Skip to main content

Release 24.9

Customer Advisory

In version 24.9, the Recommendations function is disabled by default. However, customers who require this feature can enable it through the ColorTokens SaaSOps team. This update is part of our initiative to enhance precise, context-specific recommendations, including progressive segmentation.


Platform Updates

Enhanced Support for Port Ranges in Templates

What to Expect:

Templates now allow users to specify port ranges of any size, removing the previous restriction of up to 20 ports. This update significantly enhances configuration flexibility.

Why This Matters:

  • Improved Efficiency: Users can now define broader ranges without multiple individual rules, simplifying firewall management and reducing configuration time.

EULA Acceptance during Xshield Signup

What to Expect:

During the Xshield signup process, users will receive a copy of the End User License Agreement (EULA) upon acceptance.

For existing tenants, the Customer Success team will assist in accepting the EULA on the platform, triggering an automatic email with a copy for records.

Why This Matters:

  • Transparency & Compliance: Ensures users maintain a clear record of the agreements they have accepted.

Support for 'Any' IP in Destination Input for Templates

What to Expect:

Security Admins can now use the “any” option for destination IP input, eliminating the need to specify individual IPs, subnets, or FQDNs for Internet web traffic.

Why This Matters:

  • Enhanced Usability: Simplifies configurations, allowing traffic rules to be defined more efficiently.

User Interface (UI) Enhancements

  • Renaming ‘Policy Criteria’ to ‘Criteria’ within Segments.
  • Auto-Suggested Segment Naming based on defined criteria.
  • Automatic Population of “ANY” in Ports Field for ICMP selections.
  • Separation of “Reports” and “Create Report” Button for better usability.
  • Clear Icons for Input Fields in integration forms for easier reset functionality.

Appliance Updates

Comprehensive Enhancements for Device Vulnerabilities

What to Expect:

Users can now access CVE information for both managed and unmanaged devices, including exploit URLs and Remote Code Execution (RCE) details.

Why This Matters:

  • Improved Vulnerability Management: Provides insights into device risks and asset inventory.

Claroty Integration: OT Vulnerability and Tag Retrieval

What to Expect:

  • Core tags for unmanaged devices.
  • Visibility into OT vulnerabilities via Claroty.

Why This Matters:

  • Better Device Security: Identifies vulnerabilities and allows effective threat mitigation.

User-Segmentation Updates

Policy Simulation for User Group Paths in Visualizer

What to Expect:

Administrators can now simulate User Group paths within the Visualizer. (Note: Deploy and test buttons are not applicable to User Groups.)

Why This Matters:

  • Informed Decision-Making: Allows admins to analyze security configurations without enforcing changes.

Agent Updates

OTP Recovery Mechanism for Isolated Agents

What to Expect:

In case of agent connectivity loss due to firewall misconfigurations, a One-Time Password (OTP) can be used to reset firewall rules and restore platform communication.

Why This Matters:

  • Minimized Downtime: Ensures a controlled, secure recovery without requiring admin privileges.

Resolved Issues

  • Automated Golden Image Updates: Eliminates manual steps for agent management.
  • Accurate CPU Usage Reporting: Fix for CPU spike misrepresentation post-agent upgrade.
  • Secure All Simulate Mode Traffic Denial Issue: Ensures proper enforcement of Progressive Open Ports.
  • OS Details Missing for Slow-Starting Windows Servers: Adjusted ctagent service to delayed start.
  • Incorrect Path Status Display: Improved policy evaluation for inbound and outbound connections.

Known Issues

  • Agent Offline on Linux Servers: Issue caused by zero-content agent files. Workaround: Stop, delete, re-register, and restart the agent.
  • Missing IPs in Named Networks: Filters impact search results. Workaround: Remove filters before selection.
  • Tag-Based Templates Not Updating: Workaround: Delete templates first before removing a Tag-Based Policy (TBP).

Hotfix Updates

  • Attack Surface Status Mislabeling: Addressed ring-fencing update behavior.
  • “Any” Rule Application Issue: Fixed improper matching of TCP Port 22 paths.

For further details or assistance, please contact ColorTokens Support.

`