Feb 03, 2021
This release expands eligibility for InsightVM Platform Login, adds the beta edition of the new Metasploit Remote Check Service, and fixes some issues.
New
- InsightVM Platform Login eligibility expanded: Non-admin and externally authenticating Security Console user accounts are now eligible for the InsightVM Platform Login experience! To accompany this eligibility expansion, we’ve also substantially rewritten our InsightVM Platform Login documentation. Check out this updated resource for comprehensive information on what this experience is meant to achieve and how to enable it.
- Metasploit Remote Check Service Beta now available: The Metasploit Remote Check Service , now available in the beta phase of its development, enhances the remote vulnerability check capabilities of Scan Engines running on Linux hosts. Try out this new service to strengthen InsightVM’s existing scanning capabilities with the power of Metasploit modules. See our new Metasploit Remote Check Service documentation for deployment guidance.
Fixes
- We fixed a credential status logging error associated with Scan Engines failing to connect to the Windows Remote Registry service that would produce inaccurate scan results in the Security Console.
- We fixed an issue with our CIS Palo Alto policy benchmarks to resolve several false negative results.
- We fixed an issue with rule 1.4.2 in our CIS Red Hat Enterprise Linux 6 version 2.1.0 policy that caused several false positives.
- We updated our fingerprinting so that Microsoft File Converter will not incorrectly trigger Microsoft Office vulnerabilities.
- When reviewing vulnerability exceptions, the toggle for the expiration date will now show the calendar when going from “Never” to “Select a date” and update accordingly when a date is selected. Updating the expiration date is now fixed and the calendar will not disappear.