| This is the fifth official release. - Handling Vulnerabilities: The vulnerability policy configurations are renamed and divided into the scheduled scan policy and vulnerability whitelist policy.
- Managing the Vulnerability Whitelist: The vulnerability policy configurations are renamed and divided into the scheduled scan policy and vulnerability whitelist policy.
|
| This is the fourth official release. - Revised Checking the Dashboard.
- Added the following alarm types to Server Alarms: suspicious process execution, suspicious process file access, abnormal outbound connection, and port forwarding
- Added the following alarm types to Container Alarm Events: hacker tool, file privilege escalation, important file change, abnormal process behavior, suspicious command execution, user password theft, abnormal outbound connection, and port forwarding
- Ransomware Prevention: Enabled ransomware prevention and ransomware backup separately.
- User-defined rules can be added to the alarm whitelist and duplicate alarms can be handled in batches in Handling Server Alarms.
- User-defined rules can be added to the alarm whitelist and duplicate alarms can be handled in batches in Handling Container Alarms.
- Handling Vulnerabilities: Supported the backup before vulnerability fixing.
|
| This issue is the third official release. The section "Manually Upgrading HSS" is moved to the Best Practices. |
| This issue is the second official release. |
| This issue is the first official release. |