- 24 Mar 2022
- 2 Minutes to read
- Print
- DarkLight
- PDF
What's New in Axonius 2.6
- Updated on 24 Mar 2022
- 2 Minutes to read
- Print
- DarkLight
- PDF
Adapters
New Adapters
The following new adapters have been added in this release:
- Bitsight Security Ratings – a data-driven and dynamic measurement of an organization’s cybersecurity performance.
- Censys - monitors infrastructure and discovers unknown assets anywhere on the Internet.
- Endgame - endpoint protection platform that combines on-line and off-line protection against exploits, phishing, malware, ransomware, and fileless attacks.
- NetBox - an open source web application to help manage and document computer networks.
- Palo Alto Networks Cortex - an open and integrated, AI-based continuous security platform, allowing security operations teams to speed the analysis of massive data sets.
For more details, see the entire list of supported and integrated adapters.
Adapter Configuration Enhancements
The following enhancements have been made to existing adapters in this release.
- Cisco Prime: Wireless VLAN Exclude List (connection configuration) – you can exclude devices associated with one or more VLANs separated by a comma separated list.
- Jamf Pro: Fetch Mobile Devices (advanced settings) – you can choose whether to fetch mobile devices in addition to standard devices.
- Microsoft System Center Configuration Manager (SCCM): Exclude IPv6 addresses (advanced settings) - you can choose whether to exclude IPv6 addresses fetched from SCCM.
- Rapid7 Nexpose: Drop Device With Only IP (advanced settings) – you can choose to exclude fetching devices having IP address only without any other identifier (such as MAC address or hostname).
- Tenable.sc: Drop Device With Only IP (advanced settings) – you can choose to exclude fetching devices having IP address only, without any other identifier (such as MAC address or hostname).
Axonius Dashboard
You can now create different dashboard sets called "spaces". Each dashboard space consists of charts designated for specific user groups or operation types such as IT, Network, SOC, and SecOps.
For more details, see Working with Dashboard Spaces.
Enforcement Center Updates
The following updates have been made to the Axonius Security Policy Enforcement Center.
- Execute Endpoint Security Agent Action - The action that was formerly called "Isolate Device in EDR" has been changed to "Execute Endpoint Security Agent Action" as we have added more than just isolate/unisolate actions using EDR tools.
- Initiate SentinelOne Scan - A new enforcement action has been added to the "Execute Endpoint Security Agent Action" category. You can now initiate a full SentinelOne scan on manually selected devices or on devices as part of a saved query.
- Enrich Device Data with Shodan - A new "Enrich Device or User Data" category and enforcement action has been added. You can now enrich devices having public IPs (IPv4) with additional data from Shodan, such as hostname, ports open to the world, vulnerabilities, address information (country, region, city), ISP and more. For more details, see Enrich Device Data with Shodan.
Device and User Related Updates
Not in subnet function - you can now search for devices having IP addresses not included in a list of subnets (comma separated). A new 'IPv4 Public Subnets' default saved query using that function has been added. Use this saved query to identify all the devices having public IPs (IPv4).
Reports
The generated report has been updated with a new cover page, content pages and a legend for pie charts. For more details, see Report Content.
Additional Updates
- Tag Reimaged Devices Setting – with this new Lifecycle Settings option, you can easily identify reimaged devices. Axonius automatically tags a device as 'old' if it identifies that the device had been reimaged and there is a new asset record in Axonius that represents that device. For more details, see Lifecycle Settings.
- Various bugs fixes