Resolved issues
The following issues have been fixed in version 4.2.0. For inquires about a particular bug, please contact Customer Service & Support.
Bug ID |
Description |
---|---|
778027 |
NFR: Support the HyperV virtual platform for FDC VM model. |
771791 |
NFR: Support New Deception Token Module. |
778998 |
NFR: Prepare new deception OS base image Ubuntu16v2. |
771786 |
NFR: Support FTP service on Linux and Windows decoys. |
771793 |
NFR: FortiSIEM Watch-List Integration and Alerts Reporting. |
771800 |
NFR: Fabric Integration with CrowdStrike isolation. |
771806 |
NFR: Support Attacker IP-DNS Resolving. |
771812 |
NFR: Support ARP Poisoning attacks detection. |
771796 |
NFR: Fabric Integration with Cuckoo Malware Sandbox. |
771805 |
NFR: Support STIX/TAXII / MISP TI Connector. |
759738 |
NFR: Support 2 DNS IP in decoy. |
763249 |
NFR: Provide GUI page to
input the activation ID instead of |
774445 |
NFR: Implement HTTP/HTTPS proxy support for web filter. |
771776 |
NFR: Asset Discovery stage 1 - Passive OS fingerprint. |
771779 |
NFR: Support ESXi Decoy. |
771785 |
NFR: Support medical BBraun Infusomat Space Decoy. |
771789 |
NFR: Support Elasticsearch service decoy. |
771803 |
NFR: Fabric Integration with MS ATP Manager. |
773486 |
NFR: Improve the PDF report with similar structure as FAZ deception incidents report. |
722102 |
NFR: Inspect the related traffic only for incident to save HDD when there is a high volume traffic. |
759090 |
NFR: Support automated un-installation process into Token installation for domain ENV. |
795293 |
NFR: Support for creating Incident reports. |
682479 |
NFR: Support 2 FA authentication for radius. |
789797 |
CSS: Custom SMB share folders to different groups in Custom Windows Image should not be ignored. |
771675 |
CSS: The email alert attached to all the events information in HTML format as attachments which should be in email body. |
777413 |
CSS: Issues with PAN Integration. |
798135 |
FortiDeceptor - FortiSandbox / FortiDeceptor - No profile-based access control over APIs. |
775218 |
Install ubuntu token failed for permission denied. |
803008 |
Cloud client: Login page crashed in brand new Azure clients. |
785637 |
Cloud client: Login page crashed in brand new GCP clients. |
794879 |
Administrative access should only be enabled on Port1. |
771670 |
Only the HDD file system error should be reported. |
773478 |
Email rules should allow user to choose multiple severity levels. |
797106 |
Display license expiry date in license page. |
777864 |
Outgoing traffic from windows decoys. |
777923 |
Improve time stamp convert function to reduce time. |
788930 |
Email alert customer issues. |
779644 |
HTTP OPTIONS requests are being made to network shares and are being logged as medium risk incidents. |
779634 |
Decoy status page: Hide the password for domain in Network section. |
800480 |
TP LINK router: TP LINK Web Postman access failed. |
779642 |
Support upper case for SMB share name for windows decoys. |
777528 |
Custom Windows 2019: Missing SMB events. |
Common Vulnerabilities and Exposures
Visit https://fortiguard.com/psirt for more information.
Bug ID |
CVE references |
---|---|
798135 |
FortiDeceptor 4.2.0 is no longer vulnerable to the following CVE:
|