What's New in Axonius 4.7.0 compared to 4.6.18
  • 20 Sep 2022
  • 2 Minutes to read
  • Dark
    Light
  • PDF

What's New in Axonius 4.7.0 compared to 4.6.18

  • Dark
    Light
  • PDF

Article summary

These Release Notes contain new features and enhancements added in version 4.7.0 after the most recent minor version 4.6.18.

Devices and Users Page New Features and Enhancements

The following new features and enhancements were added to the Devices and Users pages.

Asset Investigation

  • An i icon shows users an indication when the value displayed in the Values Added is the earliest value that Axonius started to track for this field.

Data Refinement

Additional 'in subnet' and 'not in subnet' operators have been added to Data Refinement for IP address fields. This enables querying devices in subnets and filtering the display to only show a specific range of IP addresses.

Query Wizard Enhancements

  • An Exists operator has been added for Boolean fields in the Query Wizard.
  • The new In operator now supports dynamic and pre-populated (closed) lists.


Vulnerability Management Module New Features and Enhancements

The following new features and enhancements were added to the Vulnerability Management Module:

CISA Known Exploited Vulnerabilities

Axonius now enriches vulnerabilities information from your connected adapters with additional details from the CISA Known Exploited Vulnerabilities (KEV) Catalog.

This is indicated in the Vulnerabilities module by the CISA CISA_logo_50x50 logo. When relevant, CISA information will appear in the Vulnerabilities module and Devices module.

CISA enrichment is enabled by default by the Fetch software vulnerabilities from CISA DB option in the Data Enrichment Settings section of Global Settings.

A CISA Exploited Vulnerabilities table was added to the Aggregated tab of the Device Profile page. It enhances your detected Common Vulnerabilities and Exposures (CVEs) with additional CISA vulnerabilities information as defined by the CISA catalog.

CISA_Exploited

Tag Vulnerabilities

You can now tag vulnerabilities. You can then query tagged vulnerabilities using the Query Wizard.

Query Management New Features and Enhancements

The following new features and enhancements were added to the Queries:

Duplicate Option Added to Actions Dropdown

A Duplicate option has been added to the Actions dropdown on the Queries page. One query can be duplicated at a time.

DuplicateAction


Administrator Settings New Features and Enhancements

The following updates were made to various Administrator settings:

Role Based Access Control

Switch Data Scopes
Users can switch between multiple data scopes to validate proper data access and activities​. This feature is available as Early Availability.

Create Dynamic Data Scopes
Create and assign Data Scopes based on user attributes (SAML). This feature is available as Early Availability.

Global Settings

The Fetch software vulnerabilites from NVD DB setting has been split into two separate settings:

  • Fetch software vulnerabilities from NVD DB fetches software vulnerabilities details using Axonius Static Analysis.
  • Enrich software vulnerabilities from NVD DB enriches software vulnerabilities with additional information from the NVD DB.

Enforcement Center New Features and Enhancements

The following new features and enhancements were added to the Enforcement Center:

Add Tag Enforcement Action Supports Expiring Tags

The Add Tag Enforcement action now supports Expiring Tags. You can set a specific expiration date, or set a number of days from now.

Export CSV Enforcement Actions

All Enforcement Actions that create and export CSV files now provide the same functionality as Export Data on the Assets pages. The following new options are available for these actions:

  • Split by asset entities
  • Split by field values
  • Don't split complex object into columns
  • Delimiter to use for multi-value fields
  • Maximum rows



Was this article helpful?