Fortinet white logo
Fortinet white logo

Resolved issues

Resolved issues

The following issues have been fixed in version 4.0.0. For inquires about a particular bug, please contact Customer Service & Support.

Bug ID

Description

549814

FortiDeceptor VM model does not verify that the interface exists before using it.

638855

NFR: FortiDeceptor data storage management for both database and HDD raw files.

675746

NFR: Implement new hardware model FDC-1000G.

700956

The Lures generator does not use the same file type of the assigned tag.

700971

The Lure generation credentials do not 't follow the imported credentials format.

701059

NFR: Implement SAML Single-Sign-On for Fabric Pairing.

704628

NFR: FortiDeceptor should update its automation integration with FortiOS to use the new Fabric Connector Event trigger.

706907

Admin-Admin profile-user with None access can still get data and change the admin dashboard layout.

708988

Improve the CM manager to support firmware images downloaded for different models.

709347

Medical telnet: Use the restricted shell to prevent the user from using the dangerous commands such as ssh.

709635

NFR: FDC new license model support.

709636

NFR: FDC new VM series license support.

709638

NFR: FDC new VLAN license support.

709640

NFR: Support 1 STATIC/DHCP IP for each NIC in decoys.

710329

Token improvement: Install token information as much as possible for logon user only except ARP lures.

710366

FortiDeceptor should not directly query the main server. Instead, download a Web-Filter servers list from main server.

710397

NFR: Improve the incident analysis system to filter out the SMB incidents which are triggered by lure token package.

711038

Ransomware Detector Update.

711043

NFR: New deception OS for Printer Decoy.

711052

NFR: New deception OS for CISCO decoy

711053

NFR: New deception OS for IP Camera.

711056

NFR: New honey doc token for PDF lure files.

711058

NFR: New honey doc token for DOCX lure files.

711064

NFR: Add Time Zone for each login user to provide the incidents based on user location.

711065

NFR: Integrate with FSA to get more detail forensic result for dumped files.

711066

NFR: Integrate with Virus Total to get further scan results.

711068

NFR: Fabric integration with FortiNAC.

711089

NFR: New deception lure service of active NetBios Name Service in windows decoys

713597

The highlight the Delete request in ERP/POS/Medical web service.

714333

NFR: Implement SCADA powermeter decoy set with DNP support.

714866

Improve the CM appliance configuration tabs.

715716

The pcap file does not get purged after several days.

715764

Windows decoy-SMB token-installation process stalls when there are network issues.

717590

NFR: New license support in autodeployment.

718809

NFR: Implement new logic for ransomware detection.

719130

NFR: rebuild the deception base OS image for Win7X86.

720165

NFR: FDCVM model - The GUI in the dashboard needs to provide the recommended decoy instance number based on the configured vCPU/RAM.

720981

FortiDeceptor - Potential unsafe calls to system() in CLI code

720987

Potential unsafe calls to system() in CLI code.

722411

NFR: Support the automated replacement for deception image among versions

725844

Limit the SSO user privilege on FortiDeceptor.

726289

Deploying tokens using AD GPO logon script issues.

727165

NFR: Support USG mode in FortiDeceptor.

728233

Remove redundant system logs while the downstream FortiDeceptor is waiting for upstream authorization.

729042

Filter out the file event of .zone.indentifier.

730057

Radius users with ReadOnly profiles have a few non-ReadOnly privileges.

730291

Client fails to get Deception OS if Manager don't have

730610

Improve the pcap dumper to only save the TCP/UDP traffic to reduce the pcap file size.

731535

Improve the Lure generator to allocate part of the username for each service.

733513

FortiDeceptor - [FortiDeceptor] OS command injection.

733588

Remove AV Scan Result field from PCAP file.

733610

FortiDeceptor - [FortiDeceptor] OS command injection.

733676

Manager should only allow deployment to Appliance when status is Approved.

733695

The Incident type should be set as Infection when the dumped file is a virus.

733754

The GUI in the FortiGuard page Web Filter override is not working.

733845

FortiDeceptor - [FortiDeceptor] OS command injection.

734319

Update the FortiDeceptor VM model template to increase the CPU/Memory.

735603

FGT decoy/VM container can only support 10 nic, and cannot support FDC 24 dhcp mode.

735638

The ssh Ubuntu decoy, isniffer does not catch any traffic.

Resolved issues

Resolved issues

The following issues have been fixed in version 4.0.0. For inquires about a particular bug, please contact Customer Service & Support.

Bug ID

Description

549814

FortiDeceptor VM model does not verify that the interface exists before using it.

638855

NFR: FortiDeceptor data storage management for both database and HDD raw files.

675746

NFR: Implement new hardware model FDC-1000G.

700956

The Lures generator does not use the same file type of the assigned tag.

700971

The Lure generation credentials do not 't follow the imported credentials format.

701059

NFR: Implement SAML Single-Sign-On for Fabric Pairing.

704628

NFR: FortiDeceptor should update its automation integration with FortiOS to use the new Fabric Connector Event trigger.

706907

Admin-Admin profile-user with None access can still get data and change the admin dashboard layout.

708988

Improve the CM manager to support firmware images downloaded for different models.

709347

Medical telnet: Use the restricted shell to prevent the user from using the dangerous commands such as ssh.

709635

NFR: FDC new license model support.

709636

NFR: FDC new VM series license support.

709638

NFR: FDC new VLAN license support.

709640

NFR: Support 1 STATIC/DHCP IP for each NIC in decoys.

710329

Token improvement: Install token information as much as possible for logon user only except ARP lures.

710366

FortiDeceptor should not directly query the main server. Instead, download a Web-Filter servers list from main server.

710397

NFR: Improve the incident analysis system to filter out the SMB incidents which are triggered by lure token package.

711038

Ransomware Detector Update.

711043

NFR: New deception OS for Printer Decoy.

711052

NFR: New deception OS for CISCO decoy

711053

NFR: New deception OS for IP Camera.

711056

NFR: New honey doc token for PDF lure files.

711058

NFR: New honey doc token for DOCX lure files.

711064

NFR: Add Time Zone for each login user to provide the incidents based on user location.

711065

NFR: Integrate with FSA to get more detail forensic result for dumped files.

711066

NFR: Integrate with Virus Total to get further scan results.

711068

NFR: Fabric integration with FortiNAC.

711089

NFR: New deception lure service of active NetBios Name Service in windows decoys

713597

The highlight the Delete request in ERP/POS/Medical web service.

714333

NFR: Implement SCADA powermeter decoy set with DNP support.

714866

Improve the CM appliance configuration tabs.

715716

The pcap file does not get purged after several days.

715764

Windows decoy-SMB token-installation process stalls when there are network issues.

717590

NFR: New license support in autodeployment.

718809

NFR: Implement new logic for ransomware detection.

719130

NFR: rebuild the deception base OS image for Win7X86.

720165

NFR: FDCVM model - The GUI in the dashboard needs to provide the recommended decoy instance number based on the configured vCPU/RAM.

720981

FortiDeceptor - Potential unsafe calls to system() in CLI code

720987

Potential unsafe calls to system() in CLI code.

722411

NFR: Support the automated replacement for deception image among versions

725844

Limit the SSO user privilege on FortiDeceptor.

726289

Deploying tokens using AD GPO logon script issues.

727165

NFR: Support USG mode in FortiDeceptor.

728233

Remove redundant system logs while the downstream FortiDeceptor is waiting for upstream authorization.

729042

Filter out the file event of .zone.indentifier.

730057

Radius users with ReadOnly profiles have a few non-ReadOnly privileges.

730291

Client fails to get Deception OS if Manager don't have

730610

Improve the pcap dumper to only save the TCP/UDP traffic to reduce the pcap file size.

731535

Improve the Lure generator to allocate part of the username for each service.

733513

FortiDeceptor - [FortiDeceptor] OS command injection.

733588

Remove AV Scan Result field from PCAP file.

733610

FortiDeceptor - [FortiDeceptor] OS command injection.

733676

Manager should only allow deployment to Appliance when status is Approved.

733695

The Incident type should be set as Infection when the dumped file is a virus.

733754

The GUI in the FortiGuard page Web Filter override is not working.

733845

FortiDeceptor - [FortiDeceptor] OS command injection.

734319

Update the FortiDeceptor VM model template to increase the CPU/Memory.

735603

FGT decoy/VM container can only support 10 nic, and cannot support FDC 24 dhcp mode.

735638

The ssh Ubuntu decoy, isniffer does not catch any traffic.