What's New in Axonius 4.6.18
  • 22 Sep 2022
  • 3 Minutes to read
  • Dark
    Light
  • PDF

What's New in Axonius 4.6.18

  • Dark
    Light
  • PDF

Article Summary

These Release Notes contain new features and enhancements added in version 4.6.18.
Read What's New in Axonius 4.6 to see all Axonius 4.6 features

Dashboard New Features and Enhancement

The following new features and enhancements were added to the Dashboards:

Vulnerabilities Queries Supported in Field Segmentation Chart

The capability was added to select saved queries from the Vulnerabilities module in the Field Segmentation chart.

FieldSegmentation_Vulnerabilities


Devices and Users Page New Features and Enhancements

The following new features and enhancements were added to the Devices and Users pages.

Asset Investigation

In Asset Investigation the Event Type and Updated Field Value columns were removed. In addition, History can be saved for a longer period of time.
Limitation:
The following limitations were added to Asset Investigation:
After upgrade you can see “value added” fields when the value had a previous investigation record changes before the upgrade. This situation occurs only for devices with historical changes recorded in asset investigation after an upgrade to this version.
If you are moving to Asset Investigation from a version lower than 4.6.18 to version 4.6.18, the Values Added column will be populated with the first value identified by Axonius, which is the value from which added/removed values will be calculated.

New CVE Vector Fields in the Devices Page

The CVSS Vector information is now displayed on the Devices page. Refer to New CVE Vector Fields in the Vulnerabilities page for a list of the columns that can be selected to be added.

New CVE Vector Fields in the Device Profile Page

The CVSS Vector information related to vulnerable software now appears in the Vulnerable Software Table on the Device Profile Page - Aggregated tab.

VulnerableSoftware_Vector

In addition, the CVSS Vector information is included in the exported CSV report.

Query Wizard Enhancements

  • Last Users User email field is now supported in Field Comparison.

New In Operator
It is now possible to add multiple values from an external file by using the new In operator in the Query Wizard. Use the In operator to select multiple values and to copy and paste values from and to the Query Wizard.
InOperator

Limitations:

  • This feature isn't currently supported for dynamic and closed lists.
  • Each In operator can contain a list of up to 2000 values.


Vulnerability Management Module New Features and Enhancements

The following new features and enhancements were added to the Vulnerability Management Module:

Additional Fields Available

Vulnerabilities are now enriched with the following columns, which are displayed by adding them to the Vulnerabilities page.

  • CVE ID - has a clickable link to learn about the vulnerability and how to remediate it.
  • CWE ID - has a clickable link to learn more about a vulnerability appearing in the Common Weakness Enumeration (CWE) list and how to remediate it.

New CVE Vector Fields in the Vulnerabilities Page

The CVSS Vector information is now displayed on the Vulnerabilities page and subdivided into the following columns, which you can add to the Vulnerabilities page. CVSS vector fields are populated according to the CVSS vector, i.e. some fields are populated when the vector is 3.X, and others when the vector is 2.0 (and some in both cases)

  • CVE Vector: Access Complexity
  • CVE Vector: Access Vector
  • CVE Vector: Attack Complexity
  • CVE Vector: Attack Vector
  • CVE Vector: Authentication
  • CVE Vector: Availability
  • CVE Vector: Confidentiality
  • CVE Vector: Integrity
  • CVE Vector: Privileges Required
  • CVE Vector: Scope
  • CVE Vector: User Integration
  • CVE Vector: Version


Reports New Features and Enhancements

The following enhancements were added to reports.

The Report Configuration page now has an option to include saved query data from the Vulnerabilities module, in addition to the Devices and Users modules.

Vulnerabilities_SavedQuery

Administrator Settings New Features and Enhancements

The following updates were made to various Administrator settings:

SSH Support for added to Central Core Backup and Restore

Added a capability to backup and restore the central core to servers that support SSH.



Was this article helpful?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.