)

  • 150883 Compliance: (L1) Ensure 'Create a pagefile' is set to 'Administrators' (Trivial)

  • 151139 Compliance: (L1) Ensure 'Create a token object' is set to 'No One' (Trivial)

  • 151098 Compliance: (L1) Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' (Trivial)

  • 150961 Compliance: (L1) Ensure 'Create permanent shared objects' is set to 'No One' (Trivial)

  • 150978 Compliance: (L1) Ensure 'Debug programs' is set to 'Administrators' (Trivial)

  • 151148 Compliance: (L1) Ensure 'Deny access to this computer from the network' to include 'Guests, Local account' (Trivial)

  • 150922 Compliance: (L1) Ensure 'Deny log on as a batch job' to include 'Guests' (Trivial)

  • 151200 Compliance: (L1) Ensure 'Deny log on as a service' to include 'Guests' (Trivial)

  • 151215 Compliance: (L1) Ensure 'Deny log on locally' to include 'Guests' (Trivial)

  • 151117 Compliance: (L1) Ensure 'Deny log on through Remote Desktop Services' to include 'Guests, Local account' (Trivial)

  • 151030 Compliance: (L1) Ensure 'Devices: Allowed to format and eject removable media' is set to 'Administrators and Interactive Users' (Trivial)

  • 150958 Compliance: (L1) Ensure 'Disable OneSettings Downloads' is set to 'Enabled' (Trivial)

  • 151063 Compliance: (L1) Ensure 'Disallow Autoplay for non-volume devices' is set to 'Enabled' (Trivial)

  • 150890 Compliance: (L1) Ensure 'Disallow Digest authentication' is set to 'Enabled' (Trivial)

  • 150986 Compliance: (L1) Ensure 'Disallow WinRM from storing RunAs credentials' is set to 'Enabled' (Trivial)

  • 150984 Compliance: (L1) Ensure 'Do not allow drive redirection' is set to 'Enabled' (Trivial)

  • 150926 Compliance: (L1) Ensure 'Do not allow password expiration time longer than required by policy' is set to 'Enabled' (Trivial)

  • 150824 Compliance: (L1) Ensure 'Do not allow passwords to be saved' is set to 'Enabled' (Trivial)

  • 150967 Compliance: (L1) Ensure 'Do not delete temp folders upon exit' is set to 'Disabled' (Trivial)

  • 151120 Compliance: (L1) Ensure 'Do not display network selection UI' is set to 'Enabled' (Trivial)

  • 151095 Compliance: (L1) Ensure 'Do not display the password reveal button' is set to 'Enabled' (Trivial)

  • 151187 Compliance: (L1) Ensure 'Do not enumerate connected users on domain-joined computers' is set to 'Enabled' (Trivial)

  • 151093 Compliance: (L1) Ensure 'Do not preserve zone information in file attachments' is set to 'Disabled' (Trivial)

  • 151008 Compliance: (L1) Ensure 'Do not show feedback notifications' is set to 'Enabled' (Trivial)

  • 150965 Compliance: (L1) Ensure 'Do not suggest third-party content in Windows spotlight' is set to 'Enabled' (Trivial)

  • 151019 Compliance: (L1) Ensure 'Domain member: Digitally encrypt or sign secure channel data (always)' is set to 'Enabled' (Trivial)

  • 151081 Compliance: (L1) Ensure 'Domain member: Digitally encrypt secure channel data (when possible)' is set to 'Enabled' (Trivial)

  • 151043 Compliance: (L1) Ensure 'Domain member: Digitally sign secure channel data (when possible)' is set to 'Enabled' (Trivial)

  • 151155 Compliance: (L1) Ensure 'Domain member: Disable machine account password changes' is set to 'Disabled' (Trivial)

  • 150946 Compliance: (L1) Ensure 'Domain member: Maximum machine account password age' is set to '30 or fewer days, but not 0' (Trivial)

  • 151212 Compliance: (L1) Ensure 'Domain member: Require strong (Windows 2000 or later) session key' is set to 'Enabled' (Trivial)

  • 151038 Compliance: (L1) Ensure 'Download Mode' is NOT set to 'Enabled: Internet' (Trivial)

  • 150892 Compliance: (L1) Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'No One' (Trivial)

  • 150917 Compliance: (L1) Ensure 'Enable insecure guest logons' is set to 'Disabled' (Trivial)

  • 151123 Compliance: (L1) Ensure 'Enable Local Admin Password Management' is set to 'Enabled' (Trivial)

  • 151018 Compliance: (L1) Ensure 'Enable OneSettings Auditing' is set to 'Enabled' (Trivial)

  • 150913 Compliance: (L1) Ensure 'Enable RPC Endpoint Mapper Client Authentication' is set to 'Enabled' (Trivial)

  • 150957 Compliance: (L1) Ensure 'Enable screen saver' is set to 'Enabled' (Trivial)

  • 150968 Compliance: (L1) Ensure 'Enable Structured Exception Handling Overwrite Protection (SEHOP)' is set to 'Enabled' (Trivial)

  • 151092 Compliance: (L1) Ensure 'Enables or disables Windows Game Recording and Broadcasting' is set to 'Disabled' (Trivial)

  • 151210 Compliance: (L1) Ensure 'Encryption Oracle Remediation' is set to 'Enabled: Force Updated Clients' (Trivial)

  • 151194 Compliance: (L1) Ensure 'Enforce password history' is set to '24 or more password(s)' (Trivial)

  • 150951 Compliance: (L1) Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled' (Trivial)

  • 151175 Compliance: (L1) Ensure 'Enumerate local users on domain-joined computers' is set to 'Disabled' (Trivial)

  • 150911 Compliance: (L1) Ensure 'Force shutdown from a remote system' is set to 'Administrators' (Trivial)

  • 151144 Compliance: (L1) Ensure 'Generate security audits' is set to 'LOCAL SERVICE, NETWORK SERVICE' (Trivial)

  • 150854 Compliance: (L1) Ensure 'Hardened UNC Paths' is set to 'Enabled, with "Require Mutual Authentication" and "Require Integrity" set for all NETLOGON and SYSVOL shares' (Trivial)

  • 150945 Compliance: (L1) Ensure 'IIS Admin Service (IISADMIN)' is set to 'Disabled' or 'Not Installed' (Trivial)

  • 150865 Compliance: (L1) Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' (Trivial)

  • 150901 Compliance: (L1) Ensure 'Include command line in process creation events' is set to 'Enabled' (Trivial)

  • 151149 Compliance: (L1) Ensure 'Increase scheduling priority' is set to 'Administrators, Window Manager\ Window Manager Group' (Trivial)

  • 151189 Compliance: (L1) Ensure 'Infrared monitor service (irmon)' is set to 'Disabled' or 'Not Installed' (Trivial)

  • 150902 Compliance: (L1) Ensure 'Interactive logon: Do not require CTRL+ALT+DEL' is set to 'Disabled' (Trivial)

  • 151174 Compliance: (L1) Ensure 'Interactive logon: Don't display last signed-in' is set to 'Enabled' (Trivial) 151066 Compliance: (L1) Ensure 'Interactive logon: Machine inactivity limit' is set to '900 or fewer second(s), but not 0' (Trivial)

  • 150956 Compliance: (L1) Ensure 'Interactive logon: Prompt user to change password before expiration' is set to 'between 5 and 14 days' (Trivial)

  • 150881 Compliance: (L1) Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or higher (Trivial)

  • 151087 Compliance: (L1) Ensure 'Internet Connection Sharing (ICS) (SharedAccess)' is set to 'Disabled' (Trivial)

  • 150912 Compliance: (L1) Ensure 'Let Windows apps activate with voice while the system is locked' is set to 'Enabled: Force Deny' (Trivial)

  • 151161 Compliance: (L1) Ensure 'Limit Diagnostic Log Collection' is set to 'Enabled' (Trivial)

  • 150995 Compliance: (L1) Ensure 'Limit Dump Collection' is set to 'Enabled' (Trivial)

  • 151059 Compliance: (L1) Ensure 'Limits print driver installation to Administrators' is set to 'Enabled' (Trivial)

  • 150976 Compliance: (L1) Ensure 'Load and unload device drivers' is set to 'Administrators' (Trivial)

  • 151170 Compliance: (L1) Ensure 'Lock pages in memory' is set to 'No One' (Trivial)

  • 150845 Compliance: (L1) Ensure 'LxssManager (LxssManager)' is set to 'Disabled' or 'Not Installed' (Trivial)

  • 150857 Compliance: (L1) Ensure 'Manage auditing and security log' is set to 'Administrators' (Trivial)

  • 151084 Compliance: (L1) Ensure 'Manage preview builds' is set to 'Disabled' (Trivial)

  • 151044 Compliance: (L1) Ensure 'Maximum password age' is set to '365 or fewer days, but not 0' (Trivial)

  • 150903 Compliance: (L1) Ensure 'Microsoft FTP Service (FTPSVC)' is set to 'Disabled' or 'Not Installed' (Trivial)

  • 150954 Compliance: (L1) Ensure 'Microsoft network client: Digitally sign communications (always)' is set to 'Enabled' (Trivial)

  • 151130 Compliance: (L1) Ensure 'Microsoft network client: Digitally sign communications (if server agrees)'is set to 'Enabled' (Trivial)

  • 150974 Compliance: (L1) Ensure 'Microsoft network client: Send unencrypted password to third-party SMB servers' is set to 'Disabled' (Trivial)

  • 151029 Compliance: (L1) Ensure 'Microsoft network server: Amount of idle time required before suspending session' is set to '15 or fewer minute(s)' (Trivial)

  • 151091 Compliance: (L1) Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled' (Trivial)

  • 151039 Compliance: (L1) Ensure 'Microsoft network server: Digitally sign communications (if client agrees)' is set to 'Enabled' (Trivial)

  • 151151 Compliance: (L1) Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to 'Enabled' (Trivial)

  • 150940 Compliance: (L1) Ensure 'Microsoft network server: Server SPN target name validation level' is set to 'Accept if provided by client' or higher (Trivial)

  • 151121 Compliance: (L1) Ensure 'Minimize the number of simultaneous connections to the Internet or a Windows Domain' is set to 'Enabled: 3 = Prevent Wi-Fi when on Ethernet' (Trivial)

  • 151176 Compliance: (L1) Ensure 'Minimum password age' is set to '1 or more day(s)' (Trivial)

  • 150904 Compliance: (L1) Ensure 'Minimum password length' is set to '14 or more character(s)' (Trivial)

  • 151060 Compliance: (L1) Ensure 'Modify an object label' is set to 'No One' (Trivial)

  • 151077 Compliance: (L1) Ensure 'Modify firmware environment values' is set to 'Administrators' (Trivial)

  • 151207 Compliance: (L1) Ensure 'MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)' is set to 'Disabled' (Trivial)

  • 151199 Compliance: (L1) Ensure 'MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)' is set to 'Enabled: Highest protection, source routing is completely disabled' (Trivial)

  • 150860 Compliance: (L1) Ensure 'MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing)' is set to 'Enabled: Highest protection, source routing is completely disabled' (Trivial)

  • 150850 Compliance: (L1) Ensure 'MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes' is set to 'Disabled' (Trivial)

  • 150834 Compliance: (L1) Ensure 'MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers' is set to 'Enabled' (Trivial)

  • 151133 Compliance: (L1) Ensure 'MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended)' is set to 'Enabled' (Trivial)

  • 150873 Compliance: (L1) Ensure 'MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended)' is set to 'Enabled: 5 or fewer seconds' (Trivial)

  • 150959 Compliance: (L1) Ensure 'MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning' is set to 'Enabled: 90% or less' (Trivial)

  • 150874 Compliance: (L1) Ensure 'NetBT NodeType configuration' is set to 'Enabled: P-node (recommended)' (Trivial)

  • 151136 Compliance: (L1) Ensure 'Network access: Allow anonymous SID/Name translation' is set to 'Disabled' (Trivial)

  • 151006 Compliance: (L1) Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' is set to 'Enabled' (Trivial)

  • 150852 Compliance: (L1) Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts'is set to 'Enabled' (Trivial)

  • 151024 Compliance: (L1) Ensure 'Network access: Do not allow storage of passwords and credentials for network authentication' is set to 'Enabled' (Trivial)

  • 150864 Compliance: (L1) Ensure 'Network access: Let Everyone permissions apply to anonymous users' is set to 'Disabled' (Trivial)

  • 151224 Compliance: (L1) Ensure 'Network access: Named Pipes that can be accessed anonymously' is set to 'None' (Trivial)

  • 151067 Compliance: (L1) Ensure 'Network access: Remotely accessible registry paths and sub-paths' is configured (Trivial)

  • 150985 Compliance: (L1) Ensure 'Network access: Remotely accessible registry paths' is configured (Trivial)

  • 151070 Compliance: (L1) Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled' (Trivial)

  • 150923 Compliance: (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' (Trivial)

  • 150830 Compliance: (L1) Ensure 'Network access: Shares that can be accessed anonymously' is set to 'None' (Trivial)

  • 151150 Compliance: (L1) Ensure 'Network access: Sharing and security model for local accounts' is set to 'Classic - local users authenticate as themselves' (Trivial)

  • 150876 Compliance: (L1) Ensure 'Network security: Allow Local System to use computer identity for NTLM' is set to 'Enabled' (Trivial)

  • 151058 Compliance: (L1) Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled' (Trivial)

  • 151204 Compliance: (L1) Ensure 'Network Security: Allow PKU2U authentication requests to this computer to use online identities' is set to 'Disabled' (Trivial)

  • 151191 Compliance: (L1) Ensure 'Network security: Configure encryption types allowed for Kerberos' is set to 'AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryption types' (Trivial)

  • 151052 Compliance: (L1) Ensure 'Network security: Do not store LAN Manager hash value on next password change' is set to 'Enabled' (Trivial)

  • 151227 Compliance: (L1) Ensure 'Network security: LAN Manager authentication level' is set to 'Send NTLMv2 response only. Refuse LM & NTLM' (Trivial)

  • 150842 Compliance: (L1) Ensure 'Network security: LDAP client signing requirements' is set to 'Negotiate signing' or higher (Trivial)

  • 150849 Compliance: (L1) Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) clients' is set to 'Require NTLMv2 session security, Require 128-bit encryption' (Trivial)

  • 151179 Compliance: (L1) Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) servers' is set to 'Require NTLMv2 session security, Require 128-bit encryption' (Trivial)

  • 151090 Compliance: (L1) Ensure 'No auto-restart with logged on users for scheduled automatic updates installations' is set to 'Disabled' (Trivial)

  • 150909 Compliance: (L1) Ensure 'Notify antivirus programs when opening attachments' is set to 'Enabled' (Trivial)

  • 150853 Compliance: (L1) Ensure 'Only display the private store within the Microsoft Store' is set to 'Enabled' (Trivial)

  • 150840 Compliance: (L1) Ensure 'OpenSSH SSH Server (sshd)' is set to 'Disabled' or 'Not Installed' (Trivial)

  • 150929 Compliance: (L1) Ensure 'Password must meet complexity requirements' is set to 'Enabled' (Trivial)

  • 151222 Compliance: (L1) Ensure 'Password protect the screen saver' is set to 'Enabled' (Trivial)

  • 150896 Compliance: (L1) Ensure 'Password Settings: Password Age (Days)' is set to 'Enabled: 30 or fewer' (Trivial)

  • 151013 Compliance: (L1) Ensure 'Password Settings: Password Complexity' is set to 'Enabled: Large letters + small letters + numbers + special characters' (Trivial)

  • 151135 Compliance: (L1) Ensure 'Password Settings: Password Length' is set to 'Enabled: 15 or more' (Trivial)

  • 150982 Compliance: (L1) Ensure 'Perform volume maintenance tasks' is set to 'Administrators' (Trivial)

  • 151164 Compliance: (L1) Ensure 'Point and Print Restrictions: When installing drivers for a new connection' is set to 'Enabled: Show warning and elevation prompt' (Trivial)

  • 150880 Compliance: (L1) Ensure 'Point and Print Restrictions: When updating drivers for an existing connection' is set to 'Enabled: Show warning and elevation prompt' (Trivial)

  • 150875 Compliance: (L1) Ensure 'Prevent bypassing Windows Defender SmartScreen prompts for sites' is set to 'Enabled' (Trivial)

  • 151076 Compliance: (L1) Ensure 'Prevent device metadata retrieval from the Internet' is set to 'Enabled' (Trivial)

  • 151192 Compliance: (L1) Ensure 'Prevent downloading of enclosures' is set to 'Enabled' (Trivial)

  • 150953 Compliance: (L1) Ensure 'Prevent enabling lock screen camera' is set to 'Enabled' (Trivial)

  • 151220 Compliance: (L1) Ensure 'Prevent enabling lock screen slide show' is set to 'Enabled' (Trivial)

  • 150924 Compliance: (L1) Ensure 'Prevent non-admin users from installing packaged Windows apps' is set to 'Enabled' (Trivial)

  • 151023 Compliance: (L1) Ensure 'Prevent the computer from joining a homegroup' is set to 'Enabled' (Trivial)

  • 151088 Compliance: (L1) Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled' (Trivial)

  • 150820 Compliance: (L1) Ensure 'Prevent the use of security questions for local accounts' is set to 'Enabled' (Trivial)

  • 150987 Compliance: (L1) Ensure 'Prevent users and apps from accessing dangerous websites' is set to 'Enabled: Block' (Trivial)

  • 150838 Compliance: (L1) Ensure 'Prevent users from modifying settings' is set to 'Enabled' (Trivial)

  • 150847 Compliance: (L1) Ensure 'Prevent users from sharing files within their profile.' is set to 'Enabled' (Trivial)

  • 151128 Compliance: (L1) Ensure 'Profile single process' is set to 'Administrators' (Trivial)

  • 151004 Compliance: (L1) Ensure 'Profile system performance' is set to 'Administrators, NT SERVICE\WdiServiceHost' (Trivial)

  • 151035 Compliance: (L1) Ensure 'Prohibit connection to non-domain networks when connected to domain authenticated network' is set to 'Enabled' (Trivial)

  • 150993 Compliance: (L1) Ensure 'Prohibit installation and configuration of Network Bridge on your DNS domain network' is set to 'Enabled' (Trivial)

  • 150908 Compliance: (L1) Ensure 'Prohibit use of Internet Connection Sharing on your DNS domain network' is set to 'Enabled' (Trivial)

  • 150910 Compliance: (L1) Ensure 'Relax minimum password length limits' is set to 'Enabled' (Trivial)

  • 150973 Compliance: (L1) Ensure 'Remote host allows delegation of non-exportable credentials' is set to 'Enabled' (Trivial)

  • 151012 Compliance: (L1) Ensure 'Remote Procedure Call (RPC) Locator (RpcLocator)' is set to 'Disabled' (Trivial)

  • 151129 Compliance: (L1) Ensure 'Remove access to "Pause updates" feature' is set to 'Enabled' (Trivial)

  • 151225 Compliance: (L1) Ensure 'Replace a process level token' is set to 'LOCAL SERVICE, NETWORK SERVICE' (Trivial)

  • 150856 Compliance: (L1) Ensure 'Require a password when a computer wakes (on battery)' is set to 'Enabled' (Trivial)

  • 151153 Compliance: (L1) Ensure 'Require a password when a computer wakes (plugged in)' is set to 'Enabled' (Trivial)

  • 150832 Compliance: (L1) Ensure 'Require domain users to elevate when setting a network's location' is set to 'Enabled' (Trivial)

  • 150889 Compliance: (L1) Ensure 'Require pin for pairing' is set to 'Enabled: First Time' OR 'Enabled: Always' (Trivial)

  • 151138 Compliance: (L1) Ensure 'Require secure RPC communication' is set to 'Enabled' (Trivial)

  • 150994 Compliance: (L1) Ensure 'Require use of specific security layer for remote (RDP) connections' is set to 'Enabled: SSL' (Trivial)

  • 151068 Compliance: (L1) Ensure 'Require user authentication for remote connections by using Network Level Authentication' is set to 'Enabled' (Trivial)

  • 150887 Compliance: (L1) Ensure 'Reset account lockout counter after' is set to '15 or more minute(s)' (Trivial)

  • 151025 Compliance: (L1) Ensure 'Restore files and directories' is set to 'Administrators' (Trivial)

  • 151216 Compliance: (L1) Ensure 'Restrict Unauthenticated RPC clients' is set to 'Enabled: Authenticated' (Trivial)

  • 150960 Compliance: (L1) Ensure 'Routing and Remote Access (RemoteAccess)' is set to 'Disabled' (Trivial)

  • 151099 Compliance: (L1) Ensure 'Scan all downloaded files and attachments' is set to 'Enabled' (Trivial)

  • 150867 Compliance: (L1) Ensure 'Scan removable drives' is set to 'Enabled' (Trivial)

  • 151051 Compliance: (L1) Ensure 'Screen saver timeout' is set to 'Enabled: 900 seconds or fewer, but not 0' (Trivial)

  • 151173 Compliance: (L1) Ensure 'Security: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' (Trivial)

  • 151055 Compliance: (L1) Ensure 'Security: Specify the maximum log file size (KB)' is set to 'Enabled: 196,608 or greater' (Trivial)

  • 150899 Compliance: (L1) Ensure 'Select when Preview Builds and Feature Updates are received' is set to 'Enabled: 180 or more days' (Trivial)

  • 151127 Compliance: (L1) Ensure 'Select when Quality Updates are received' is set to 'Enabled: 0 days' (Trivial)

  • 150827 Compliance: (L1) Ensure 'Set client connection encryption level' is set to 'Enabled: High Level'(Trivial)

  • 150885 Compliance: (L1) Ensure 'Set the default behavior for AutoRun' is set to 'Enabled: Do not execute any autorun commands' (Trivial)

  • 151062 Compliance: (L1) Ensure 'Setup: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' (Trivial)

  • 151167 Compliance: (L1) Ensure 'Setup: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater' (Trivial)

  • 151171 Compliance: (L1) Ensure 'Shut down the system' is set to 'Administrators, Users' (Trivial)

  • 150950 Compliance: (L1) Ensure 'Sign-in and lock last interactive user automatically after a restart' is set to 'Disabled' (Trivial)

  • 150980 Compliance: (L1) Ensure 'Simple TCP/IP Services (simptcp)' is set to 'Disabled' or 'Not Installed' (Trivial)

  • 151022 Compliance: (L1) Ensure 'Special Administration Console Helper (sacsvr)' is set to 'Disabled' or 'Not Installed' (Trivial)

  • 150952 Compliance: (L1) Ensure 'SSDP Discovery (SSDPSRV)' is set to 'Disabled' (Trivial)

  • 151026 Compliance: (L1) Ensure 'Store passwords using reversible encryption' is set to 'Disabled' (Trivial)

  • 151140 Compliance: (L1) Ensure 'System objects: Require case insensitivity for non-Windows subsystems' is set to 'Enabled' (Trivial)

  • 150996 Compliance: (L1) Ensure 'System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)' is set to 'Enabled' (Trivial)

  • 151118 Compliance: (L1) Ensure 'System: Control Event Log behavior when the log file reaches its maximum size' is set to 'Disabled' (Trivial)

  • 151195 Compliance: (L1) Ensure 'System: Specify the maximum log file size (KB)' is set to 'Enabled: 32,768 or greater' (Trivial)

  • 151145 Compliance: (L1) Ensure 'Take ownership of files or other objects' is set to 'Administrators' (Trivial)

  • 151031 Compliance: (L1) Ensure 'Toggle user control over Insider builds' is set to 'Disabled' (Trivial)

  • 151146 Compliance: (L1) Ensure 'Turn off app notifications on the lock screen' is set to 'Enabled' (Trivial)

  • 150935 Compliance: (L1) Ensure 'Turn off Automatic Download and Install of updates' is set to 'Disabled' (Trivial)

  • 150972 Compliance: (L1) Ensure 'Turn off Autoplay' is set to 'Enabled: All drives' (Trivial)

  • 151102 Compliance: (L1) Ensure 'Turn off background refresh of Group Policy' is set to 'Disabled' (Trivial)

  • 151100 Compliance: (L1) Ensure 'Turn off cloud consumer account state content' is set to 'Enabled' (Trivial)

  • 150919 Compliance: (L1) Ensure 'Turn off Data Execution Prevention for Explorer' is set to 'Disabled' (Trivial)

  • 151000 Compliance: (L1) Ensure 'Turn off downloading of print drivers over HTTP' is set to 'Enabled' (Trivial)

  • 151016 Compliance: (L1) Ensure 'Turn off heap termination on corruption' is set to 'Disabled' (Trivial)

  • 151017 Compliance: (L1) Ensure 'Turn off Internet download for Web publishing and online ordering wizards' is set to 'Enabled' (Trivial)

  • 150915 Compliance: (L1) Ensure 'Turn off Microsoft consumer experiences' is set to 'Enabled' (Trivial)

  • 151163 Compliance: (L1) Ensure 'Turn off Microsoft Defender AntiVirus' is set to 'Disabled' (Trivial)

  • 151205 Compliance: (L1) Ensure 'Turn off multicast name resolution' is set to 'Enabled' (Trivial)

  • 150992 Compliance: (L1) Ensure 'Turn off picture password sign-in' is set to 'Enabled' (Trivial)

  • 151226 Compliance: (L1) Ensure 'Turn off real-time protection' is set to 'Disabled' (Trivial)

  • 150948 Compliance: (L1) Ensure 'Turn off shell protocol protected mode' is set to 'Disabled' (Trivial)

  • 150971 Compliance: (L1) Ensure 'Turn off Spotlight collection on Desktop' is set to 'Enabled' (Trivial)

  • 151036 Compliance: (L1) Ensure 'Turn off the offer to update to the latest version of Windows' is set to 'Enabled' (Trivial)

  • 151047 Compliance: (L1) Ensure 'Turn off toast notifications on the lock screen' is set to 'Enabled' (Trivial)

  • 151158 Compliance: (L1) Ensure 'Turn on behavior monitoring' is set to 'Enabled' (Trivial)

  • 151159 Compliance: (L1) Ensure 'Turn on convenience PIN sign-in' is set to 'Disabled' (Trivial)

  • 151107 Compliance: (L1) Ensure 'Turn on e-mail scanning' is set to 'Enabled' (Trivial)

  • 150871 Compliance: (L1) Ensure 'Turn on PowerShell Script Block Logging' is set to 'Enabled' (Trivial)

  • 150859 Compliance: (L1) Ensure 'Turn on PowerShell Transcription' is set to 'Disabled' (Trivial)

  • 151137 Compliance: (L1) Ensure 'Turn on script scanning' is set to 'Enabled' (Trivial)

  • 150966 Compliance: (L1) Ensure 'UPnP Device Host (upnphost)' is set to 'Disabled' (Trivial)

  • 151182 Compliance: (L1) Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled' (Trivial)

  • 151028 Compliance: (L1) Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop' (Trivial)

  • 150839 Compliance: (L1) Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests' (Trivial)

  • 150855 Compliance: (L1) Ensure 'User Account Control: Detect application installations and prompt for elevation' is set to 'Enabled' (Trivial)

  • 151040 Compliance: (L1) Ensure 'User Account Control: Only elevate UIAccess applications that are installed in secure locations' is set to 'Enabled' (Trivial)

  • 151096 Compliance: (L1) Ensure 'User Account Control: Run all administrators in Admin Approval Mode' is set to 'Enabled' (Trivial)

  • 150818 Compliance: (L1) Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled' (Trivial)

  • 151202 Compliance: (L1) Ensure 'User Account Control: Virtualize file and registry write failures to per-user locations' is set to 'Enabled' (Trivial)

  • 151080 Compliance: (L1) Ensure 'WDigest Authentication' is set to 'Disabled' (Trivial)

  • 151011 Compliance: (L1) Ensure 'Web Management Service (WMSvc)' is set to 'Disabled' or 'Not Installed' (Trivial)

  • 151166 Compliance: (L1) Ensure 'Windows Firewall: Domain: Firewall state' is set to 'On (recommended)' (Trivial)

  • 150931 Compliance: (L1) Ensure 'Windows Firewall: Domain: Inbound connections' is set to 'Block (default)'(Trivial)

  • 150938 Compliance: (L1) Ensure 'Windows Firewall: Domain: Logging: Log dropped packets' is set to 'Yes' (Trivial)

  • 150893 Compliance: (L1) Ensure 'Windows Firewall: Domain: Logging: Log successful connections' is set to 'Yes' (Trivial)

  • 151041 Compliance: (L1) Ensure 'Windows Firewall: Domain: Logging: Name' is set to '%SystemRoot%\ System32\logfiles\firewall\domainfw.log' (Trivial)

  • 150831 Compliance: (L1) Ensure 'Windows Firewall: Domain: Logging: Size limit (KB)' is set to '16,384 KB or greater' (Trivial)

  • 151186 Compliance: (L1) Ensure 'Windows Firewall: Domain: Outbound connections' is set to 'Allow (default)' (Trivial)

  • 150837 Compliance: (L1) Ensure 'Windows Firewall: Domain: Settings: Display a notification' is set to 'No' (Trivial)

  • 150898 Compliance: (L1) Ensure 'Windows Firewall: Private: Firewall state' is set to 'On (recommended)' (Trivial)

  • 151132 Compliance: (L1) Ensure 'Windows Firewall: Private: Inbound connections' is set to 'Block (default)' (Trivial)

  • 151114 Compliance: (L1) Ensure 'Windows Firewall: Private: Logging: Log dropped packets' is set to 'Yes' (Trivial)

  • 151162 Compliance: (L1) Ensure 'Windows Firewall: Private: Logging: Log successful connections' is set to 'Yes' (Trivial)

  • 151054 Compliance: (L1) Ensure 'Windows Firewall: Private: Logging: Name' is set to '%SystemRoot%\ System32\logfiles\firewall\privatefw.log' (Trivial)

  • 151206 Compliance: (L1) Ensure 'Windows Firewall: Private: Logging: Size limit (KB)' is set to '16,384 KB or greater' (Trivial)

  • 150861 Compliance: (L1) Ensure 'Windows Firewall: Private: Outbound connections' is set to 'Allow (default)' (Trivial)

  • 151214 Compliance: (L1) Ensure 'Windows Firewall: Private: Settings: Display a notification' is set to 'No' (Trivial)

  • 151124 Compliance: (L1) Ensure 'Windows Firewall: Public: Firewall state' is set to 'On (recommended)' (Trivial)

  • 150879 Compliance: (L1) Ensure 'Windows Firewall: Public: Inbound connections' is set to 'Block (default)' (Trivial)

  • 151010 Compliance: (L1) Ensure 'Windows Firewall: Public: Logging: Log dropped packets' is set to 'Yes' (Trivial)

  • 150936 Compliance: (L1) Ensure 'Windows Firewall: Public: Logging: Log successful connections' is set to 'Yes' (Trivial)

  • 150897 Compliance: (L1) Ensure 'Windows Firewall: Public: Logging: Name' is set to '%SystemRoot%\ System32\logfiles\firewall\publicfw.log' (Trivial)

  • 150941 Compliance: (L1) Ensure 'Windows Firewall: Public: Logging: Size limit (KB)' is set to '16,384 KB or greater' (Trivial)

  • 151048 Compliance: (L1) Ensure 'Windows Firewall: Public: Outbound connections' is set to 'Allow (default)' (Trivial)

  • 150998 Compliance: (L1) Ensure 'Windows Firewall: Public: Settings: Apply local connection security rules' is set to 'No' (Trivial)

  • 150869 Compliance: (L1) Ensure 'Windows Firewall: Public: Settings: Apply local firewall rules' is set to 'No' (Trivial)

  • 151009 Compliance: (L1) Ensure 'Windows Firewall: Public: Settings: Display a notification' is set to 'No' (Trivial)

  • 151154 Compliance: (L1) Ensure 'Windows Media Player Network Sharing Service (WMPNetworkSvc)' is set to 'Disabled' or 'Not Installed' (Trivial)

  • 150933 Compliance: (L1) Ensure 'Windows Mobile Hotspot Service (icssvc)' is set to 'Disabled' (Trivial)

  • 150955 Compliance: (L1) Ensure 'World Wide Web Publishing Service (W3SVC)' is set to 'Disabled' or 'Not Installed' (Trivial)

  • 150969 Compliance: (L1) Ensure 'Xbox Accessory Management Service (XboxGipSvc)' is set to 'Disabled' (Trivial)

  • 151007 Compliance: (L1) Ensure 'Xbox Live Auth Manager (XblAuthManager)' is set to 'Disabled' (Trivial)

  • 151217 Compliance: (L1) Ensure 'Xbox Live Game Save (XblGameSave)' is set to 'Disabled' (Trivial)

  • 151002 Compliance: (L1) Ensure 'Xbox Live Networking Service (XboxNetApiSvc)' is set to 'Disabled' (Trivial)

  • 150975 Compliance: (L1) Ensure LAPS AdmPwd GPO Extension / CSE is installed (Trivial)

  • 150939 Compliance: (NG) Ensure 'Allow auditing events in Microsoft Defender Application Guard' is set to 'Enabled' (Trivial)

  • 151053 Compliance: (NG) Ensure 'Allow camera and microphone access in Microsoft Defender Application Guard' is set to 'Disabled' (Trivial)

  • 151169 Compliance: (NG) Ensure 'Allow data persistence for Microsoft Defender Application Guard' is set to 'Disabled' (Trivial)

  • 151193 Compliance: (NG) Ensure 'Allow files to download and save to the host operating system from Microsoft Defender Application Guard' is set to 'Disabled' (Trivial)

  • 151211 Compliance: (NG) Ensure 'Configure Microsoft Defender Application Guard clipboard settings: Clipboard behavior setting' is set to 'Enabled: Enable clipboard operation from an isolated session to the host' (Trivial)

  • 150962 Compliance: (NG) Ensure 'Turn on Microsoft Defender Application Guard in Managed Mode' is set to 'Enabled: 1' (Trivial)

  • 150888 Compliance: (NG) Ensure 'Turn On Virtualization Based Security' is set to 'Enabled' (Trivial)

  • 151045 Compliance: (NG) Ensure 'Turn On Virtualization Based Security: Credential Guard Configuration' is set to 'Enabled with UEFI lock' (Trivial)

  • 151197 Compliance: (NG) Ensure 'Turn On Virtualization Based Security: Require UEFI Memory Attributes Table' is set to 'True (checked)' (Trivial)

  • 150989 Compliance: (NG) Ensure 'Turn On Virtualization Based Security: Secure Launch Configuration' is set to 'Enabled' (Trivial)

  • 151065 Compliance: (NG) Ensure 'Turn On Virtualization Based Security: Select Platform Security Level' is set to 'Secure Boot and DMA Protection' (Trivial)

  • 151213 Compliance: (NG) Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock' (Trivial)

  • 151297 Debian Security Advisory: DLA-3265-1 (Medium)

  • 151298 Debian Security Advisory: DLA-3268-1 (Medium)

  • 151293 Debian Security Advisory: DLA-3273-1 (High)

  • 151296 Debian Security Advisory: DLA-3278-1 (Medium)

  • 151294 Debian Security Advisory: DSA-5316-1 (Medium)

  • 151295 Debian Security Advisory: DSA-5323-1 (High)

  • 151285 ELSA-2023-0005: bcel security update (Medium)

  • 151232 ELSA-2023-0016: webkit2gtk3 security update (Medium)

  • 151242 ELSA-2023-0021: webkit2gtk3 security update (Medium)

  • 151269 ELSA-2023-0045: tigervnc security update (Medium)

  • 151246 ELSA-2023-0046: xorg-x11-server security update (Medium)

  • 151260 ELSA-2023-0050: nodejs:14 security, bug fix, and enhancement update (High)

  • 151256 ELSA-2023-0077: .NET 6.0 security, bug fix, and enhancement update (Low)

  • 151247 ELSA-2023-0079: .NET 6.0 security, bug fix, and enhancement update (Low)

  • 151240 ELSA-2023-0087: usbguard security update (Medium)

  • 151234 ELSA-2023-0089: libreoffice security update (Low)

  • 151279 ELSA-2023-0095: libtiff security update (Medium)

  • 151252 ELSA-2023-0096: dbus security update (Low)

  • 151280 ELSA-2023-0099: virt:ol and virt-devel:rhel security and bug fix update (Low)

  • 151231 ELSA-2023-0100: systemd security and bug fix update (Low)

  • 151254 ELSA-2023-0101: kernel security and bug fix update (Medium)

  • 151287 ELSA-2023-0103: expat security update (Low)

  • 151229 ELSA-2023-0110: sqlite security update (Low)

  • 151290 ELSA-2023-0113: postgresql:10 security update (Low)

  • 151288 ELSA-2023-0116: libtasn1 security update (Low)

  • 151292 ELSA-2023-0171: dpdk security update (Medium)

  • 151259 ELSA-2023-0173: libxml2 security update (Low)

  • 151257 ELSA-2023-0192: java-17-openjdk security and bug fix update (Low)

  • 151239 ELSA-2023-0194: java-17-openjdk security and bug fix update (Low)

  • 151251 ELSA-2023-0195: java-11-openjdk security and bug fix update (Low)

  • 151245 ELSA-2023-0200: java-11-openjdk security and bug fix update (Low)

  • 151244 ELSA-2023-0202: java-11-openjdk security and bug fix update (Low)

  • 151272 ELSA-2023-0203: java-1.8.0-openjdk security and bug fix update (Low)

  • 151264 ELSA-2023-0282: sudo security update (Medium)

  • 151281 ELSA-2023-0284: sudo security update (Medium)

  • 151278 ELSA-2023-0285: firefox security update (Medium)

  • 151274 ELSA-2023-0288: firefox security update (Medium)

  • 151243 ELSA-2023-0291: sudo security update (Medium)

  • 151283 ELSA-2023-0296: firefox security update (Medium)

  • 151268 ELSA-2023-0302: libtiff security update (Medium)

  • 151262 ELSA-2023-0303: usbguard security update (Medium)

  • 151284 ELSA-2023-0304: libreoffice security update (Low)

  • 151276 ELSA-2023-0318: postgresql-jdbc security update (Low)

  • 151248 ELSA-2023-0321: nodejs and nodejs-nodemon security, bug fix, and enhancement update (High)

  • 151233 ELSA-2023-0328: go-toolset and golang security and bug fix update (Low)

  • 151261 ELSA-2023-0333: curl security update (Low)

  • 151273 ELSA-2023-0335: dbus security update (Low)

  • 151265 ELSA-2023-0337: expat security update (Low)

  • 151275 ELSA-2023-0338: libxml2 security update (Low)

  • 151271 ELSA-2023-0339: sqlite security update (Low)

  • 151286 ELSA-2023-0340: bash security update (Low)

  • 151235 ELSA-2023-0377: libXpm security update (Medium)

  • 151241 ELSA-2023-0379: libXpm security update (Medium)

  • 151277 ELSA-2023-0383: libXpm security update (Medium)

  • 151291 ELSA-2023-0402: bind security update (Medium)

  • 151237 ELSA-2023-0403: sssd security and bug fix update (Medium)

  • 151258 ELSA-2023-12006: Unbreakable Enterprise kernel-container security update (Medium)

  • 151249 ELSA-2023-12007: Unbreakable Enterprise kernel security update (Medium)

  • 151253 ELSA-2023-12008: Unbreakable Enterprise kernel security update (Medium)

  • 151270 ELSA-2023-12009: Unbreakable Enterprise kernel-container security update (Medium)

  • 151236 ELSA-2023-12011: istio security update (Medium)

  • 151266 ELSA-2023-12012: istio security update (Medium)

  • 151263 ELSA-2023-12013: istio security update (Medium)

  • 151255 ELSA-2023-12014: istio security update (Medium)

  • 151238 ELSA-2023-12017: Unbreakable Enterprise kernel security update (Medium)

  • 151230 ELSA-2023-12018: Unbreakable Enterprise kernel-container security update (Medium)

  • 151282 ELSA-2023-12019: grub2 security update (Medium)

  • 151289 ELSA-2023-12064: ruby:2.5 security update (Medium)

  • 151250 ELSA-2023-12065: qemu security update (Medium)

  • 151267 ELSA-2023-16656: squid security update (Medium)

  • 151420 Foxit PDF Editor: Multiple Vulnerabilities in Version 12.0.2.12465 and Earlier (Low)

  • 151419 Foxit PDF Reader: Multiple Vulnerabilities in Version 12.0.2.12465 and Earlier (Low)

  • 151371 Google Chrome: Multiple Vulnerabilities in Versions Less Than 109.0.5414.119 (High)

  • 151422 Java Critical Patch Update - CPU-JANUARY-2023 (High)

  • 151374 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 107.0.1418.62 (High)

  • 151373 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 108.0.1462.42 (High)

  • 151372 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 108.0.1462.54 (High)

  • 151375 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 109.0.1518.49 (High)

  • 151376 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 109.0.1518.52 (High)

  • 151377 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 109.0.1518.61 (High)

  • 151378 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 109 (High)

  • 151379 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 102.7 (High)

  • 151380 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.7 (High)

  • 151434 Oracle Database Critical Patch Update: January 2023 (High)

  • 151421 Palo Alto PAN-OS Security Advisory: PAN-195571 (High)

  • 151348 RHSA-2023:0077: .NET 6.0 security, bug fix, and enhancement update (Low)

  • 151342 RHSA-2023:0079: .NET 6.0 security, bug fix, and enhancement update (Low)

  • 151311 RHSA-2023:0087: usbguard security update (Low)

  • 151331 RHSA-2023:0089: libreoffice security update (Low)

  • 151301 RHSA-2023:0095: libtiff security update (Low)

  • 151300 RHSA-2023:0096: dbus security update (Low)

  • 151312 RHSA-2023:0099: virt:rhel and virt-devel:rhel security and bug fix update (Low)

  • 151309 RHSA-2023:0100: systemd security and bug fix update (Low)

  • 151344 RHSA-2023:0101: kernel security and bug fix update (Medium)

  • 151333 RHSA-2023:0103: expat security update (Low)

  • 151315 RHSA-2023:0110: sqlite security update (Low)

  • 151351 RHSA-2023:0113: postgresql:10 security update (Low)

  • 151337 RHSA-2023:0114: kernel-rt security and bug fix update (Medium)

  • 151310 RHSA-2023:0116: libtasn1 security update (Low)

  • 151303 RHSA-2023:0123: kpatch-patch security update (Medium)

  • 151316 RHSA-2023:0128: java-1.8.0-ibm security update (Low)

  • 151324 RHSA-2023:0171: dpdk security update (Medium)

  • 151317 RHSA-2023:0173: libxml2 security update (Low)

  • 151335 RHSA-2023:0187: kernel security update (Low)

  • 151346 RHSA-2023:0192: java-17-openjdk security and bug fix update (Low)

  • 151319 RHSA-2023:0194: java-17-openjdk security and bug fix update (Low)

  • 151318 RHSA-2023:0195: java-11-openjdk security and bug fix update (Low)

  • 151334 RHSA-2023:0200: java-11-openjdk security and bug fix update (Low)

  • 151305 RHSA-2023:0202: java-11-openjdk security and bug fix update (Low)

  • 151326 RHSA-2023:0203: java-1.8.0-openjdk security and bug fix update (Low)

  • 151299 RHSA-2023:0282: sudo security update (Medium)

  • 151328 RHSA-2023:0284: sudo security update (Medium)

  • 151355 RHSA-2023:0285: firefox security update (Medium)

  • 151325 RHSA-2023:0287: sudo security update (Medium)

  • 151341 RHSA-2023:0288: firefox security update (Medium)

  • 151322 RHSA-2023:0291: sudo security update (Medium)

  • 151340 RHSA-2023:0296: firefox security update (Medium)

  • 151306 RHSA-2023:0300: kernel-rt security and bug fix update (Medium)

  • 151339 RHSA-2023:0302: libtiff security update (Low)

  • 151320 RHSA-2023:0303: usbguard security update (Low)

  • 151313 RHSA-2023:0304: libreoffice security update (Low)

  • 151302 RHSA-2023:0318: postgresql-jdbc security update (Low)

  • 151307 RHSA-2023:0321: nodejs and nodejs-nodemon security, bug fix, and enhancement update (Low)

  • 151330 RHSA-2023:0328: go-toolset and golang security and bug fix update (Low)

  • 151332 RHSA-2023:0333: curl security update (Low)

  • 151353 RHSA-2023:0334: kernel security and bug fix update (Medium)

  • 151338 RHSA-2023:0335: dbus security update (Low)

  • 151329 RHSA-2023:0336: systemd security update (Low)

  • 151336 RHSA-2023:0337: expat security update (Low)

  • 151327 RHSA-2023:0338: libxml2 security update (Low)

  • 151345 RHSA-2023:0339: sqlite security update (Low)

  • 151350 RHSA-2023:0340: bash security update (Low)

  • 151321 RHSA-2023:0343: libtasn1 security update (Low)

  • 151314 RHSA-2023:0348: kpatch-patch security update (Medium)

  • 151343 RHSA-2023:0377: libXpm security update (Medium)

  • 151347 RHSA-2023:0379: libXpm security update (Medium)

  • 151304 RHSA-2023:0383: libXpm security update (Medium)

  • 151354 RHSA-2023:0399: kernel security and bug fix update (Medium)

  • 151349 RHSA-2023:0400: kernel-rt security and bug fix update (Medium)

  • 151352 RHSA-2023:0402: bind security update (Low)

  • 151308 RHSA-2023:0403: sssd security and bug fix update (Medium)

  • 151323 RHSA-2023:0404: kpatch-patch security update (Medium)

  • 151367 Solaris Security Patch: (148419-04): System security update (Medium)

  • 151368 Solaris Security Patch: (148420-04): System security update (Medium)

  • 151369 Solaris Security Patch: (153264-61): System security update (Medium)

  • 151370 Solaris Security Patch: (153265-61): System security update (Medium)

  • 151433 Visual Studio Code Remote Execution Vulnerablility (High)

  • 151383 wnpa-sec-2022-09: Security Update Available for Wireshark (Low)

  • 151382 wnpa-sec-2022-10: Security Update Available for Wireshark (Low)

  • 151359 [USN-5795-2] Net-SNMP vulnerabilities (Medium)

  • 151356 [USN-5803-1] Linux kernel vulnerabilities (Medium)

  • 151357 [USN-5804-1] Linux kernel vulnerabilities (Medium)

  • 151358 [USN-5805-1] Apache Maven vulnerability (Medium)

  • 151360 [USN-5806-1] Ruby vulnerability (Medium)

  • 151366 [USN-5806-2] Ruby vulnerability (Medium)

  • 151361 [USN-5810-1] Git vulnerabilities (Medium)

  • 151363 [USN-5810-2] Git regression (Medium)

  • 151362 [USN-5811-2] Sudo vulnerability (Medium)

  • 151364 [USN-5816-1] Firefox vulnerabilities (Medium)

  • 151365 [USN-5818-1] PHP vulnerability (Medium)

Fixes

Updated Vulnerability Descriptions:

  • 150812 APSB22-46: Security Updates Available for Adobe Acrobat and Reader (High)

  • 150811 APSB23-01: Security Updates Available for Adobe Acrobat and Reader (High)

  • 150810 APSB23-07: Security Updates Available for Adobe InDesign (High)

  • 144013 Citrix Security Advisory: CTX276688 (Medium)

  • 144015 Citrix Security Advisory: CTX281474 (Medium)

  • 144014 Citrix Security Advisory: CTX289674 (Medium)

  • 145433 Citrix Security Advisory: CTX297155 (High)

  • 145638 Citrix Security Advisory: CTX319135 (High)

  • 148136 Citrix Security Advisory: CTX322787 (Medium)

  • 147208 Citrix Security Advisory: CTX335705 (High)

  • 149333 Citrix Security Advisory: CTX370551 (High)

  • 148912 Citrix Security Advisory: CTX457048 (High)

  • 150792 Foxit PhantomPDF: Multiple Vulnerabilities in Version 10.1.9.37808 and Earlier (Low)

  • 150806 Google Chrome: Multiple Vulnerabilities in Versions Less Than 107.0.5304.122 (High)

  • 150809 Google Chrome: Multiple Vulnerabilities in Versions Less Than 108.0.5359.72 (High)

  • 150808 Google Chrome: Multiple Vulnerabilities in Versions Less Than 108.0.5359.95 (High)

  • 150807 Google Chrome: Multiple Vulnerabilities in Versions Less Than 109.0.5414.74 (High)

  • 100158 Host Detected But Not Present At End Of Scan (Info)

  • 116642 Microsoft Windows Tilde Character File Name Information Disclosure (Low)

  • 150813 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 108 (High)

  • 150814 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 102.6 (High)

  • 150815 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.5.1 (High)

  • 150817 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.6.1 (High)

  • 150816 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.6 (High)

  • 150795 MS23-JAN: Microsoft Exchange Server Security Update (Medium)

  • 150794 MS23-JAN: Microsoft Office Security Update (High)

  • 150796 MS23-JAN: Microsoft Sharepoint Server Security Update (High)

  • 150793 MS23-JAN: Microsoft Windows Security Update (High)

  • 104569 Password Hashes Obtained (Info)

Version 4.13.2

January 20, 2023

Fixes

Updated Vulnerability Descriptions:

  • 148769 Amazon Linux Security Advisory: ALAS-2022-1585 (High)
  • 150797 Apache Tomcat Injection Vulnerability (High)

  • 150812 APSB22-46: Security Updates Available for Adobe Acrobat and Reader (High)

  • 150811 APSB23-01: Security Updates Available for Adobe Acrobat and Reader (High)

  • 150810 APSB23-07: Security Updates Available for Adobe InDesign (High)

  • 150579 Foxit PDF Editor: Multiple Vulnerabilities in Version 12.0.1.12430 and Earlier (Low)

  • 150578 Foxit PDF Reader: Multiple Vulnerabilities in Version 12.0.1.12430 and Earlier (Low)

  • 150792 Foxit PhantomPDF: Multiple Vulnerabilities in Version 10.1.9.37808 and Earlier (Low)

  • 150806 Google Chrome: Multiple Vulnerabilities in Versions Less Than 107.0.5304.122 (High)

  • 150809 Google Chrome: Multiple Vulnerabilities in Versions Less Than 108.0.5359.72 (High)

  • 150808 Google Chrome: Multiple Vulnerabilities in Versions Less Than 108.0.5359.95 (High)

  • 150807 Google Chrome: Multiple Vulnerabilities in Versions Less Than 109.0.5414.74 (High)

  • 118973 Microsoft Internet Explorer End of Life (High)

  • 150813 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 108 (High)

  • 150814 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 102.6 (High)

  • 150815 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.5.1 (High)

  • 150817 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.6.1 (High)

  • 150816 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.6 (High)

  • 150585 MS22-DEC: Microsoft Office Security Update (High)

  • 150587 MS22-DEC: Microsoft Sharepoint Server Security Update (High)

  • 150584 MS22-DEC: Microsoft Windows Security Update (High)

  • 150237 MS22-NOV: Microsoft Exchange Server Security Update (High)

  • 150795 MS23-JAN: Microsoft Exchange Server Security Update (Medium)

  • 150794 MS23-JAN: Microsoft Office Security Update (High)

  • 150796 MS23-JAN: Microsoft Sharepoint Server Security Update (High)

  • 150793 MS23-JAN: Microsoft Windows Security Update (High)

  • 150798 Nginx Denial of Service (DoS) Vulnerability (Medium)

  • 150799 OpenSSL Denial of Service (DoS) Vulnerability (Medium)

  • 150800 ProFTPD Memory Disclosure Vulnerability (High)

  • 150802 Samba Security Advisory December 2022 (Medium)

  • 150801 Samba Security Advisory November 2022 (High)

  • 150592 SAP Internet Communication Framework Open Redirect Vulnerability (Low)

  • 150536 wnpa-sec-2022-07: Security Update Available for Wireshark (Low)

  • 150535 wnpa-sec-2022-08: Security Update Available for Wireshark (Low)

  • 150803 Wordpress Cross-site scripting (XSS) Vulnerability (Medium)

  • 150804 Wordpress Improper Authentication Vulnerability (Medium)

  • 150805 Wordpress Unauthenticated SSRF Vulnerability (Medium)

  • 150583 Zoom Client DLL Injection Vulnerability (High)

Version 4.13.0

January 12, 2023

Enhancements

Updated authenticated scanning checks and network explicit checks listed:

  • 150797 Apache Tomcat Injection Vulnerability (High)
  • 150812 APSB22-46: Security Updates Available for Adobe Acrobat and Reader (High)

  • 150811 APSB23-01: Security Updates Available for Adobe Acrobat and Reader (High)

  • 150810 APSB23-07: Security Updates Available for Adobe InDesign (High)

  • 150771 Citrix Security Advisory: CTX474995 (High)

  • 150621 Debian Security Advisory: DLA-3064-1 (High)

  • 150706 Debian Security Advisory: DLA-3068-1 (Medium)

  • 150595 Debian Security Advisory: DLA-3069-1 (High)

  • 150713 Debian Security Advisory: DLA-3070-1 (Medium)

  • 150670 Debian Security Advisory: DLA-3071-1 (Medium)

  • 150702 Debian Security Advisory: DLA-3072-1 (High)

  • 150690 Debian Security Advisory: DLA-3073-1 (Medium)

  • 150615 Debian Security Advisory: DLA-3075-1 (High)

  • 150721 Debian Security Advisory: DLA-3077-1 (Medium)

  • 150612 Debian Security Advisory: DLA-3080-1 (High)

  • 150727 Debian Security Advisory: DLA-3081-1 (High)

  • 150632 Debian Security Advisory: DLA-3082-1 (High)

  • 150606 Debian Security Advisory: DLA-3087-1 (Medium)

  • 150704 Debian Security Advisory: DLA-3088-1 (Medium)

  • 150653 Debian Security Advisory: DLA-3090-1 (High)

  • 150682 Debian Security Advisory: DLA-3092-1 (Medium)

  • 150768 Debian Security Advisory: DLA-3095-1 (Medium)

  • 150694 Debian Security Advisory: DLA-3096-1 (Medium)

  • 150659 Debian Security Advisory: DLA-3097-1 (High)

  • 150754 Debian Security Advisory: DLA-3098-1 (Medium)

  • 150610 Debian Security Advisory: DLA-3103-1 (High)

  • 150692 Debian Security Advisory: DLA-3105-1 (Medium)

  • 150760 Debian Security Advisory: DLA-3106-1 (Medium)

  • 150618 Debian Security Advisory: DLA-3107-1 (Medium)

  • 150711 Debian Security Advisory: DLA-3110-1 (High)

  • 150677 Debian Security Advisory: DLA-3111-1 (Medium)

  • 150596 Debian Security Advisory: DLA-3115-1 (Medium)

  • 150674 Debian Security Advisory: DLA-3116-1 (Medium)

  • 150718 Debian Security Advisory: DLA-3119-1 (High)

  • 150684 Debian Security Advisory: DLA-3121-1 (High)

  • 150696 Debian Security Advisory: DLA-3123-1 (High)

  • 150703 Debian Security Advisory: DLA-3124-1 (Medium)

  • 150613 Debian Security Advisory: DLA-3128-1 (High)

  • 150714 Debian Security Advisory: DLA-3132-1 (Medium)

  • 150710 Debian Security Advisory: DLA-3133-1 (Medium)

  • 150642 Debian Security Advisory: DLA-3136-1 (High)

  • 150617 Debian Security Advisory: DLA-3138-1 (Medium)

  • 150691 Debian Security Advisory: DLA-3139-1 (Medium)

  • 150601 Debian Security Advisory: DLA-3140-1 (High)

  • 150623 Debian Security Advisory: DLA-3142-1 (Medium)

  • 150636 Debian Security Advisory: DLA-3143-1 (Medium)

  • 150739 Debian Security Advisory: DLA-3146-1 (Medium)

  • 150600 Debian Security Advisory: DLA-3147-1 (Medium)

  • 150716 Debian Security Advisory: DLA-3148-1 (Medium)

  • 150629 Debian Security Advisory: DLA-3151-1 (Medium)

  • 150729 Debian Security Advisory: DLA-3153-1 (Medium)

  • 150733 Debian Security Advisory: DLA-3154-1 (High)

  • 150657 Debian Security Advisory: DLA-3155-1 (Medium)

  • 150626 Debian Security Advisory: DLA-3156-1 (High)

  • 150647 Debian Security Advisory: DLA-3158-1 (Medium)

  • 150687 Debian Security Advisory: DLA-3165-1 (High)

  • 150669 Debian Security Advisory: DLA-3168-1 (High)

  • 150732 Debian Security Advisory: DLA-3169-1 (High)

  • 150683 Debian Security Advisory: DLA-3170-1 (High)

  • 150651 Debian Security Advisory: DLA-3172-1 (Medium)

  • 150640 Debian Security Advisory: DLA-3174-1 (Medium)

  • 150741 Debian Security Advisory: DLA-3175-1 (High)

  • 150707 Debian Security Advisory: DLA-3176-1 (Medium)

  • 150663 Debian Security Advisory: DLA-3179-1 (High)

  • 150765 Debian Security Advisory: DLA-3182-1 (Medium)

  • 150604 Debian Security Advisory: DLA-3186-1 (Medium)

  • 150667 Debian Security Advisory: DLA-3188-1 (High)

  • 150638 Debian Security Advisory: DLA-3191-1 (Medium)

  • 150708 Debian Security Advisory: DLA-3194-1 (High)

  • 150695 Debian Security Advisory: DLA-3197-1 (Medium)

  • 150619 Debian Security Advisory: DLA-3198-1 (Medium)

  • 150673 Debian Security Advisory: DLA-3202-1 (Low)

  • 150676 Debian Security Advisory: DLA-3203-1 (Medium)

  • 150686 Debian Security Advisory: DLA-3204-1 (High)

  • 150751 Debian Security Advisory: DLA-3205-1 (Medium)

  • 150700 Debian Security Advisory: DLA-3206-1 (Medium)

  • 150648 Debian Security Advisory: DLA-3207-1 (Medium)

  • 150767 Debian Security Advisory: DLA-3208-1 (Medium)

  • 150725 Debian Security Advisory: DLA-3210-1 (Medium)

  • 150770 Debian Security Advisory: DLA-3214-1 (Medium)

  • 150609 Debian Security Advisory: DLA-3221-1 (High)

  • 150749 Debian Security Advisory: DLA-3222-1 (Medium)

  • 150769 Debian Security Advisory: DLA-3223-1 (Medium)

  • 150758 Debian Security Advisory: DLA-3224-1 (Medium)

  • 150605 Debian Security Advisory: DLA-3226-1 (High)

  • 150731 Debian Security Advisory: DLA-3227-1 (Medium)

  • 150680 Debian Security Advisory: DLA-3228-1 (High)

  • 150740 Debian Security Advisory: DLA-3229-1 (Low)

  • 150759 Debian Security Advisory: DLA-3230-1 (Medium)

  • 150628 Debian Security Advisory: DLA-3231-1 (High)

  • 150745 Debian Security Advisory: DLA-3232-1 (Medium)

  • 150656 Debian Security Advisory: DLA-3235-1 (Medium)

  • 150625 Debian Security Advisory: DLA-3236-1 (High)

  • 150766 Debian Security Advisory: DLA-3237-1 (Medium)

  • 150756 Debian Security Advisory: DLA-3239-1 (Medium)

  • 150662 Debian Security Advisory: DLA-3240-1 (Medium)

  • 150650 Debian Security Advisory: DLA-3243-1 (Medium)

  • 150734 Debian Security Advisory: DLA-3245-1 (Low)

  • 150724 Debian Security Advisory: DLA-3246-1 (Medium)

  • 150666 Debian Security Advisory: DLA-3247-1 (Medium)

  • 150685 Debian Security Advisory: DLA-3249-1 (High)

  • 150715 Debian Security Advisory: DLA-3252-1 (High)

  • 150722 Debian Security Advisory: DLA-3260-1 (Medium)

  • 150737 Debian Security Advisory: DSA-5172-1 (High)

  • 150654 Debian Security Advisory: DSA-5175-1 (High)

  • 150652 Debian Security Advisory: DSA-5180-1 (High)

  • 150693 Debian Security Advisory: DSA-5181-1 (Low)

  • 150681 Debian Security Advisory: DSA-5182-1 (Medium)

  • 150664 Debian Security Advisory: DSA-5183-1 (Medium)

  • 150658 Debian Security Advisory: DSA-5187-1 (High)

  • 150752 Debian Security Advisory: DSA-5188-1 (Medium)

  • 150643 Debian Security Advisory: DSA-5189-1 (Medium)

  • 150631 Debian Security Advisory: DSA-5192-1 (Medium)

  • 150627 Debian Security Advisory: DSA-5193-1 (High)

  • 150620 Debian Security Advisory: DSA-5194-1 (Medium)

  • 150719 Debian Security Advisory: DSA-5195-1 (Medium)

  • 150599 Debian Security Advisory: DSA-5199-1 (Medium)

  • 150730 Debian Security Advisory: DSA-5200-1 (Medium)

  • 150616 Debian Security Advisory: DSA-5201-1 (High)

  • 150761 Debian Security Advisory: DSA-5203-1 (Medium)

  • 150762 Debian Security Advisory: DSA-5204-1 (High)

  • 150671 Debian Security Advisory: DSA-5205-1 (Medium)

  • 150611 Debian Security Advisory: DSA-5206-1 (Medium)

  • 150743 Debian Security Advisory: DSA-5209-1 (Medium)

  • 150639 Debian Security Advisory: DSA-5210-1 (Medium)

  • 150701 Debian Security Advisory: DSA-5211-1 (Medium)

  • 150668 Debian Security Advisory: DSA-5212-1 (High)

  • 150675 Debian Security Advisory: DSA-5213-1 (High)

  • 150757 Debian Security Advisory: DSA-5215-1 (High)

  • 150644 Debian Security Advisory: DSA-5217-1 (High)

  • 150764 Debian Security Advisory: DSA-5218-1 (High)

  • 150655 Debian Security Advisory: DSA-5219-1 (Medium)

  • 150645 Debian Security Advisory: DSA-5220-1 (Medium)

  • 150698 Debian Security Advisory: DSA-5221-1 (High)

  • 150665 Debian Security Advisory: DSA-5222-1 (Medium)

  • 150688 Debian Security Advisory: DSA-5223-1 (High)

  • 150747 Debian Security Advisory: DSA-5225-1 (Medium)

  • 150679 Debian Security Advisory: DSA-5230-1 (High)

  • 150661 Debian Security Advisory: DSA-5232-1 (High)

  • 150641 Debian Security Advisory: DSA-5233-1 (Medium)

  • 150742 Debian Security Advisory: DSA-5235-1 (Medium)

  • 150709 Debian Security Advisory: DSA-5236-1 (High)

  • 150689 Debian Security Advisory: DSA-5237-1 (High)

  • 150736 Debian Security Advisory: DSA-5238-1 (High)

  • 150748 Debian Security Advisory: DSA-5240-1 (Medium)

  • 150635 Debian Security Advisory: DSA-5241-1 (Medium)

  • 150738 Debian Security Advisory: DSA-5243-1 (Medium)

  • 150744 Debian Security Advisory: DSA-5244-1 (High)

  • 150649 Debian Security Advisory: DSA-5245-1 (High)

  • 150753 Debian Security Advisory: DSA-5247-1 (High)

  • 150660 Debian Security Advisory: DSA-5248-1 (Medium)

  • 150763 Debian Security Advisory: DSA-5249-1 (Medium)

  • 150614 Debian Security Advisory: DSA-5250-1 (Medium)

  • 150726 Debian Security Advisory: DSA-5251-1 (Medium)

  • 150630 Debian Security Advisory: DSA-5252-1 (High)

  • 150624 Debian Security Advisory: DSA-5253-1 (High)

  • 150717 Debian Security Advisory: DSA-5255-1 (Medium)

  • 150728 Debian Security Advisory: DSA-5256-1 (Medium)

  • 150607 Debian Security Advisory: DSA-5257-1 (Medium)

  • 150705 Debian Security Advisory: DSA-5258-1 (Medium)

  • 150597 Debian Security Advisory: DSA-5259-1 (High)

  • 150637 Debian Security Advisory: DSA-5260-1 (High)

  • 150750 Debian Security Advisory: DSA-5261-1 (High)

  • 150608 Debian Security Advisory: DSA-5262-1 (High)

  • 150603 Debian Security Advisory: DSA-5263-1 (High)

  • 150598 Debian Security Advisory: DSA-5264-1 (High)

  • 150746 Debian Security Advisory: DSA-5266-1 (High)

  • 150633 Debian Security Advisory: DSA-5267-1 (High)

  • 150622 Debian Security Advisory: DSA-5269-1 (High)

  • 150699 Debian Security Advisory: DSA-5270-1 (High)

  • 150646 Debian Security Advisory: DSA-5271-1 (Medium)

  • 150723 Debian Security Advisory: DSA-5272-1 (High)

  • 150602 Debian Security Advisory: DSA-5283-1 (Medium)

  • 150697 Debian Security Advisory: DSA-5285-1 (High)

  • 150634 Debian Security Advisory: DSA-5287-1 (Medium)

  • 150678 Debian Security Advisory: DSA-5290-1 (High)

  • 150712 Debian Security Advisory: DSA-5291-1 (Medium)

  • 150735 Debian Security Advisory: DSA-5298-1 (Medium)

  • 150672 Debian Security Advisory: DSA-5299-1 (Medium)

  • 150755 Debian Security Advisory: DSA-5306-1 (High)

  • 150720 Debian Security Advisory: DSA-5310-1 (High)

  • 150792 Foxit PhantomPDF: Multiple Vulnerabilities in Version 10.1.9.37808 and Earlier (Low)

  • 150806 Google Chrome: Multiple Vulnerabilities in Versions Less Than 107.0.5304.122 (High)

  • 150809 Google Chrome: Multiple Vulnerabilities in Versions Less Than 108.0.5359.72 (High)

  • 150808 Google Chrome: Multiple Vulnerabilities in Versions Less Than 108.0.5359.95 (High)

  • 150807 Google Chrome: Multiple Vulnerabilities in Versions Less Than 109.0.5414.74 (High)

  • 150813 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 108 (High)

  • 150814 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 102.6 (High)

  • 150815 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.5.1 (High)

  • 150817 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.6.1 (High)

  • 150816 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.6 (High)

  • 150795 MS23-JAN: Microsoft Exchange Server Security Update (Medium)

  • 150794 MS23-JAN: Microsoft Office Security Update (High)

  • 150796 MS23-JAN: Microsoft Sharepoint Server Security Update (High)

  • 150793 MS23-JAN: Microsoft Windows Security Update (High)

  • 150798 Nginx Denial of Service (DoS) Vulnerability (Medium)

  • 150799 OpenSSL Denial of Service (DoS) Vulnerability (Medium)

  • 150800 ProFTPD Memory Disclosure Vulnerability (High)

  • 150777 RHSA-2022:9058: prometheus-jmx-exporter security update (Medium)

  • 150779 RHSA-2022:9065: firefox security update (Medium)

  • 150782 RHSA-2022:9067: firefox security update (Medium)

  • 150775 RHSA-2022:9072: firefox security update (Medium)

  • 150781 RHSA-2022:9073: nodejs:16 security, bug fix, and enhancement update (Low)

  • 150778 RHSA-2022:9074: thunderbird security update (Medium)

  • 150780 RHSA-2022:9079: thunderbird security update (Medium)

  • 150783 RHSA-2022:9080: thunderbird security update (Medium)

  • 150785 RHSA-2023:0005: bcel security update (Medium)

  • 150774 RHSA-2023:0016: webkit2gtk3 security update (Medium)

  • 150786 RHSA-2023:0021: webkit2gtk3 security update (Medium)

  • 150776 RHSA-2023:0045: tigervnc security update (Medium)

  • 150773 RHSA-2023:0046: xorg-x11-server security update (Medium)

  • 150784 RHSA-2023:0049: grub2 security update (Low)

  • 150772 RHSA-2023:0050: nodejs:14 security, bug fix, and enhancement update (Low)

  • 150802 Samba Security Advisory December 2022 (Medium)

  • 150801 Samba Security Advisory November 2022 (High)

  • 150592 SAP Internet Communication Framework Open Redirect Vulnerability (Low)

  • 150803 Wordpress Cross-site scripting (XSS) Vulnerability (Medium)

  • 150804 Wordpress Improper Authentication Vulnerability (Medium)

  • 150805 Wordpress Unauthenticated SSRF Vulnerability (Medium)

  • 150787 [USN-5782-1] Firefox vulnerabilities (Medium)

  • 150789 [USN-5782-2] Firefox regressions (Medium)

  • 150790 [USN-5782-3] Firefox regressions (Medium)

  • 150788 [USN-5785-1] FreeRADIUS vulnerabilities (Medium)

  • 150791 [USN-5796-2] w3m vulnerability (Medium)

Fixes

Updated Vulnerability Descriptions:

  • 148769 Amazon Linux Security Advisory: ALAS-2022-1585 (High)
  • 150579 Foxit PDF Editor: Multiple Vulnerabilities in Version 12.0.1.12430 and Earlier (Low)

  • 150578 Foxit PDF Reader: Multiple Vulnerabilities in Version 12.0.1.12430 and Earlier (Low)

  • 118973 Microsoft Internet Explorer End of Life (High)

  • 150585 MS22-DEC: Microsoft Office Security Update (High)

  • 150587 MS22-DEC: Microsoft Sharepoint Server Security Update (High)

  • 150584 MS22-DEC: Microsoft Windows Security Update (High)

  • 150237 MS22-NOV: Microsoft Exchange Server Security Update (High)

  • 150536 wnpa-sec-2022-07: Security Update Available for Wireshark (Low)

  • 150535 wnpa-sec-2022-08: Security Update Available for Wireshark (Low)

  • 150583 Zoom Client DLL Injection Vulnerability (High)

Frontline WAS Scanner

Version 2.0.6

January 26, 2023

Enhancements
  • Includes several fixes and enhancements to the scanning engine and existing vulnerability checks.
Fixes
  • Updated Vulnerability Descriptions:
    • 148390 Apache HTTP Server 2.4.53 Security Release (High)
    • 145498 Apache HTTP Server Security Update 2.4.48 (High)

    • 148043 Content Security Policy Missing (Trivial)

    • 145502 Drupal Core Security Advisory: SA-CORE-2021-003 (Medium)

    • 145633 Drupal Core Security Advisory: SA-CORE-2021-004 (Medium)

    • 146102 Drupal Core Security Advisory: SA-CORE-2021-005 (High)

    • 146407 Drupal Core Security Advisory: SA-CORE-2021-006 (Low)

    • 146408 Drupal Core Security Advisory: SA-CORE-2021-007 (Medium)

    • 146409 Drupal Core Security Advisory: SA-CORE-2021-008 (Medium)

    • 146410 Drupal Core Security Advisory: SA-CORE-2021-009 (Medium)

    • 146958 Drupal Core Security Advisory: SA-CORE-2021-010 (Medium)

    • 147294 Drupal Core Security Advisory: SA-CORE-2021-011 (Medium)

    • 147935 Drupal Core Security Advisory: SA-CORE-2022-001 (Medium)

    • 147936 Drupal Core Security Advisory: SA-CORE-2022-002 (Medium)

    • 147937 Drupal Core Security Advisory: SA-CORE-2022-003 (Medium)

    • 147938 Drupal Core Security Advisory: SA-CORE-2022-004 (Medium)

    • 148393 Drupal Security Advisory SA-CORE-2022-005 (Medium)

    • 148394 Drupal Security Advisory SA-CORE-2022-006 (Medium)

    • 148389 HTTP Strict Transport Security (HSTS) Header missing (Trivial)

    • 104152 Insecure Cookie Parameters (Trivial)

    • 148404 Joomla! Core Security Advisory March 2022: Multiple Vulnerabilities in Versions 2.5.0-3.10.6 and 4.0.0-4.1.0 (High)

    • 148405 Joomla! Core Security Advisory March 2022: Multiple Vulnerabilities in Versions 3.7.0-3.10.6 (Medium)

    • 148403 Joomla! Core Security Advisory March 2022: Multiple Vulnerabilities in Versions 4.0.0-4.1.0 (Medium)

    • 123536 jQuery Framework Detected (Info)

    • 117573 JspWebShell Detected (Critical)

    • 116642 Microsoft Windows Tilde Character File Name Information Disclosure (Low)

    • 104022 SSL Certificate: Chain Contains Weak RSA Keys (Trivial)

    • 102095 Wordpress Detected (Info)

Version 2.0.5

January 9, 2023

Enhancements
  • Includes several fixes and enhancements to the scanning engine and existing vulnerability checks.
Fixes
  • Updated Vulnerability Descriptions:
    • 148390 Apache HTTP Server 2.4.53 Security Release (High)
    • 145498 Apache HTTP Server Security Update 2.4.48 (High)

    • 148043 Content Security Policy Missing (Trivial)

    • 145502 Drupal Core Security Advisory: SA-CORE-2021-003 (Medium)

    • 145633 Drupal Core Security Advisory: SA-CORE-2021-004 (Medium)

    • 146102 Drupal Core Security Advisory: SA-CORE-2021-005 (High)

    • 146407 Drupal Core Security Advisory: SA-CORE-2021-006 (Low)

    • 146408 Drupal Core Security Advisory: SA-CORE-2021-007 (Medium)

    • 146409 Drupal Core Security Advisory: SA-CORE-2021-008 (Medium)

    • 146410 Drupal Core Security Advisory: SA-CORE-2021-009 (Medium)

    • 146958 Drupal Core Security Advisory: SA-CORE-2021-010 (Medium)

    • 147294 Drupal Core Security Advisory: SA-CORE-2021-011 (Medium)

    • 147935 Drupal Core Security Advisory: SA-CORE-2022-001 (Medium)

    • 147936 Drupal Core Security Advisory: SA-CORE-2022-002 (Medium)

    • 147937 Drupal Core Security Advisory: SA-CORE-2022-003 (Medium)

    • 147938 Drupal Core Security Advisory: SA-CORE-2022-004 (Medium)

    • 148393 Drupal Security Advisory SA-CORE-2022-005 (Medium)

    • 148394 Drupal Security Advisory SA-CORE-2022-006 (Medium)

    • 148389 HTTP Strict Transport Security (HSTS) Header missing (Trivial)

    • 104152 Insecure Cookie Parameters (Trivial)

    • 148404 Joomla! Core Security Advisory March 2022: Multiple Vulnerabilities in Versions 2.5.0-3.10.6 and 4.0.0-4.1.0 (High)

    • 148405 Joomla! Core Security Advisory March 2022: Multiple Vulnerabilities in Versions 3.7.0-3.10.6 (Medium)

    • 148403 Joomla! Core Security Advisory March 2022: Multiple Vulnerabilities in Versions 4.0.0-4.1.0 (Medium)

    • 123536 jQuery Framework Detected (Info)

    • 117573 JspWebShell Detected (Critical)

    • 104022 SSL Certificate: Chain Contains Weak RSA Keys (Trivial)

    • 102095 Wordpress Detected (Info)

Back to Top

 

Digital Guardian


Agent for Windows

Version: 7.8.5

January, 2023

New Features
  • When DG upgraded to Micro Focus KeyView and Eduction Engine SDKs version 12.12 in DG Agent 7.8.3, some customers using Adaptive Content Inspection (ACI) experienced ACI application performance issues. These issues will be resolved in the next release of the SDKs. To assure expected application performance when using ACI with DG Agent 7.8.5, version 12.9 SDKs will be installed by the Agent 7.8.5 installer. Agent for Windows 7.9.0, with DG Server 8.6.0 or later, extends the Digital Guardian Microsoft Information Protection (MIP) feature by prompting users to apply MIP labels manually to sensitive files when they attempt to transfer the files outside of local fixed storage (for example, to a removable drive or remote network share).

Fixes
  • Log file rotation was not working properly in certain DG Agent releases. DG fixed the log file code to assure that all backup log files (.bak) get updated as expected and contain current log information.

  • Text that was cut or copied from the address bar in Google Chrome or Microsoft Edge could not be pasted into an application. This issue was addressed with changes to the DG Agent code.

  • When DG upgraded to Micro Focus KeyView and Eduction Engine SDKs version 12.12 in DG Agent 7.8.3, some customers using Adaptive Content Inspection (ACI) experienced brief, intermittent application performance issues. To assure expected application performance when using ACI with DG Agent 7.8.5, version 12.9 SDKs will be installed by the Agent 7.8.5 installer.

  • In the following scenario, tag propagation failed after some customers upgraded Microsoft Office 365 to Microsoft 365 Current Channel v2210, build 15726.20202. When using an Office app to open a file that has a permanent DG classification tag, if you cut text from the file and then create a new document, the text you enter on the first line becomes the filename when you save the new document. In this case, after cutting text from a permanently classified file, the user created a new document, entered text after the first line, and tried to use the Save icon to save the new document. A "Save this file" dialog box was shown, and the user entered the requested information and saved the new document. Due to a change in the implementation of the dialog box in the v2210 Office 365 app, however, the DG Agent was unable to perform tag propagation. This issue was addressed with changes to the Agent code.

  • When a Microsoft Outlook email with a file attachment was sent, the DG Agent incorrectly reported a SendMail event. This issue has been addressed. When a web browser was redirected to DG WIP while trying to connect to a server at its IPv6 address, and DG WIP was unable to connect to that address, IPv6 to IPv4 fallback sometimes required that the page be reloaded. In some cases multiple reloads would be required to fully load a website. This issue has been addressed by testing connectivity prior to redirection.

  • A FileRename block rule triggered and blocked a FileRename event when a file was renamed, but failed to do so when a folder was renamed. This was resolved with a change to the Agent that allows blocking of FileRename operations on folders.

  • When a classified file was attached to an Outlook email using drag and drop, and the email was sent, the recipient saved the file attachment. During the save operation, however, the saved file was not updated to include the permanent classification tags that DG embedded into the email as an X-header due to an error in determining the path to the source file. This issue has been addressed.

  • When Microsoft Office files were set to the Chinese language, and a previously classified Word or Excel document was copied and pasted into a new Word or Excel document, and then saved using a provided short-cut path, the classification tags were not propagated to the new document. This happened because the Save operation produced a short-cut path, instead of a full path, in the Chinese language. To resolve this issue, DG added logic to map Chinese short-cut paths to full paths.

  • When users tried to update a file from their BOX application's sync folder to the BOX in a browser, their machines hung, and sometimes required a reboot, due to incompatibility between the DG Agent and the BOX driver. DG Agent code was modified to fix the issue.

  • When a clipboard cut/copy was used to perform a copy operation on the address bar in Microsoft Edge or Google Chrome, a rule to block any paste operation was incorrectly triggered because the Agent did not detect the cut/copy as a copy operation and misreported it as an ADE paste event in the Local Forensic Report. This has been addressed so that when cut/copy is used, and there is only a paste rule, the Agent will not report an event.

  • When a user cut text from a classified file that was opened in the Microsoft Edge browser and then clicked within the body of a web page in the Google Chrome browser, the DG Agent failed to update the Address Bar field. As a result, the ADE Paste event reported an incorrect value for the Source File Path field. This issue has been addressed.

nDLP Appliance

Version: 11.8

January, 2023

New Features
  • This allows appliance to report unique matches from inspection.

  • Appliance supports discovery scan on NFS running with version 4.

  • Appliance supports widows authentication mechanisms while connecting to MS-SQL server.

  • Appliance database has been upgraded to postgresql version 15.

  • Appliance supports new scan known as Inventory scan. It scans the file meta data and is supported on CIFS.

  • Appliance can now support MIP label detection over ICAP.

Fixes
  • OneDrive vault connectivity works successfully in this release.

  • The export of Discovery Incidents Report can be performed as the alignment of rows and column with proper headers is corrected and fixed.

  • The multisyncd service restart crash error is fixed.

  • The NDLP data validating in %issues in rules case is resolved where the partner uses not block rule with 60% below the DLP.

  • Move remediation action to OneDrive vault target feature and "Undo Move" move for OneDrive file feature works successfully.

Back to Top

Document Management (RJS)


Webdocs

Version: 2.1.9

January 9, 2023

New Features
  • Added orphaned document search for administrator users
  • Added ability for Administrators and Route Managers to reassign route documents to other users via the routing interface. Validation will insure the new selection is valid for the route and route step of the given document.
  • Workflow Inbox Redesigned.
  • Added new reporting feature where users can view workflow task status and summary information to the home screen based on group permission access.
  • Added new reporting feature where users can view workflow task status and summary information to the home screen based on group permission access.
  • Added delete button to user defined inboxes.
  • Added user defined inboxes listing.
  • Added default user inbox list that is not modifiable.
  • Added bulk take ownership option to routing inboxes.
  • Added bulk give ownership option to routing inboxes.
  • Added ability to view items in shared inboxes assigned to other users.
  • Added ability to see and take ownership of shared items from the routing inbox.
  • Added counts and limits to routing inbox display.
  • Added ability to reassign document ownership of a document on a route for administrators and route managers.
  • Added user defined sort options to search screen
  • Created new role type of Inbox Designer which controls access to the new Add and Edit Inbox buttons. New role can be added to any group in Webdocs.
  • Added new function to allow users to split a document into 2 from the document viewer in Webdocs.
  • Created new document split feature where a user can select pages to be split into a new document from the document viewer.
  • Added OCR option to Document Details keys for PDFs.
  • Added Transfer Route option to new Work Inbox feature.
Enhancements
  • Added sorting to the Document History tab.
  • Document Viewer now supports Word shape objects.
  • Added error message when user attempts to add a document to the same route.
  • Documents in Routing inbox page which are assigned to other users are now visible to users that share the routing permissions.
  • Added step number to Next Steps dropdown in workflow.
  • Document viewer now supports charts in DOCX files.
  • Added Submit and Next button to routing approval screen, to automatically navigate to the next item for approval.
  • Allow for blank values in REST API searching.
  • Added the owner of the document on a route to the UI for all documents on routes. Previously this was hidden from the current user if it was another user.
  • Added Link to Routing Inbox to route notification email body.
  • Added new Thumbnail Drag event to Document Viewer, to enable save after pages are reordered.
  • Added unique key to workflow document records to improve reporting capabilities.
  • Added user defined inboxes.
  • Added all document information to route step approval screen.
  • Optimized the notes creation process to keep users on a single screen so details can be viewed while adding a note.
  • Added check for note created by so that a user can only edit their own notes.
  • Optimized history tab loading to no longer reload entire page.
  • Optimized versions tab loading to no longer reload entire page.
  • License validation modified to only include active users in the total calculation that determines if the license key is valid.
  • Updated saved search functionality to no longer save every search, users can elect to save searches which will save all criteria.
  • Added entire folder path to Move Folder action on Document Details.
  • Added new default date options to Advanced Search for Last Week, Last Month, Last 3 Months, and Last Year
  • Added dialog to allow users to delete a saved search.
  • Saved Searches updated to save all additional user defined criteria such as document and folder filters and advanced search options.
  • Added Clear button to search page.
  • Added the ability to navigate directly to a specific page in the search results.
  • Added the ability to navigate directly to a specific page in the document list page.
  • Allow users to select more than 1 thumbnail from the document viewer.
  • Added Does Not Contain option to advanced search by title/key feature.
  • Added Is Blank option to advanced search by title/key feature.
  • Added Is Not Blank option to advanced search by title/key feature.
  • Added automatic redirection to search links and edit document links when authentication is required.
  • Updated UI with Fortra branding guidelines.
Fixes
  • Fixed document type drop down on document details page, where changing the document type would force a post back, making it impossible to cancel your changes.
  • Fixed issue where special characters at the beginning of the Title field would not work in the advanced search options.
  • Fixed (removed) whitespace gap below in browser viewer on search page.
  • Fixed issue where show/hide of in-browser viewer could cause document tabs to draw incorrectly.
  • Fixed issue where Page count did not properly update when changing the number of results per page.
  • Fixed issue where some browsers would allow folder list to be too small for accurate display.
  • Fixed the width of the email field on the new contact screen.
  • Fixed issue where really long folder names caused UI to be unusable.
  • Fixed column view button on orphaned documents screen.
  • Fixed issue with font color on add new folder screen, in Edge browser.
  • Fixed issue with direct page navigation in in-browser viewer
  • Added tooltip to warn users of an invalid folder name.
  • Added tooltip to routing inbox ownership buttons.
  • Fixed issue in document inbox where username wasn't always displaying correctly in the next step dropdown.
  • Fixed issues with advanced search and search operators being inconsistent.
  • Fixed issue where after URL search, sorting the search results would cause navigation to disappear.
  • Corrected several typos on the self-registration screen.
  • Fixed issue on document details page where actual root folder name did not display.
  • Fixed issue where self-registration page would not display after a user was deleted from Webdocs.
  • Fixed issue where search list bottom toolbar could sometimes draw offscreen after an error message is displayed.
  • URL searching now uses the same function as UI searching for consistency.
  • Fixed bad margins on document details tabs, which could cause loading icon to occur but not load the tab.
  • Fixed issue where a 0KB file would make the viewer display incorrectly.
  • Fixed issue where list controls could not be seen after deleting documents from the list.
  • Fixed issue where edit note button was visible when user could not edit the note.
  • Fixed drop downs on search page in Firefox.
  • No longer allow user to place a document on the same route twice from the UI.
  • Fixed issue with document viewer toolbar controls causing postback to not save changes to the document details.
  • Updated license model to allow trial keys with unlimited users.
  • User list in system settings now displays a message when the user limit has been reached.
  • Updated jQuery to 3.6.
  • Fixed several issues with the self registration page to provide better feedback to users about account issues such as a duplicate account or invalid password length.
  • Fixed several issues with the change password page to provide better feedback to users about password issues such as invalid password length.
  • Fixed issue with Link feature where background of dialog could be transparent.
  • Fixed issues with self registration page.
  • Fixed issue where Full Text OCR of Rasterized PDF would not index all pages.
  • Fixed issue where user could not create a DocumentType from the REST API.
  • Updated OWIN library to address CVE-2022-29117.
  • Updated Newtonsoft library to address possible DoS vulnerability.
  • Updated the moment.js library to address CVE-2022-31129 and CVE-2022-24785.

Back to Top

 

FileCatalyst


FileCatalyst Direct

Version 3.8.7 - Build 24

January 19, 2023

Updates
  • All - Multiple security fixes.

  • All - Modernized look and feel.

  • Central, Server - Added OAuth support for email authentication.

Fixes
  • All - Various UI fixes.

  • HotFolder - Upgrading HotFolder does not add TLSv1.3 to the config file.

  • HotFolder - "Move to Sent" functionality would delete the HF location, if destination is outside HF.

  • HotFolder - Hotfolder Connect functionality, through Swing Admin, when running as a service.

  • LoadBalancer - LoadBalancer would not properly cycle through sites that were down.

  • LoadBalancer - LoadBalancer sticky sessions were not using the same ID for check site and transfer operations, in Single Client mode.

  • Central - Alarm history was being redundantly generated with no retention limits.

  • Central, HotFolder - Backwards compatibility issue between Central and HotFolder.

Back to Top

 

Powertech


BoKS Manager 8.1 (Version Update)

=======

BoKS Reporting Services

Version 7.2.0.10

January 30, 2023

Fixes
  • H2 database upgraded to version 2.1.214 that fixes the 'Import fails with java.util.ConcurrentModificationException in H2 Database' issue.

BoKS Manager

Version 8.1 (version update)

January 25, 2023

New Features
  • New configuration parameter authentication/always-allow-root-sudo has been added with a default value of true.

    Normally when a user does sudo to another user, a request is sent to servc on a Replica to check if it is allowed. If this parameter is set to true, no request is sent to servc when root does sudo to another user. In cases where local applications frequently do sudo from root to an application account to perform some action, performance can be improved. If root does sudo -i to another user and does not specify full path to the program to run and the program is not in root's PATH, sudo will fail unless this parameter is set to true, as the full program path is needed when checking with servc if the access is allowed. Note: If this parameter is set to true, there is no way to get keystroke log for root doing sudo.

  • Support is added for SuSE 12 s390x (Server Agent only).

  • Support is added for SuSE 15 s390x (Server Agent only).

Fixes
  • Installation of RHEL9.0 native packages in RHEL9.1.

BoKS Manager

>>>>>>> 7bee817ac1de50e6a186476990a793dd5cb9b524
Version 8.1 (version update)

January 12, 2023

New Features
  • Support is added for RedHat 9 on PowerPC LE (Server Agent only).

  • Boksinfo now includes both boks-server and boks-client native package versions when both native packages are installed.

Enhancements
  • Sudo now resolves any symbolic links before authorization.

Fixes
  • Curl library has been upgraded to 7.86.0.

Back to Top