BETA Closed | Release Notes for Endpoint Server Beta 2 - March 19, 2021

Product release information for Endpoint Server v12.2 Beta 2 on March 19, 2021.


Click here to download the beta version of VIPRE Endpoint Server v12.2.   

What's New

Following on the heels of our last major agent update, which brought the DNS Protection engine and new browser plugins, we are now releasing v12.2. This new version significantly expands and improves existing functionality, including:

  • Added browser support for Microsoft Edge based on Chromium (v79 and higher)
  • Post-scan options including, but not limited to, the ability to shut down the computer once scanning has completed
    • For full details on how to use this feature, refer to Related Articles to visit our Beta Program Welcome page.
  • Ability to independently enable/disable WIndows firewall and the VIPRE intrusion detection system (IDS)
  • New version of Advanced Active Protection (AAP) that supports Windows Server
    • For full details on how to enable this, refer to Related Articles to visit our Beta Program Welcome page.
  • Modified Custom Scan Options dialog showing more detail
  • Enhanced security to reduce potential attack entry points
  • Overall improvement of system responsiveness by on-demand scans no longer affecting the Windows File Cache

Most importantly though, we fixed a security weakness relating to the Authenticate with unprotected computers using saved credentials option that could potentially allow an attacker, internal to your network, to leverage the auto-install service within these products to access other sensitive systems and data in your environment. As a result, to prevent a potential attack, Agent Installation and Agent Inquiry now have only manual options for Unprotected Computer Discovery and Installation.


Special Instructions


There are some things to keep in mind when updating the Endpoint Server Console and Agents.

Important 

- It is recommended to create a backup of the VIPRE database prior to updating. Refer to Related Articles for details on how to accomplish this.  

- Database migration can take some time depending on the size of the DB. Canceling the wizard can result in data loss.

- If updating the Endpoint Server console from any version lower than v10.0, you will need to plan for a possible reboot. Updating the VIPRE Endpoint Security console to the newest version will require Microsoft .NET Framework 4.6 to be installed. If .NET Framework 4.6 is not already on your system, the installer may reboot the server to finalize the installation.



Step 1:  Update VIPRE ConsoleStep 2: Update VIPRE Agents



System Requirements

Product or ComponentMinimum Requirement
Management Console (VSS)

OPERATING SYSTEMS

  • Windows Server 2019 (excluding Server Core)
  • Windows Server 2016 (excluding Server Core)
  • Windows Server 2012 (excluding Server Core)
  • Windows Server 2008 SP2 or R2 (excluding Server Core)
  • Windows 10 (32- & 64-bit, all versions)
  • Windows 8.1 (32- & 64-bit)

NOTE: Embedded operating systems are not supported

HARDWARE

  • Dual-core processor or higher
  • 2GB free disk space(up to 20 GB could be required for Endpoint Security versions for caching of patches)
  • 2GB RAM
  • 1024 x 768 monitor resolution

MISCELLANEOUS

  • MDAC 2.6 SP2 or later
  • Microsoft .NET Framework 4.6 (if not already installed, .NET will automatically install during installation)
VIPRE Agent for Windows

OPERATING SYSTEMS

  • Windows Server 2019 (64-bit, excluding Server Core) 
  • Windows Server 2016 (excluding Server Core) 
  • Windows Server 2012 R2 (excluding Server Core) 
  • Windows Server 2008 R2 SP1 (excluding Server Core) 
  • Windows Small Business Server 2011 
  • Windows Small Business Server 2008 †
  • Windows 10 (32- & 64-bit, all versions)
  • Windows 8.1 (64-bit)
  • Windows 7 SP1 (32- & 64-bit)
  • Windows Vista SP2 (32 & 64-bit) †
  • Windows XP (32-bit) †

† Supported for legacy agent only, not available for Cloud


HARDWARE

  • Dual-core processor recommended
  • 2GB free disk space
  • 2GB RAM or better recommended

SUPPORTED WEB BROWSERS FOR HTTPS URL PROTECTION

  • Mozilla Firefox v68 or later
  • Google Chrome v72 or later
  • Microsoft Edge v79 or later

SUPPORTED EMAIL APPLICATIONS

  • Microsoft Outlook 2003+
  • SMTP/POP3 (Thunderbird, IncrediMail, Eudora, etc.)
  • SSL supported in Outlook only
VIPRE Agent for Mac

 OPERATING SYSTEMS

  • macOS Sierra (10.12)
  • OS X El Capitan (10.11)
  • OS X Yosemite (10.10)
  • OS X Mavericks (10.9)
  • OS X Mountain Lion (10.8)
VIPRE Business Mobile Security Agent

OPERATING SYSTEMS

  • Android 4.1 (Jelly Bean) or later
  • iOS 5.1.1 or later


Known Issues and Workarounds

This section lists issues that are known at the time of release. In some cases, these are bugs that we are working to resolve with a subsequent release. Other items may be due to causes outside of our control, such as bugs with other vendors' software. In all cases, we have tried to provide a workaround for you to consider, should you experience an issue.

If you have questions about a specific issue, please provide the issue ID (if applicable) when contacting our Technical Support team.

Bugs Fixed in this Release

  • [VIPREBIS-6878] - User administration is not working
  • [VIPREBIS-7464] - Invalid entries are saved when adding Allowed Websites
  • [VIPREBIS-6245] - SQL database access account is being used to write log files
  • [VIPREBIS-6421] - VIPRE Console can't currently support VDI virtual desktop environments
  • [VIPREBIS-6484] - VDI virtual desktop gets assigned to the default policy
  • [VIPREBIS-7238] - Health Summary Report: Severity of Threats Found reporting all agents regardless of filter
  • [VIPREBIS-7457] - Device Control blocks access to secondary SSD HDD Crucial
  • [VIPREBIS-7562] - Date Range Selector isn't displaying threats detected on the last date of the chosen range
  • [VIPREBIS-7518] - ViprePPLSvc and VipreAAPSvc was not added to Firewall Exceptions in VSS after upgrading to Console version 12.2.0.79
  • [VPBAGENT-6862] - Unable to generate a passphrase
  • [VPBAGENT-6727] - Web exploit detection interfering with Avigilon Control Center v7.4.2.2 Build 105793
  • [VPBAGENT-6361]BSOD due to dnelwf64.sys
  • [VPBAGENT-5596] - Agents stop downloading definitions after a period of time
  • [VPBAGENT-4644] - Machines not booting after installation of VIPRE
  • [VPBAGENT-4419] - Agents failing to upgrade - Error 1603
  • [VPBAGENT-3710] - Wildcards are not accepting when creating advanced firewall rules
  • [VPBAGENT-3654] - System variables do not work when creating application exceptions in Firewall protection
  • [VPBAGENT-6976] BSOD UNEXPECTED_KERNEL_MODE_TRAP(7f)
  • [VPBAGENT-7215] - Web Exploit Detection slowing down backups
  • [VPBAGENT-7348] - Web Exploit Detection interfering with Sierra Desktop App using java v1.8.0_45
  • [VPBAGENT-7123] - IDS Settings box displayed in Agent when Firewall is not user-managed 
  • [VPBAGENT-7126] - Missing engine version when using CSE50
  • [VPBAGENT-7441] - VIPRENIS causing high CPU usage



Known Issues in this Release

Ticket NumberDescriptionWorkaround
VIPREBIS-7629Error when attempting to copy Agent Installation Management Configuration policy page to another policyThere is no workaround at this time
VPBAGENT-7151When Agent is installed via GPO, Agent Upgrader doesn't uninstall completelyThere is no workaround at this time
VPBAGENT-6987
When Agent is installed via GPO, VIPRE Removal Tool doesn't uninstall completely
There is no workaround at this time
VPBAGENT-7351VIPRE's network inspection service (VIPRENIS) may become stuck in a STOP_PENDING state when network protections are disabled Stop the VIPRE agent then restart it

 


Login or Signup to post a comment