This Hotfix resolves the following issue(s):
Performance Enhancement
iES
A blank screen appears after clicking "Assess Impact" on the Advanced Discovery Detections widget.
Solution
This hotfix resolves the issue and properly displays the assessment criteria.
The Trend Micro Deep Discovery Web Inspector product profile cannot be merged successfully because it contains unnecessary ASCII characters.
Solution
This hotfix removes unnecessary ASCII characters from the Deep Discovery Web Inspector product profile to ensure that the profile can be merged successfully.
The number of queried Attach Discovery Detection logs on Log Query differ from the number of forwarded Syslog entries forwarded.
Solution
This hotfix ensures that there is no discrepancy between the number of queried Attach Discovery Detection logs on Log Query and the number of forwarded Syslog entries.
An issue prevents the Syslog Forward function from working under the UDP protocol.
Solution
This hotfix resolves the issue.
A path traversal vulnerability has been found in Apex Central 2019.
Solution
The hotfix resolves the path traversal vulnerability.
The system does not save non-monitored targets in the Data Loss Prevention(TM) (DLP) policy setting if the target contains uppercase characters.
Solution
This hotfix resolves this issue by ensuring that the system saves non-monitored targets in the DLP policy setting even if the target contains uppercase characters.
The intrusion prevention rules are missing on the Apex Central version running on Norway platforms.
Solution
This hotfix resolves this issue by enabling the rule update function to properly support Norway platforms.
An issue prevents the Operation Center from merging custom reporting line circles so it displays random custom reporting line names instead. This issue occurs if the custom reporting lines include an Active Directory user that does not have a manager.
Solution
The hotfix ensures that the custom reporting line displays correctly in this situation.
An issue prevents Apex Central from deploying policies after it is upgraded from Control Manager 6.0.
Solution
The hotfix resolves this issue.
An issue prevents Apex Central from purging Behavior Monitoring Logs.
Solution
The hotfix resolves the issue so that Behavior Monitoring Logs are purged correctly.
An issue triggers false rebuild attack discovery detections every hour, which affects Apex Central performance.
Solution
This hotfix resolves the issue.
The "Database is busy. Please..." error message appears on the "User/Endpoint Directory" page when the SQL server and database use different collation settings.
Solution
This hotfix resolves the error by updating the SQL script to enable it to use the database collation settings instead of the SQL server collation settings.
The Apex Central server times out when the SQL server queries large data sets.
Solution
This hotfix resolves the server timeout issue.
This Hotfix resolves the following issue(s):
The Apex One Vulnerability Protection agent cannot uninstall the Trend Micro Vulnerability Protection (TMVP) agent completely while its driver is being used by the system.
Solution
This hotfix enables Apex One agent to show a "Restart Required" message to complete the uninstallation of TMVP agent and driver.
The wrong date appears in the "Last Update" field on the Attack Discovery and Endpoint Sensor Trusted Pattern widget.
Solution
This hotfix sets the time zone between GMT -1 to GMT -11 to ensure that the correct date appears in the "Last Update" field.
Administrators notice that the policy status may encounter a "Pending: Waiting for Product Agent" message on the Endpoint Sensor for several days when deploying several policy files at the same time.
Solution
This hotfix uses the latest version of the Apex One Server to resolve this issue.
The system cannot successfully install the Application Control server if the SQL server contains a semi-colon (";") in its password.
Solution
This hotfix resolves this issue so that the system can install the Application Control server successfully.
The Application Control agent service is dependent on some Microsoft(TM) Windows(TM) services. If some Windows services are not running, the system does not start the Application Control agent service.
Solution
This hotfix resolves the Application Control agent service dependency issue. After applying this hotfix, the Application Control agent service starts some Windows services automatically as it is starts up.
Agent computers may encounter a performance issue during Windows updates.
Solution
This hotfix updates the agent program to improve its performance during Windows updates.
A potential process communication risk in the security agent exists in the Apex One server.
Solution
This critical patch updates the Apex One server program to remove this vulnerability.
There are no issues for this Hotfix release.
The following enhancements are included in this Hotfix:
Vulnerability Patches
Apex Central has patched Cross Site Scripting (XSS) vulnerabilities.
Performance Enhancement
Apex One (Mac)
This hotfix enhances the performance of Apex One (Mac) as a Service.
Performance Enhancement
Apex One (Mac)
This hotfix improves the startup speed and startup flow of the Apex One Security Agent to help reduce unexpected errors during Security Agent startup.
New Features
Security Agent Uninstallation
Apex One (Mac) provides enhanced password security for Security Agent uninstallation on endpoints when an uninstallation password is required.
New Features
Policy Management Enhancement
Apex One Security Agent policies support inheritance for Predictive Machine Learning settings.
New Features
Enhanced API Integration
Apex Central supports a new API that forwards detection logs in CEF format to SIEM servers.
This hotfix enables Apex Central to sort policy changing domain agents every 10 minutes instead of at 15:15 everyday.
This hotfix adds a new error message containing the workaround for when Single-Sign On (SSO) fails because the browser cookie length limit has been exceeded.
This hotfix enables Apex One as a Service Hybrid mode to support Data Lake integration for Root Cause Analyses.
This hotfix ensures that logforwarder.exe can forward logs to the SIEM server by using SSL/TLS protocol, but does not upload the server certificate.
The following enhancements are included in this Hotfix:
This critical patch updates the program update checking logic on Apex One security agents to help ensure that only authentic program updates are applied.
This critical patch enhances the security of the Server Migration Tool.
The following enhancements are included in this Hotfix:
This hotfix enhances the performance of Apex One (Mac) as a Service.
This hotfix improves the startup speed and startup flow of the Apex One (Mac) Security Agent to help reduce unexpected errors during Security Agent startup.
Security Agent version: 14.0.6850
Security Agent restart: Required
Estimated size of network traffic (in terms of bandwidth) required for deployment:
Security Agent version : 3.5.3310
Security Agent restart requirement : Not required
Estimated size of network traffic (in terms of bandwidth) required for deployment:
64-bit Security Agent hotfix = 122MB
No post-installation steps are required.
NOTE: Trend Micro recommends that you update your scan engine and virus pattern files immediately after installing the product.
Known issues in this release:
The file name of the attached ZIP file for a generated report contains garbled text if the report name contains non-alphanumeric characters.
The attached ZIP file for a generated report cannot be opened of the report name contains Traditional Chinese characters.
If Apex Central as a Service is the Node Apex Central of an on-premises Hub Apex Central server, Apex Central as a Service might not be able to receive Suspicious Object Lists from the on-premises Hub Apex Central.
To resolve this issue, contact your support representative.
Known issues in this release:
Security Agent consoles running build 13.95 display an incorrect policy name. To resolve this issue, upgrade the Security Agent to 14.0. After the Security Agent contacts the server, the policy name displays correctly.
Off-premises and Security Agents in Independent mode cannot update the Certified Safe Software Pattern from external update sources.
Coexist mode Security Agents on endpoints with Windows Defender may experience installation issues or be unable to upload data to the Apex One server due to a file locking issue. To resolve this issue, add Endpoint Sensor (ESEServiceShell.exe and ESClient.exe) in the exclusions list of Windows Defender to prevent the locking issue.
After copying a file to a remote server using a relative path as the source, Apex One is unable to translate the relative path into the full system directory.
The quality of RCA analysis chain image files is reduced when viewing the files using Windows 10 Photo Viewer.
When attempting to start a Historical Investigation from the Attack Discovery Detections widget that includes Registry value name or Registry value data criteria, the Historical Investigation displays an error message if the length of the Registry value name exceeds 260 characters or the Registry value data exceeds 64 characters.
After updating the Attack Discovery Pattern file (tmesadp.ptn) on Security Agents, a database schema error may occur that causes the Endpoint Sensor feature to continuously report the same detections to the server during each synchronization. This causes duplicate records to display on the Apex Central server.
Known issues in this release:
After enabling the Scan Time Machine option for Manual Scan and Scheduled Scan, Apex One (Mac) cannot perform any actions (clean, quarantine, or delete) on detected malware threats due to a permission limitation in Mac OS. Configured scan actions are displayed as unsuccessful in the product logs.
When performing a historical investigation on Apex One (Mac) endpoints, the system replaces a backslash (/) with a colon (:) in file names, preventing users from searching for file names that contain backslashes in investigation results.
To resolve this issue, use a colon (:) to search for the files.