Version 12.01.00 Release Notes
Summary: A high-level overview of the changes/updates included in Ivanti Neurons Version 12.01.00, released on May 27, 2022.
The Ivanti Neurons platform version 12.01.00 update includes the following features and enhancements:
For assistance with using our new features, obtaining feature documentation, and/or scheduling training, please contact your Customer Success account manager directly.
List View Enhancements
System Filter Updates
Multiple updates have been made to the system filters:
-
The new system filter “Patch Tuesday 5-10-2022” has been added to the Hosts, Host Findings, Applications, Application Findings pages, and the Vulnerabilities section of the Vulnerability KB.
-
The “CISA Known Exploited” filter has been updated to match the current CISA Known Exploited Vulnerabilities list on every page.
-
Filters for workflows pending approval or approved workflows have been added to the Host Findings and Application Findings pages.
-
Most filter descriptions have been modified to work on pages with different data types.
-
The word “Open” has been removed from many threat system filters on the Vulnerabilities page.
-
System filters with CVEs as titles have been removed if the initial release of that CVE predates 2021.
-
“RiskSense Verified - RS” has been renamed “Open Manual Exploit” and removed from the Applications page.
UI Improvements for Scanner Specific Fields
If a scanner-specific field consists of a long list of values, the scanner-specific now only shows part of the information within the UI. Within a column, users will see the “+More” message and can access the full list from the Detail pane. A complex field like the “Prisma Cloud Compute Labels”, which consists of an array of key-value pairs, will now be displayed in full within a pop-up accessible within the Detail pane.
Integrations
Expander Integration Enhancements
On the Host Findings page, the field Expander Affected IP Address has been added as a column, an exportable field, and a filter. The system can now capture the port number for a finding and map the port protocol to the Services field on the Host page. Additionally, the Plugin Instance Id in a scan now helps to determine the uniqueness of a host finding.
New Prisma Cloud Scanner Specific Fields
The fields “Prisma Cloud Compute Net Collections” and “Prisma Cloud Compute Net Namespaces” have been added to the Host Findings, Application Findings, Applications, and Hosts pages as columns, exportable fields, and filters.
Dashboards
Executive Dashboard Refresh
The Executive Dashboard has been updated to support common widget settings such as Asset Type and Scoring Metric and to match the style of the SLA and Prioritization dashboards. Widgets are horizontally resizable and can be renamed on custom dashboards. This dashboard also pioneers enhancements to the new style:
-
Most widgets showing both host and application have clickable links to other pages.
-
KPIs at the top are clickable and configurable. You can also switch one KPI to another.
-
The Quick Interactions menu at the top allows you to change the Asset Type and Scoring Metric settings for all widgets at once.
The KB article on the Executive Dashboard has been updated with information on these new features.
Filter Overview
The Executive Dashboard includes a new widget called “Filter Overview”. This widget shows asset and SLA metrics for CVE-based system filters such as “CISA Known Exploited” and “Apache Log4J”. Note that this widget lacks clickable links to other pages if it shows data for all asset types.
End-of-Life (EOL) Announcement
Older widgets that address the same themes as the Executive Dashboard will be turned off in Q3 2022. Use the label “Q3 2022 EOL” in the widget gallery to find these widgets. For more information, visit the End-of-Life (EOL) Communication - Q3 2022 EOL Widgets article.
Fixed Issues
-
Generic upload via the API now requires the import to be finalized and the mapping validated before upload.
-
The Prioritization dashboard now correctly applies a group filter when the user accesses it via the Groups page.
-
When a user configures UrBA settings for a connector, users can enter how long a finding must be absent from scans for UrBA to close it. Users are now clearly notified if the number they entered is outside the expected range of 1-200.
-
Issues with regenerating the token for the Checkmarx connector have been resolved. These issues previously lead to the message “Invalid Checkmarx Credentials/UnAuthorized” being recorded multiple times prior to a successful pull of files.
-
Users can no longer use the “Last X days” filter if they enter invalid dates.
-
Updated the text for the warning icon related to acceptable values for integration cards.
-
The Copy Link feature is disabled on a list view if a Group By is applied.
-
The Scanner Type on the Applications page and Finding Type on the Application Findings page now populate correctly for Netsparker Enterprise scans.
-
Rate limiting errors surfacing from the Fortify on Demand connector have been resolved.
-
Subsequent imports of findings that had been previously manually remediated will now reflect the correct open state.