Resolved issues
The following issues have been fixed in version 4.2.0. For inquires about a particular bug, please contact Customer Service & Support.
|
Bug ID |
Description |
|---|---|
|
778027 |
NFR: Support the HyperV virtual platform for FDC VM model. |
|
771791 |
NFR: Support New Deception Token Module. |
|
778998 |
NFR: Prepare new deception OS base image Ubuntu16v2. |
|
771786 |
NFR: Support FTP service on Linux and Windows decoys. |
|
771793 |
NFR: FortiSIEM Watch-List Integration and Alerts Reporting. |
|
771800 |
NFR: Fabric Integration with CrowdStrike isolation. |
|
771806 |
NFR: Support Attacker IP-DNS Resolving. |
|
771812 |
NFR: Support ARP Poisoning attacks detection. |
|
771796 |
NFR: Fabric Integration with Cuckoo Malware Sandbox. |
|
771805 |
NFR: Support STIX/TAXII / MISP TI Connector. |
|
759738 |
NFR: Support 2 DNS IP in decoy. |
|
763249 |
NFR: Provide GUI page to
input the activation ID instead of |
|
774445 |
NFR: Implement HTTP/HTTPS proxy support for web filter. |
|
771776 |
NFR: Asset Discovery stage 1 - Passive OS fingerprint. |
|
771779 |
NFR: Support ESXi Decoy. |
|
771785 |
NFR: Support medical BBraun Infusomat Space Decoy. |
|
771789 |
NFR: Support Elasticsearch service decoy. |
|
771803 |
NFR: Fabric Integration with MS ATP Manager. |
|
773486 |
NFR: Improve the PDF report with similar structure as FAZ deception incidents report. |
|
722102 |
NFR: Inspect the related traffic only for incident to save HDD when there is a high volume traffic. |
|
759090 |
NFR: Support automated un-installation process into Token installation for domain ENV. |
|
795293 |
NFR: Support for creating Incident reports. |
|
682479 |
NFR: Support 2 FA authentication for radius. |
|
789797 |
CSS: Custom SMB share folders to different groups in Custom Windows Image should not be ignored. |
|
771675 |
CSS: The email alert attached to all the events information in HTML format as attachments which should be in email body. |
|
777413 |
CSS: Issues with PAN Integration. |
|
798135 |
FortiDeceptor - FortiSandbox / FortiDeceptor - No profile-based access control over APIs. |
|
775218 |
Install ubuntu token failed for permission denied. |
|
803008 |
Cloud client: Login page crashed in brand new Azure clients. |
|
785637 |
Cloud client: Login page crashed in brand new GCP clients. |
|
794879 |
Administrative access should only be enabled on Port1. |
|
771670 |
Only the HDD file system error should be reported. |
|
773478 |
Email rules should allow user to choose multiple severity levels. |
|
797106 |
Display license expiry date in license page. |
|
777864 |
Outgoing traffic from windows decoys. |
|
777923 |
Improve time stamp convert function to reduce time. |
|
788930 |
Email alert customer issues. |
|
779644 |
HTTP OPTIONS requests are being made to network shares and are being logged as medium risk incidents. |
|
779634 |
Decoy status page: Hide the password for domain in Network section. |
|
800480 |
TP LINK router: TP LINK Web Postman access failed. |
|
779642 |
Support upper case for SMB share name for windows decoys. |
|
777528 |
Custom Windows 2019: Missing SMB events. |
Common Vulnerabilities and Exposures
Visit https://fortiguard.com/psirt for more information.
|
Bug ID |
CVE references |
|---|---|
|
798135 |
FortiDeceptor 4.2.0 is no longer vulnerable to the following CVE:
|