Version 14.14.00 Release Notes

Summary: A high-level overview of the changes/updates included in Ivanti Neurons Version 14.14.00, released on May 10, 2024.

The platform version 14.14.00 update includes the following features and enhancements:

For assistance with using our new features, receiving feature documentation, and/or scheduling training, please contact your Customer Success account manager directly or contact Ivanti support.

Miscellaneous Changes

  • The Host Findings and Application Findings pages now let users group by Finding Article Type and Finding Article Title.
  • The last release introduced a new client setting for the Default Group. This setting has moved from the Client Profile in Client Settings to its own section.
  • The platform no longer requires assets to have all of the properties named in the network precedence settings before ingesting them.
  • If an assessment created by a vulnerability scanner or user contains no assets or findings, the platform will delete the assessment after 15 days. (For vulnerability scanners, this sometimes occurs if the connector fails to ingest any data.)
  • The default delivery channel name for a user’s platform email will now be referred to as “User Account Email” instead of “RiskSense email”.
  • When the user is editing a finding article and tries to leave the page, the dialogue that pops up will no longer show a “Submit” button. Instead the user can submit changes by choosing “Cancel” and closing the dialogue.
  • When the user applies a PoE to a finding or removes it, the platform will update the date filter “Threat Updated On”.
  • In the Finding Details “Finding Articles and References” section, a user with only the restricted versions of the finding article privileges can select the “View the Article” option for an unrestricted article.
  • The “Finding Article Type” filter no longer supports the “None” value. The “Is Present” operator replaces this functionality.

Fixed Issues

  • Users will see more accurate Wiz data in the platform. Fixes in this release address inconsistencies in finding status (open/closed) for container findings, the last ingested on date, and the system type for host assets.
  • Hostnames will now correctly populate for Tenable.io host assets.
  • For several connectors (CrowdStrike Falcon Spotlight, Tenable Security Center, Tenable Vulnerability Management, InsightAppSec, and AWS Inspector), a change in UrBA will prevent a closed finding from re-opening if it is not referenced in later scans.
  • Past due finding counts will now be shown as red in the Findings Due Calendar.
  • Users of the Checkmarx CxSAST and CrowdStrike Falcon Spotlight connectors should see fewer connectors errors.
  • If the user receives an error message when configuring the Synk Code connector, that error message will no longer overlap the controls in the connector configuration form.
  • For custom widgets that show a Group By on a custom CMDB field, click throughs to the list views returned no data if the CMDB data contained comma-separated values. Filtering will now work correctly when the user clicks on one of the widget links.