This Hotfix resolves the following issue(s):
An internal issue prevents the system from forwarding syslogs.
Solution
This Hotfix resolves the issue.
The system is unable to output custom reports in PDF format.
Solution
This Hotfix resolves the issue.
After creating a new group using Endpoint Group Manager, the system may not synchronize the changes to the Standard Endpoint Protection app in Trend Vision One.
Solution
This Hotfix resolves the issue.
A known vulnerability is found in the PHP component in Apex Central.
Solution
This Hotfix updates the PHP version in Apex Central to enhance product security.
A potential Server-Side Request Forgery vulnerability is found in Apex Central.
Solution
This Hotfix resolves the issue.
An error may occur during suspicious object synchronization in Apex Central.
Solution
This Hotfix updates the synchronization process to resolve the issue.
A potential vulnerability is found in the compression module in Apex Central.
Solution
This Hotfix updates the compression module to protect against the vulnerability.
The system may not display the correct information in the Product Component Status Widget in the web console.
Solution
This Hotfix resolves the issue.
A potential vulnerability is found in an outdated widget.
Solution
This Hotfix removes the widget to resolve the issue.
Some third-party components used in Apex Central are outdated and vulnerable.
Solution
This Hotfix updates the related components.
A potential Cross-Side Script vulnerability is found in the Users/Endpoints component.
Solution
This Hotfix resolves the issue.
An issue prevents users from moving selected Security Agents using the Move Agent API.
Solution
This Hotfix updates the related module to resolve the issue.
An issue may cause the system to disable the iES feature.
Solution
This Hotfix updates the related modules to enable the feature for active users.
An issue related to special character processing may cause the system to generate an error when editing account passwords on the My Account screen in the web console.
Solution
This Hotfix resolves the issue.
This Hotfix resolves the following issue(s):
When a user logs out of a Security Agent endpoint, a date/time mismatch in generated detection logs may occur between the Trend Micro Apex One/Apex Central console and managed Security Agent console.
Solution
This Hotfix updates the Trend Micro Apex One Security Agent program to resolve the issue.
When Data Protection is enabled, Security Agents may not block the "Print screen" key action from a non-storage device specified in the Blocked Devices list.
Solution
This Hotfix updates the Data Protection module to version 6.2.6079 to resolve this issue.
Web Reputation settings may still be configurable even when configuration is disabled for the selected Windows platforms in Web Reputation policy in Trend Micro Apex Central.
Solution
This Hotfix updates the Trend Micro Apex One server program to resolve this issue.
A default firewall policy rule in Trend Micro Apex One may not restrict some specified incoming and outgoing TCP/UDP traffic.
Solution
This Hotfix updates the Trend Micro Apex One Security Agent program to resolve this issue.
When Data Loss Prevention (DLP) is enabled, a blue screen of death (BSOD) error may occur on Trend Micro Apex One Security Agent endpoints running Microsoft Windows 11 24H2 with Microsoft Update KB5050094 applied.
Solution
This Hotfix updates the Data Protection module to version 6.2.6079 to resolve this issue.
There are no issues for this Hotfix release.
The following enhancements are included in this Hotfix:
This Hotfix updates the related components in Apex Central to protect against the Azul Zulu Java Multiple Vulnerabilities (2024-11-12).
This Hotfix adds bank account template support in Data Loss Prevention for Shang Hai Commercial Bank.
Add auditing log for policy import and export.
This Hotfix adds support in Apex Central for SHA-256 suspicious object type from Suspicious Object Management in Trend Vision One.
This Hotfix enables Security Agents associated with user accounts that have lost access privilege due to account scope change to retain applied policies and be managed by privileged account users.
The following enhancements are included in this Hotfix:
This Hotfix updates the Advanced Threat Scan Engine (ATSE) to version 24.620.1004 to enhance data scanning for Smart Feedback.
This Hotfix updates the Virus Scan Engine (VSAPI) to version 24.620.1005 to protect against a Link Following Local Privilege Escalation security issue.
This Hotfix updates the 7-Zip module in Trend Micro Apex One to version 24.9 to enhance product security.
This Hotfix updates the Trend Micro Apex One Security Agent program to prevent a potential Improper Upgrade Service security issue.
This Hotfix updates the Security Agent move process for Standard Endpoint Protection in Endpoint Inventory in Trend Vision One to enhance product integration.
The following enhancements are included in this Hotfix:
This Hotfix updates the Apex One (Mac) Server to prevent potential Cross-Site Scripting (XSS) vulnerability attacks.
This Hotfix enhances the log collection capability of Trend Micro Debug Manager by updating the Trend Micro Apex One (Mac) Security Agent.
Security Agent version: 14.0.14320
Security Agent restart: Yes
Security Agent OS reboot: Not required for Security Agents are running build versions later than 10000.
Estimated size of network traffic (in terms of bandwidth) required for deployment:
Security Agent Version: 3.5.7976
Security Agent Restart Requirement: Not required
Estimated size of network traffic (in terms of bandwidth) required for deployment:
64-bit Security Agent Hotfix = 261MB
Additional Requirements: Enable web browser extension (https://success.trendmicro.com/solution/000273346)
No post-installation steps are required.
NOTE: Trend Micro recommends that you update your scan engine and virus pattern files immediately after installing the product.
There are no known issues for this Hotfix release.
Known issues in this release:
Security Agent consoles running build 13.95 display an incorrect policy name. To resolve this issue, upgrade the Security Agent to 14.0. After the Security Agent contacts the server, the policy name displays correctly.
Off-premises and Security Agents in Independent mode cannot update the Certified Safe Software Pattern from external update sources.
Coexist mode Security Agents on endpoints with Windows Defender may experience installation issues or be unable to upload data to the Apex One server due to a file locking issue. To resolve this issue, add Endpoint Sensor (ESEServiceShell.exe and ESClient.exe) in the exclusions list of Windows Defender to prevent the locking issue.
After copying a file to a remote server using a relative path as the source, Apex One is unable to translate the relative path into the full system directory.
The quality of RCA analysis chain image files is reduced when viewing the files using Windows 10 Photo Viewer.
When attempting to start a Historical Investigation from the Attack Discovery Detections widget that includes Registry value name or Registry value data criteria, the Historical Investigation displays an error message if the length of the Registry value name exceeds 260 characters or the Registry value data exceeds 64 characters.
After updating the Attack Discovery Pattern file (tmesadp.ptn) on Security Agents, a database schema error may occur that causes the Endpoint Sensor feature to continuously report the same detections to the server during each synchronization. This causes duplicate records to display on the Apex Central server.
Root Cause Analysis email attachment results may also include temporary files created when the user saved the file.
The number of matched endpoints that display on a Root Cause Analysis chain may appear to be greater than the total if the Security Agent on an endpoint was uninstalled or no longer reports to the same managing server.
The Endpoint Sensor service may have high memory usage.
The Endpoint Sensor may have high peak CPU usage occasionally.
Endpoint Sensor has CPU peak during Windows Update phase.
The user or account name in ADE detection may be empty.
The EC module may stop responding while handling NULL data which may cause the ESEService and ADE functionality to behave abnormally.
In rare conditions, ESEService stops responding while unloading.
A time zone issue may cause the system to display different log generation time information in the web console. In the web console, the system displays the log generation time in the time zone of the Apex One server.
Known issues in this release:
After enabling the Scan Time Machine option for Manual Scan and Scheduled Scan, Apex One (Mac) cannot perform any actions (clean, quarantine, or delete) on detected malware threats due to a permission limitation in Mac OS. Configured scan actions are displayed as unsuccessful in the product logs.
When performing a historical investigation on Apex One (Mac) endpoints, the system replaces a slash (/) with a colon (:) in file names, preventing users from searching for file names that contain backslashes in investigation results.
To resolve this issue, use a colon (:) to search for the files.