This Hotfix resolves the following issue(s):
Detailed information does not display after clicking a number on the following widgets:
Solution
This Hotfix resolves the issue.
Configuring the "Control traffic on isolated endpoints" settings for an endpoint may restore the endpoint connection.
Solution
This Hotfix resolves the issue.
The Apex Central web console displays the incorrect URL on the Virtual Analyzer Suspicious Objects > Configure Scan Actions screen.
Solution
This Hotfix resolves the issue.
Users are unable to log into Apex Central if the account password contains the pound symbol "£".
Solution
This Hotfix resolves the issue.
An issue related to the web console module may cause a potential information leak.
Solution
This Hotfix resolves the issue.
Known vulnerabilities (CVE-2022-31625 and CVE-2022-31626) are found in PHP 7.4.30 and earlier versions.
Solution
This Hotfix updates the PHP version in Apex Central to enhance product security.
Users are unable to export logs from the web console.
Solution
This Hotfix resolves the issue.
This Hotfix resolves the following issue(s):
A user account management issue in Apex One as a Service may prevent users from Single Sign-On (SSO) to the Apex One (Mac) as a Service web console properly.
Solution
This Hotfix updates the Apex One server program to resolve this issue.
A service start timing issue in the Apex One Apex Central Agent ("OfficeScanCMAgent") may cause the Apex One as a Service server status to appear as "Abnormal" on the Apex Central web console.
Solution
This Hotfix updates the Apex One server program to resolve this issue.
The Trend Micro DLP Add-in for Outlook that monitors file movement in Microsoft™ Outlook may not function properly on Apex One Security Agent endpoints.
Solution
This Hotfix updates the Data Protection module to version 6.2.5162 to resolve this issue.
A registry update issue related to the Apex One Firewall components may cause the Apex One Firewall Service to stop functioning properly.
Solution
This Hotfix updates the Apex One Security Agent program to resolve this issue.
A blue screen of death (BSOD) error may occur on Apex One Security Agent endpoints when Data Loss Prevention (DLP) is enabled.
Solution
This Hotfix updates the Data Protection module to version 6.2.5162 to resolve this issue.
After creating a new Apex One firewall profiles with a duplicate profile name, the ordering of the firewall profiles changes unexpectedly.
Solution
This Hotfix updates the Apex One server program to resolve this issue.
The Trend Micro Unauthorized Change Prevention ("TMBMSRV.exe") service may use up excessive amount of memory causing system performance degradation.
Solution
This Hotfix updates the Behavior Monitoring Core Service module (to version 2.98.1855) and the Behavior Monitoring Core Drive module (to version 2.98.1853) to resolve this issue.
A domain corruption issue in Apex One may cause the Apex One server to disconnect from the registered Apex Central server unexpectedly.
Solution
This Hotfix updates the Apex One server program to resolve this issue.
The Dashboard on the Apex One web console does not display the latest Behavior Monitoring detection count properly.
Solution
This Hotfix updates the Apex One server program to resolve this issue.
There are no issues for this Hotfix release.
The following enhancements are included in this Hotfix:
This Hotfix removes the CEF key "suser" in CEF Virus/Malware logs for better user experience.
This Hotfix adds the CEF key "dvchost" in CEF Suspicious File Logs for better user experience.
This Hotfix enhances the API (/WebApp/api/AgentResource/ProductAgents) to provide additional Security Agent information.
This Hotfix adds a new API (/WebApp/API/V2/AgentResource/ProductAgents) to provide additional Security Agent information.
The following enhancements are included in this Hotfix:
This Hotfix updates the command authentication mechanism in Apex One Security Agent to enhance product security.
This Hotfix updates the Trend Micro User-Mode Hook Event module in Apex One Security Agent to version 8.55.1119 to protect against potential vulnerability issues.
This Hotfix updates the Apex One Client Plug-in Service Manager module to resolve potential Local Privilege Escalation security issues.
This Hotfix updates the Apex One server program to resolve a Forced Browsing Privilege Escalation Vulnerability security issue.
This Hotfix updates the Trend Micro Network Content Inspection Engine Scanner in Apex One Security Agent to version 3.0.1104 to protect against potential vulnerability issues.
This Hotfix updates the Damage Cleanup Engine to version 7.5.1180.
This Hotfix updates the Virus Scan Engine (VSAPI) to version 22.580.1004 and enables Apex One Security Agent to support the "Ransom Attack Detector" feature to block all file accesses from suspicious processes.
This Hotfix updates the Program Inspection Engine to version 2.9.1042 to protect against potential vulnerability issues.
This Hotfix updates the Apex One server program to resolve the Improper Handling of Exceptional Conditions Local Privilege Escalation security issue.
This Hotfix enables Apex One Security Agent to manage the Trusted Programs List to automatically exclude programs configured for the Data Loss Prevention feature.
Procedure
To configure and deploy the setting:
This Hotfix updates the Virus Scan Engine (VSAPI) to version 22.580.1004 to prevent a potential Privilege Escalation security issue.
The following enhancements are included in this Hotfix:
This Hotfix updates the hostname retrieval method in Apex One (Mac) Security Agent.
This Hotfix enables Trend Micro Apex One (Mac) to officially stop supporting macOS 10.13 (High Sierra) after November 2022.
Security Agent version: 14.0.11789
Security Agent restart: Required
Estimated size of network traffic (in terms of bandwidth) required for deployment:
Security Agent Version: 3.5.6304
Security Agent Restart Requirement: Not required
Estimated size of network traffic (in terms of bandwidth) required for deployment:
64-bit Security Agent Hotfix = 218MB
Additional Requirements: Enable web browser extension (https://success.trendmicro.com/solution/000273346)
No post-installation steps are required.
NOTE: Trend Micro recommends that you update your scan engine and virus pattern files immediately after installing the product.
There are no known issues for this Hotfix release.
Known issues in this release:
Security Agent consoles running build 13.95 display an incorrect policy name. To resolve this issue, upgrade the Security Agent to 14.0. After the Security Agent contacts the server, the policy name displays correctly.
Off-premises and Security Agents in Independent mode cannot update the Certified Safe Software Pattern from external update sources.
Coexist mode Security Agents on endpoints with Windows Defender may experience installation issues or be unable to upload data to the Apex One server due to a file locking issue. To resolve this issue, add Endpoint Sensor (ESEServiceShell.exe and ESClient.exe) in the exclusions list of Windows Defender to prevent the locking issue.
After copying a file to a remote server using a relative path as the source, Apex One is unable to translate the relative path into the full system directory.
The quality of RCA analysis chain image files is reduced when viewing the files using Windows 10 Photo Viewer.
When attempting to start a Historical Investigation from the Attack Discovery Detections widget that includes Registry value name or Registry value data criteria, the Historical Investigation displays an error message if the length of the Registry value name exceeds 260 characters or the Registry value data exceeds 64 characters.
After updating the Attack Discovery Pattern file (tmesadp.ptn) on Security Agents, a database schema error may occur that causes the Endpoint Sensor feature to continuously report the same detections to the server during each synchronization. This causes duplicate records to display on the Apex Central server.
Root Cause Analysis email attachment results may also include temporary files created when the user saved the file.
The number of matched endpoints that display on a Root Cause Analysis chain may appear to be greater than the total if the Security Agent on an endpoint was uninstalled or no longer reports to the same managing server.
The Endpoint Sensor service may have high memory usage.
The Endpoint Sensor may have high peak CPU usage occasionally.
Endpoint Sensor has CPU peak during Windows Update phase.
The user or account name in ADE detection may be empty.
The EC module may stop responding while handling NULL data which may cause the ESEService and ADE functionality to behave abnormally.
In rare conditions, ESEService stops responding while unloading.
Known issues in this release:
After enabling the Scan Time Machine option for Manual Scan and Scheduled Scan, Apex One (Mac) cannot perform any actions (clean, quarantine, or delete) on detected malware threats due to a permission limitation in Mac OS. Configured scan actions are displayed as unsuccessful in the product logs.
When performing a historical investigation on Apex One (Mac) endpoints, the system replaces a slash (/) with a colon (:) in file names, preventing users from searching for file names that contain backslashes in investigation results.
To resolve this issue, use a colon (:) to search for the files.