Trend Micro Deep Security 10.0 Update 12 公開のお知らせ:サポート情報 : トレンドマイクロ

(情報元のブックマーク数

Trend Micro Deep Security 10.0 Update 12 公開のお知らせ

Deep Security 10.0 Update 12 のモジュールを公開いたします。
■ 公開開始日

2018 年 6 月 13 日 (水)

■ 対象モジュール

Deep Security Manager
Deep Security Virtual Appliance
Linux 版 Deep Security Agent
Unix 版 Deep Security Agent
Windows 版 Deep Security Agent
Windows 版 Deep Security Notifier
■ 追加機能/修正内容

追加機能や修正内容は付属の Readme をご覧ください。
※日本語のReadmeは一か月以内を目安に公開いたします。

サポート情報 : トレンドマイクロ

Deep Security Manager 10.0 Update12

2. What's New
========================================================================

   2.1 Enhancements
   =====================================================================
   The following enhancements are included in this release:
   
   Enhancement 1: [DSSEG-2110]
                  The Deep Security Virtual Appliance computer detail
                  page now displays information about the version of the
                  appliance that is deployed.
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

   Enhancement 2: [DSSEG-2262]
                  The versions of Java JRE used in Deep Security Manager
                  have been upgraded to Java 8 u172.
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   

   2.2 Resolved Known Issues
   =====================================================================
   This release resolves the following issues:
   
   Issue 1:       [DSSEG-2305/SEG-28922/00845132]
                  In the Deep Security Manager console, users could not
                  add files in root directory "/" to an exclusion file
                  list.
   
   Solution 1:    This issue is fixed in this release.
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     
   Issue 2:       [DSSEG-2194/SEG-26960]
                  Content in the DPI_Rule_Recommendation_Report was
                  truncated when its length was longer than the field.
   
   Solution 2:    This issue is fixed in this release.
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   
   Issue 3:       [DSSEG-1889]
                  When the regular expression used for an event-based
                  task contained a negation (for example, do not
                  activate a computer name that begins with a particular
                  string), the match results were sometimes not as
                  expected.
   
   Solution 3:    This issue is fixed in this release.
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Deep Security Virtual Appliance 10.0 Update12

2. What's New
========================================================================

   2.1 Enhancements
   =====================================================================
   The following enhancements are included in this release:
   
   Enhancement 1: [DSSEG-2201/SEG-21673]
                  When agentless real-time anti-malware scanning is
                  enabled with the "Enable network directory scan"
                  option set to "Off", the Deep Security Virtual
                  Appliance does not request any network file access
                  events from guest machines.
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   
   Enhancement 2: [DSSEG-2109]
                  The EPSecSDK has been upgraded to 6.4.1 for NSX 6.4.1
                  support.
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   

   2.2 Resolved Known Issues
   =====================================================================
   This release resolves the following issues:
   
   Issue 1:       [DSSEG-2333/SEG-26904]
                  When a security event syslog was forwarded directly
                  from the Deep Security Agent to a syslog server, it
                  contained an incorrect IPv6 address in the dvchost
                  field.
   
   Solution 1:    This issue is fixed in this release.
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   
   Issue 2:       [DSSEG-2304/00853021/SEG-28060]
                  After upgrading Deep Security Agent from version 9.6
                  to 10.0 on a Linux platform, the Component Set version
                  was not updated, which caused the Security Update
                  Status to display "Out-of-Date".
   
   Solution 2:    This issue is fixed in this release.
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   
   Issue 3:       [DSSEG-2248/00822625/SEG-27661]
                  When a user generated firewall rules for Micro Packet
                  Filter scope and a bypass or destination port was set
                  to 65535, the Deep Security Agent configuration would
                  fail to compile.
   
   Solution 3:    This issue is fixed in this release.
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Linux 版 Deep Security Agent / Relay 10.0 Update12

2. What's New
========================================================================

   2.1 Enhancements
   =====================================================================
   The following enhancements are included in this release:
   
   Enhancement 1: [DSSEG-2201/SEG-21673]
                  When agentless real-time anti-malware scanning is
                  enabled with the "Enable network directory scan"
                  option set to "Off", the Deep Security Virtual
                  Appliance does not request any network file access
                  events from guest machines.
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   
   Enhancement 2: [DSSEG-2109]
                  The EPSecSDK has been upgraded to 6.4.1 for NSX 6.4.1
                  support.
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   

   2.2 Resolved Known Issues
   =====================================================================
   This release resolves the following issues:
   
   Issue 1:       [DSSEG-2333/SEG-26904]
                  When a security event syslog was forwarded directly
                  from the Deep Security Agent to a syslog server, it
                  contained an incorrect IPv6 address in the dvchost
                  field.
   
   Solution 1:    This issue is fixed in this release.
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   
   Issue 2:       [DSSEG-2304/00853021/SEG-28060]
                  After upgrading Deep Security Agent from version 9.6
                  to 10.0 on a Linux platform, the Component Set version
                  was not updated, which caused the Security Update
                  Status to display "Out-of-Date".
   
   Solution 2:    This issue is fixed in this release.
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   
   Issue 3:       [DSSEG-2248/00822625/SEG-27661]
                  When a user generated firewall rules for Micro Packet
                  Filter scope and a bypass or destination port was set
                  to 65535, the Deep Security Agent configuration would
                  fail to compile.
   
   Solution 3:    This issue is fixed in this release.
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

UNIX 版 Deep Security Agent 10.0 Update12

2. What's New
========================================================================

   2.1 Enhancements
   =====================================================================
   There are no enhancements in this release.
   

   2.2 Resolved Known Issues
   =====================================================================
   This release resolves the following issues:
   
   Issue 1:       [DSSEG-2333/SEG-26904]
                  When a security event syslog was forwarded directly
                  from the Deep Security Agent to a syslog server, it
                  contained an incorrect IPv6 address in the dvchost
                  field.
   
   Solution 1:    This issue is fixed in this release.
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   
   Issue 2:       [DSSEG-2248/00822625/SEG-27661]
                  When a user generated firewall rules for Micro Packet
                  Filter scope and a bypass or destination port was set
                  to 65535, the Deep Security Agent configuration would
                  fail to compile.
   
   Solution 2:    This issue is fixed in this release.
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Windows 版 Deep Security Agent / Relay / Notifier 10.0 Update12

2. What's New
========================================================================

   2.1 Enhancements
   =====================================================================
   The following enhancement is included in this release:
   
   Enhancement 1: [DSSEG-2242/VRTS-2470/VRTS-2473/VRTS-2469]
                  This release improves protection by adding checks when
                  agent self-protection is enabled.
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   

   2.2 Resolved Known Issues
   =====================================================================
   This release resolves the following issues:
   
   Issue 1:       [DSSEG-2333/SEG-26904]
                  When a security event syslog was forwarded directly
                  from the Deep Security Agent to a syslog server, it
                  contained an incorrect IPv6 address in the dvchost
                  field.
   
   Solution 1:    This issue is fixed in this release.
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   
   Issue 2:       [DSSEG-2248/00822625/SEG-27661]
                  When a user generated firewall rules for Micro Packet
                  Filter scope and a bypass or destination port was set
                  to 65535, the Deep Security Agent configuration would
                  fail to compile.
   
   Solution 2:    This issue is fixed in this release.
                  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   

screenshot