What's New in Axonius 6.1.59
  • 08 Apr 2025
  • 7 Minutes to read
  • Dark
    Light
  • PDF

What's New in Axonius 6.1.59

  • Dark
    Light
  • PDF

Article summary

Release Date: March 23rd 2025

These Release Notes contain new features and enhancements added in version 6.1.59.

Axonius Identities

Axonius Identities transforms fragmented identity data into actionable insights – bringing core discovery, lifecycle, governance, and posture management efforts together in one place to strengthen your IAM program resilience. It equips teams with the tools to optimize identity operations, unifying data from every downstream system and application with high granularity. Identities enables users to gain complete visibility into their identity fabric by continuously discovering all human and machine/non-human identities across their cloud, on-prem, and hybrid environments. Axonius bi-directionally integrates with systems and applications to sync accounts, roles, policies, entitlements, permission sets, and resources – ensuring users never miss a single identity in their environment.

Identities offers:

  • Streamlined Identity Lifecycle Management
  • Simplified Identity Governance
  • Optimized Identity Security Posture Management
  • Smart Identity Hygiene
  • Rules to control identity lifecycle management
  • Role mining to right-size identities access
  • Conduct access reviews with Campaigns
  • Identify excessive access with peer group analysis

Identities provides the following:

Role Mining

  • Role mining delves deep into the organization's access landscape, analyzing user access patterns to identify common combinations of entitlements. The Role Mining Simulator helps visualize the distribution of entitlements assigned to roles. Customers can also use the simulator to investigate entitlement drift.
    RoleMiningSimExample.png

Rules Simulator

  • Use the Rules Simulator to build a Query Intersection Venn diagram to compare between rules that grant access and permissions. This helps you learn about the rules in your organization and determine when multiple rules can be condensed, making your rules easier to manage.
    RulesSimulator.png

Peer Group Analysis

  • Peer group analysis compares an individual's performance, behavior, or characteristics against a group of similar individuals/peers. Use the Peer Group Simulator to visually compare the entitlements of a specific identity with those of the whole team. This helps to reveal extra or unnecessary permissions.
    Peer Group Simulator

Campaigns

  • Use Axonius Campaigns to set up and carry out periodic assessments to the continued necessity of users' previously granted access to software, applications, and permissions in your organization. After initiating a Campaign, you can monitor its progress, and determine whether to approve or revoke user access.
    CampaignsPage

Pre-built Dashboards

  • Pre-built Identities dashboards provide immediate value by offering readily available insights into your identity landscape. They serve as a starting point for exploring the platform's capabilities, demonstrating the potential for data analysis and informed decision-making.
    IdentityRiskOverviewDashboard.png

Compare Permission Chart

  • Use the Compare Permission chart on any dashboard. It is a small version of the Peer Group Simulator chart. Adding this to a frequently used dashboard can enhance awareness of permission drift.
    ComparePermissionChart.png

Justifications

  • Justifications provide a clear and auditable record of why a user has access to specific resources or data. They support informed decision-making, risk mitigation, compliance adherence, and collaboration among stakeholders. Justifications enhance transparency and accountability in access management, ensuring that access decisions are well-documented and aligned with organizational policies.
    JustificationsExample.png


Assets Pages

The following features were added to all assets pages:

Asset Investigation Support for Custom Fields

Custom fields can now be tracked in Asset Investigation, allowing for more flexibility in how users monitor changes in their assets.

Query Wizard Enhancements

Tool-Tip Descriptions Added to the Query Wizard

Users can hover over any operator in the Query Wizard to view their descriptions and quickly understand the various options for creating a query.
image 47.png

Adapters Displayed in Field Description

The Field Description window in the Query Wizard now shows the adapters that provide data for each field.
image 48.png

Vulnerability Management Module New Features and Enhancements

The following new features and enhancements were added to the Vulnerability Management Module:

EPSS Field Name Change

When enriching software vulnerabilities with details from EPSS DB, the Creation Date field is now renamed as Last Calculation Date.

SaaS Applications New Features and Enhancements

New User Extension Asset Types for SaaS Applications

The following new User Extension Asset Types were added for SaaS Applications. They can help users manage their application integrations more effectively. These new asset types provide users with a more granular and organized view of how applications are connected and accessed within their SaaS environments:

  • Admin Managed Extensions - Integrations configured by administrators, including SSO, Bookmark, IDP, and Admin Consent types.
  • User Initiated Extensions - Integrations initiated by users, specifically those using User Consent, where users grant permissions for their own account and data.
  • Application Keys - API keys used for programmatic or machine-level access to applications. These keys are typically generated by administrators and used for automation or integration purposes.
  • Application Add-Ons - Extensions or plugins installed by users within another application to enhance its functionality. These add-ons are typically user-specific and managed within the context of the main application.

New Automatic Account Creation Logic

Account assets are now automatically created for all administrator-managed extensions in Axonius except for 'Admin consent' extensions. These extensions include SSO, IDP, and Bookmark extensions.

Improved Behavior for 'User Count' Extensions Field

The 'User Count' field in Application Extensions now shows the number of users associated with an extension. Clicking the number opens the Users page filtered for that extension.
The 'User Extension Count' field shows the number of extensions that are associated with specific users.

System Settings New Features and Enhancements

The following updates were made to various System Settings:

SSL Cipher Field Added to LDAP Settings

In the LDAP & SAML settings page (under Settings > Access Management), an "SSL cipher" optional field was added. Users can provide an SSL cipher to use for the TLS object of the connection.


Adapter and Enforcement Action Updates

New Adapters

The following new adapters were added:

  • Cisco Secure Access
    • Cisco Secure Access is a tool that provides secure access to your network and devices. It allows you to manage and control access to your network and devices, ensuring that only authorized users can access them. (Fetches: Devices, Users)
  • Freshservice Fetch Tickets
    • Freshservice is a cloud-based IT help desk and service management solution that enables organizations to simplify their IT operations. (Fetches: Tickets)
  • SecuriThings
    • SecuriThings is a platform that enables organizations to proactively manage, automate, and secure their entire physical security infrastructure. (Fetches: Devices)

Adapter Updates

The following adapters were updated:

  • 1Password
    • This adapter now fetches application resources as assets.
    • Added the option to fetch vault items.
  • BIND - Added the capability to upload remote files.
  • Ceridian Dayforce - This adapter now fetches managed identities as assets.
  • Checkmarx One
    • Authentication Method and Tenant Name were added to connection parameters.
    • A dropdown based on user's region was added to the Host Name or IP Address connection parameter.
  • CSV - Added the option to remove the CSV prefix from dynamic fields.
  • Fortinet FortiGate - Added the option to use the fetch time instead of the last_checked value for the “Last Seen” field on FortiManager devices.
  • Github - Added the following advanced settings:
    • Enable fetching of default branches.
    • Enrich the default branches with protection rules
  • Ivanti Neurons - RapidAPI Key was removed from connection parameters.
  • Ivanti Security Controls - Added the option to fetch CVEs related to the machine security patches.
  • ManageEngine ServiceDesk Plus - Added the option to not enrich devices with workstation data.
  • Microsoft Entra ID - Added the option to filter which applications are included in the fetch by their preferred SSO mode.
  • N-able
    • JWT Token was added to connection parameters.
    • Added the option to fetch device custom properties.
  • Okta - The adapter can now fetch many of the Application Settings with just an API token/OAuth credentials.
  • Oracle Cloud - This adapter now fetches Firewalls and Load Balancers as assets.
  • Orca Cloud Visibility Platform - Added the option to avoid keeping asset data from custom fetch rules on the device.
  • Sailpoint IdentityIQ - Added the capability for customers to specify a comma separated list of which fields to fetch.
  • Snowflake Data Warehouse - Added the option to parse additional device columns.
  • SQL Server
    • SQL Query was added to connection parameters.
    • "Fetch only databases" was added to connection parameters.
  • watchTowr
    • Added the capability to specify the number of days back to fetch Cloud Storage.
    • Added the option to not fetch devices of the subtype 'ip_address' from the IP Addresses endpoint.
    • Added the option to not fetch devices of the subtype 'domain' from the Domains endpoint.
    • Added the option to not fetch devices of the subtype 'subdomain' from the Subdomains endpoint.
    • Added the option to fetch ObjectStorage from the Cloud Storage endpoint.
    • Added the option to fetch Containers from the Containers endpoint.
    • Added the option to fetch ApplicationResources from the Repositories endpoint.

New Enforcement Actions

The following Enforcement Actions were added:

  • Make LeanIX Factsheets - Takes data from the device's Instaled Software aggretated field and creates a factsheet in LeanIX based on that data.

Updated Enforcement Actions

The following Enforcement Actions were updated:



Was this article helpful?