This Hotfix resolves the following issue(s):
Users do not receive event notifications if the log generation time field is empty.
Solution
This Hotfix ensures that Apex Central can send event notifications successfully when the log generation time field is empty.
Apex Central does not allow the number higher than 255 in the Fully-Qualified Domain Name (FQDN) of the SIEM server.
Solution
This Hotfix enables Apex Central to support the number higher than 255 in the Fully-Qualified Domain Name (FQDN) of the SIEM server.
The "Policy Management" page loads repeatedly after users click the "Endpoints/Products without policies" count on the page.
Solution
The hotfix ensures that the relevant information displays under the scenario described above.
Active Directory (AD) synchronization may fail because the mail column in the database is too small.
Solution
This hotfix makes the necessary adjustments so AD synchronization runs normally.
Active Directory synchronization is unsuccessful if the root domain of domain is unrecognition
Solution
This hotfix resolves the issue.
The "%Hierarchy%" token does not display any information in email notifications.
Solution
This hotfix ensures that the "%Hierarchy%" token displays the required information in email notifications.
After Trend Micro Apex One(TM) (Mac(TM)) registers to Apex Central, the "Product Component Status" field displays "No data to display".
Solution
This hotfix resolves this issue so the correct product component status appears on the Apex Central web console.
An issue prevents the Policy Management screen from displaying properly.
Solution
This hotfix resolves the issue to ensure that the Policy Management screen displays properly.
File paths appear in the wrong format in syslogs.
Solution
This hotfix ensures that file paths appear in the proper syslog format.
Apex Central services stops unexpectedly.
Solution
This hotfix resolves this issue.
The "Local Folder" node on the product tree can be expanded when users create an Active Directory (AD) account with the "DLP_Compliance_Officer" or "DLP_Incident_Reviewer" role.
Solution
This hotfix ensures that the "Local Folder" node is greyed-out under this scenario.
Users do not receive C&C callback outbreak alert notifications.
Solution
This hotfix ensures that users receive C&C callback outbreak alert notifications.
The "Host Name" field in Behavior Monitoring Violations notifications displays the product server host name instead of the endpoint host name.
Solution
This hotfix ensures that the "Host Name" field in Behavior Monitoring Violations notifications displays the endpoint host name.
A high CPU usage issue occurs on the SQL server when purging Web Violations logs.
Solution
This hotfix prevents the high CPU usage issue from occurring in this scenario.
A performance issue causes an "Unable to execute SQL command. The database is busy. Try again after a few minutes." error in the "Historical Investigation" page of the Apex Central web console.
Solution
This hotfix prevents the error by improving the performance of the "Historical Investigation" page.
Users cannot search for targets to deploy policies by "Filter by Criteria" or "Specify Target(s)" in the "Policy Management" page.
Solution
This hotfix ensures that users can search for targets for policy deployment correctly.
The Product Directory page is affected by Cross-Site Scripting (XSS) issues.
Solution
This hotfix resolves the issue.
Accounts in User Roles without a Policy Resource or Response permissions are logged-out of the web console after any of the following widgets are added into the first page of the Dashboard.
Top Violated Application Control Criteria Top Blocked Applications Attack Discovery Detections Top Endpoints Affected by IPS Events Top IPS Events Top IPS Attack Sources Vulnerability Protection
Solution
The hotfix resolves this issue.
This Hotfix resolves the following issue(s):
An Out-Of-Bounds Read vulnerability may cause the agent program to stop unexpectedly.
Solution
This hotfix updates the Apex One agent program to remove the vulnerability.
An issue prevents the Server Migration tool from importing the Trend Micro OfficeScan(TM) XG Service Pack 1 server settings to Apex One as a Service (AOSaaS).
Solution
This hotfix updates the Server Migration tool program to resolve this issue.
Inaccurate date information displays in the "Last Firewall Count Sent" column on the "Agent Management" page of the web console.
Solution
The hotfix updates the Apex One Saas server program to resolve this issue.
The number of outdated agents on the Apex One dashboard is inaccurate because it receives the wrong outdated Antivirus component count. When users click the outdated agent count and navigate to the "Agent Management" page, the agent count on the page will also be inaccurate.
Solution
This hotfix adds a "Scan Method" into the query criteria of the Apex One server checking logic to ensure that the agent counts are correct.
The Security Agent may cause a high memory usage issue on server platforms.
Solution
This hotfix updates the Security Agent program to prevent this memory issue.
This Hotfix resolves the following issue(s):
Known vulnerability issue found in the DebugManager tool.
Solution
This hotfix resolves this issue by redesigning TMDebugManager.app.
The following enhancements are included in this Hotfix:
This hotfix renames the "Host Name" field to "Endpoint" in unmanaged endpoints dataview.
This hotfix expands the IP address columns used in the Data Loss Prevention(TM) (DLP) violation log so that it can support the IPv6 address format.
This hotfix renames the "system restart required" action to "reboot system successfully".
This hotfix adds the new "Endpoint Sensor Activity Filtering Pattern" pattern.
The following enhancements are included in this Hotfix:
This hotfix updates the Server Migration tool program to prevent binary version mismatch issues.
This hotfix enables Apex One to support Security Agent installation on the Microsoft(TM) Windows(TM) 10 May 2020 Update (20H1).
The following enhancements are included in this Hotfix:
This hotfix enhances the performance of Apex One (Mac) as a Service.
Security Agent version: 14.0.8515
Security Agent restart: Required
Estimated size of network traffic (in terms of bandwidth) required for deployment:
Security Agent Version: 3.5.3455
Security Agent Restart Requirement: Not required
Estimated size of network traffic (in terms of bandwidth) required for deployment:
64-bit Security Agent Hotfix = 134.4 MB
Known issues in this release:
When attempting to perform a Root Cause Analysis, the investigated email message may not be located due to synchronization delay with the Cloud App Security server and Office 365.
When attempting to perform a Root Cause Analysis, the investigated email message may be duplicated in the right panel while user clicks the the email message button.
A Root Cause Analysis report may not generate if the selected time range includes future dates.
Known issues in this release:
Security Agent consoles running build 13.95 display an incorrect policy name. To resolve this issue, upgrade the Security Agent to 14.0. After the Security Agent contacts the server, the policy name displays correctly.
Off-premises and Security Agents in Independent mode cannot update the Certified Safe Software Pattern from external update sources.
Coexist mode Security Agents on endpoints with Windows Defender may experience installation issues or be unable to upload data to the Apex One server due to a file locking issue. To resolve this issue, add Endpoint Sensor (ESEServiceShell.exe and ESClient.exe) in the exclusions list of Windows Defender to prevent the locking issue.
After copying a file to a remote server using a relative path as the source, Apex One is unable to translate the relative path into the full system directory.
The quality of RCA analysis chain image files is reduced when viewing the files using Windows 10 Photo Viewer.
When attempting to start a Historical Investigation from the Attack Discovery Detections widget that includes Registry value name or Registry value data criteria, the Historical Investigation displays an error message if the length of the Registry value name exceeds 260 characters or the Registry value data exceeds 64 characters.
After updating the Attack Discovery Pattern file (tmesadp.ptn) on Security Agents, a database schema error may occur that causes the Endpoint Sensor feature to continuously report the same detections to the server during each synchronization. This causes duplicate records to display on the Apex Central server.
Root Cause Analysis email attachment results may also include temporary files created when the user saved the file.
The number of matched endpoints that display on a Root Cause Analysis chain may appear to be greater than the total if the Security Agent on an endpoint was uninstalled or no longer reports to the same managing server.
The Endpoint Sensor service may have high memory usage.
The Endpoint Sensor may have high peak CPU usage occasionally.
Endpoint Sensor has CPU peak during Windows Update phase.
The user or account name in ADE detection may be empty.
Known issues in this release:
After enabling the Scan Time Machine option for Manual Scan and Scheduled Scan, Apex One (Mac) cannot perform any actions (clean, quarantine, or delete) on detected malware threats due to a permission limitation in Mac OS. Configured scan actions are displayed as unsuccessful in the product logs.
When performing a historical investigation on Apex One (Mac) endpoints, the system replaces a backslash (/) with a colon (:) in file names, preventing users from searching for file names that contain backslashes in investigation results.
To resolve this issue, use a colon (:) to search for the files.