• Firewall: 4180774 — Device rule configuration using SCP protocol was not functioning in build 12300. Now, this issue is fixed.
  • Firewall: 124197 — Sometimes, SRX marked as unsupported device, if Firewall Analyzer receives unsupported log as the very first record. Now, wait time is added to check more received logs to avoid unparsed error.
  • Firewall: 120221 — Previously, there was no option to view the selected time-period of each dashboard widgets. Now, sub-header details will be shown in each widget with device information along with time-period applied.
  • Firewall: 122695 — System performance and custom dashboard views were missing when logged in for the first time. Now the issue is fixed and the user can view both. Firewall: 122785 — Inventory Interface snapshot traffic conversation report’s last row was not shown properly in UI. Now the issue is fixed and the report loads the data properly.
  • Firewall: 122055 — Graph units option provided in the Inventory LiveReports page was not in proper sequence. This issue is fixed and the units are now shown in proper order like kbps, Mbps, and Gbps.
  • Firewall: 123774 — When the user selects all predefined reports while creating a report profile, received PDF shows all the reports name on the home page without proper alignment. Now, Alert Message added for Report Profile reports selection.
  • Firewall: 122683 — Editing widget “Top N Hosts by Traffic” and selecting Protocol under category makes the widget to show data of protocol-group by traffic. Now, the issue is fixed by showing Protocol-Group instead of Protocol in dashboard widget – edit section.
  • Firewall: 123865 — ‘Live Syslog Viewer’ status shown as ‘undefined’ when we do a continuous refresh. Now the status message handling issue is fixed on the server side to show proper status in the UI for a continuous refresh.
  • Firewall: 124244 — Increased the data dumb volume from base table ‘Firewall Records’ to next level data table for database performance increase.
  • NCM: 4094309 — SSH Vulnerability #1: The SSH server is configured to support Cipher Block Chaining (CBC) encryption, which may allow an attacker to recover plaintext message from the ciphertext. We’ve now fixed this by providing an option to disable the CBC mode encryption using system property.
  • NCM: 4094309 — SSH Vulnerability #2: The remote server is configured to allow MD5 and 96-bit MAC algorithms, both of which are weak algorithms. We have now fixed this by providing the option to disable these algorithms using system property.
  • NCM: 1584237 — Configuration Analysis and Security Audit Reports are now supported for device templates which were not supported in earlier versions.

Signature Image

Build Release

You may be interested in these other recent articles

6 Dec

Last Week’s Best ManageEngine Updates – Part 30

6 December 2023 | Nazim Nadir

ManageEngine is named a strong performer for 2023 in last week updates. There are also new updates to their suite of applications and they have…

Read more
27 Nov

Last Week’s Best ManageEngine Updates – Part 29

27 November 2023 | Nazim Nadir

Exciting news of ManageEngine Linkedin Live webinar has been announced alongside some application updates and the release of a new E-Book. Whether you’re new to…

Read more
30 Oct

Last Week’s Best ManageEngine Updates – Part 28

30 October 2023 | Nazim Nadir

Updates on stability have been made by ManageEngine to enhance your end-user experience with their products. Continue reading to learn which ManageEngine applications gain the…

Read more