This Hotfix resolves the following issue(s):
The "cn3Lable" CEF key displays the wrong value in Virus/Malware syslogs.
Solution
This Hotfix resolves this issue.
Garbled characters appear in the subject field of event notification email messages.
Solution
This Hotfix resolves the issue only on fresh installations of Apex Central.
Each user account can run more than one session simultaneously even when the "Enforce one session per account" feature is enabled.
Solution
This Hotfix ensures that each user account can run only one session at a time when the "Enforce one session per account" feature is enabled.
The "%BM_policy%" token variable displays the wrong information in Behavior Monitoring notification email messages.
Solution
This Hotfix ensures that the "%BM_policy%" token variable works normally.
An issue prevents users from performing Single Sign-on (SSO) to Apex One from the "Product Servers" page.
Solution
This Hotfix resolves the issue so users can SSO to Apex One from the "Product Servers" page normally.
Inaccurate Spyware/Grayware log query results may appear on the Apex Central web console and the "Action result" field in Spyware/Grayware Found notification email messages may also display inaccurate information.
Solution
This Hotfix ensures that the correct information appears in both instances.
Static Template Apex One client information reports may indicate that some up-to-date agent components are outdated.
Solution
This Hotfix ensures that the reports display the correct agent component status.
Single Sign-On (SSO) from Apex Central may not work when a large number of users are active simultaneously.
Solution
This Hotfix resolves this issue so users can SSO from Apex Central normally.
Insufficient system memory causes IIS to work abnormally.
Solution
This Hotfix resolves the memory issue.
A Cross-Site Scripting (XSS) vulnerability has been detected in HTTP headers.
Solution
This Hotfix adds an X-XSS-Protection Header to prevent the XSS vulnerability.
The login pages of the Apex Central web console are affected by stored XSS vulnerabilities.
Solution
This Hotfix resolves the vulnerabilities.
A privilege escalation issue has been found in the Reports module.
Solution
This Hotfix resolves the issue.
Apex Central cannot generate reports because the report generating module cannot read the database configuration correctly.
Solution
This Hotfix resolves the issue.
An issue causes "CmdProcessor.NET.exe" to stop unexpectedly on the "Users/Endpoints" page.
Solution
This Hotfix resolves this issue.
Users encounter an "Access Deny" message while attempting to copy Apex One Agent policies.
Solution
This Hotfix ensures that users can copy Apex One policies successfully.
This Hotfix resolves the following issue(s):
An issue prevents users from accessing the Device Control policy setting page on the Apex One SaaS web console.
Solution
This Hotfix updates the Apex One server program to resolve the issue.
An issue prevents Apex One Security agents from applying hotfixes to the Apex One server.
Solution
This Hotfix updates the Firewall module to resolve this issue.
An issue may trigger the agent process to stop unexpectedly.
Solution
This Hotfix updates the Apex One agent program to resolve the issue.
An issue related to the Data Loss Prevention(TM) (DLP) module can trigger a high CPU usage issue.
Solution
This Hotfix updates the Apex One agent program to resolve the issue.
When the Apex One Data Protection service is enabled on Security Agents installed on Microsoft(TM) Windows(TM) 10 October 2018 Update (Redstone 5) endpoints, web browsers may stop unexpectedly when users attempt to upload file attachments in webmail.
Solution
This Hotfix updates the Data Protection module to resolve this issue.
When the Apex One Data Protection Service is enabled on Security Agents, users may not be able to open Microsoft Office applications normally on protected computers with low specifications.
Solution
This Hotfix updates the Data Protection module to resolve this issue.
Apex One Security Agents still appear "Online" even when endpoint computers have lost Internet connection.
Solution
This Hotfix updates the Apex One Security Agent program to resolve this issue.
Security Agents configured to allow users to modify local settings may overwrite the user's settings during the next server synchronization.
Solution
This Hotfix updates the Apex One Security Agent program to resolve this issue.
After migrating the agent from OfficeScan XG to Apex One SaaS, the security agent encountered an update loop problem.
Solution
This Hotfix updates agent program to resolve this issue.
The spyware scan feature of Manual Scan in Apex One Security Agents is affected by an Improper Access Control Privilege Escalation vulnerability.
Solution
This Hotfix updates the Apex One Security Agent program to remove the vulnerability.
After configuring Data Protection keys that monitor file uploads to websites, Security Agents may still randomly block file uploads to approved sites.
Solution
This Hotfix updates the Data Protection module to resolve this issue.
An issue related to the VSAPI decompress function may cause a vulnerability in the Apex One as a Service program.
Solution
This Hotfix resolves the issue to remove the vulnerability.
The DLP module may trigger a false alarm while the Dropbox installer is running.
Solution
This Hotfix updates the DLP module to resolve this issue.
A large number of Web Reputation Service detection logs are generated after agents receive the January 20, Batch 1 updates.
Solution
This Hotfix updates the Apex One agent program to resolve the issue.
This Hotfix resolves the following issue(s):
High system memory usage might result when the Virus Scan Engine is scanning a file.
Solution
This hotfix updates the VSAPI module to resolve this issue.
The Security Agent is unable to update the server certificate if the registration status is unsuccessful.
Solution
This hotfix updates the task type to resolve this issue.
Using the netfilter system extension may cause a memory leak.
Solution
This hotfix updates the iCoreService module to resolve this issue.
The following enhancements are included in this Hotfix:
Added the configuration settings for DLP policy Rules and Exceptions applied to Internal and External agents to the external API -"Data Loss Prevention".
Added a new single sign-on entry to Trend Micro Vision One in the menu bar. Customers who purchase an Endpoint Sensor license and have previously logged on to the Trend Micro Vision One console can single sign-on using the registered Trend Micro Account.
This Hotfix adds a retry mechanism to help minimize SQL exceptions during Apex Central installation.
This Hotfix updates the Apex One Vulnerability Protection module to remove unnecessary information in the description of Intrusion Prevention Rules.
This Hotfix updates the VSAPI/ATSE engine to version 12.5 to resolve CHM (Compiled HTML) vulnerabilities.
This Hotfix enables Apex Central to re-deploy filter type child polices after a parent policy is edited.
The following enhancements are included in this Hotfix:
This Hotfix adds USB storage device information (Vendor, Model, Serial ID) to Device Control violation logs with Block permission on the Apex Central console.
To ensure maximum protection across all desktop and server platforms, Security Agent Self-Protection features are enabled by default and are no longer configurable using the product console.
The Unauthorized Change Prevention Service provides a light-weight "Performance mode" that allows you to protect Server platforms against ransomware threats without adversely affecting server performance.
This Hotfix enables Apex One to support the application filter hash matching feature for the Firewall Policy Exception so that users are able to specify applications to use the file hash value on.
Procedure
To enable the new settings:
You can now direct Security Agents to utilize local Smart Protection Servers using the Trend Micro Apex One cloud console.
This Hotfix fixes the exposure of sensitive information to an unauthorized actor security issue.
This Hotfix updates the Behavior Monitoring driver and services to improve the security in Apex One Security Agent computers.
This Hotfix improves the procedure for setting folder permissions.
This Hotfix resolves a Server-Side Request Forgery Information Disclosure security issue in Apex One.
This Hotfix resolves an Out-Of-Bounds Write security issue in Apex One.
This Hotfix resolves an Out-Of-Bounds Read security issue in Apex One as a Service.
There are no enhancements for this Hotfix release.
Security Agent version: 14.0.9324
Security Agent restart: Required
Estimated size of network traffic (in terms of bandwidth) required for deployment:
Security Agent Version: 3.5.5060
Security Agent Restart Requirement: Not required
Estimated size of network traffic (in terms of bandwidth) required for deployment:
64-bit Security Agent Hotfix = 131MB
Additional Requirements: Enable web browser extension (https://success.trendmicro.com/solution/000273346)
No post-installation steps are required.
NOTE: Trend Micro recommends that you update your scan engine and virus pattern files immediately after installing the product.
There are no known issues for this Hotfix release.
Known issues in this release:
Security Agent consoles running build 13.95 display an incorrect policy name. To resolve this issue, upgrade the Security Agent to 14.0. After the Security Agent contacts the server, the policy name displays correctly.
Off-premises and Security Agents in Independent mode cannot update the Certified Safe Software Pattern from external update sources.
Coexist mode Security Agents on endpoints with Windows Defender may experience installation issues or be unable to upload data to the Apex One server due to a file locking issue. To resolve this issue, add Endpoint Sensor (ESEServiceShell.exe and ESClient.exe) in the exclusions list of Windows Defender to prevent the locking issue.
After copying a file to a remote server using a relative path as the source, Apex One is unable to translate the relative path into the full system directory.
The quality of RCA analysis chain image files is reduced when viewing the files using Windows 10 Photo Viewer.
When attempting to start a Historical Investigation from the Attack Discovery Detections widget that includes Registry value name or Registry value data criteria, the Historical Investigation displays an error message if the length of the Registry value name exceeds 260 characters or the Registry value data exceeds 64 characters.
After updating the Attack Discovery Pattern file (tmesadp.ptn) on Security Agents, a database schema error may occur that causes the Endpoint Sensor feature to continuously report the same detections to the server during each synchronization. This causes duplicate records to display on the Apex Central server.
Root Cause Analysis email attachment results may also include temporary files created when the user saved the file.
The number of matched endpoints that display on a Root Cause Analysis chain may appear to be greater than the total if the Security Agent on an endpoint was uninstalled or no longer reports to the same managing server.
The Endpoint Sensor service may have high memory usage.
The Endpoint Sensor may have high peak CPU usage occasionally.
Endpoint Sensor has CPU peak during Windows Update phase.
The user or account name in ADE detection may be empty.
The EC module may stop responding while handling NULL data which may cause the ESEService and ADE functionality to behave abnormally.
In rare conditions, ESEService stops responding while unloading.
Known issues in this release:
After enabling the Scan Time Machine option for Manual Scan and Scheduled Scan, Apex One (Mac) cannot perform any actions (clean, quarantine, or delete) on detected malware threats due to a permission limitation in Mac OS. Configured scan actions are displayed as unsuccessful in the product logs.
When performing a historical investigation on Apex One (Mac) endpoints, the system replaces a slash (/) with a colon (:) in file names, preventing users from searching for file names that contain backslashes in investigation results.
To resolve this issue, use a colon (:) to search for the files.