Resolved issues
The following issues have been fixed in version 6.0.0. For inquires about a particular bug, please contact Customer Service & Support.
Bug ID |
Description |
---|---|
968262 |
Support firmware upgrade for clients on DaaS web GUI. |
973951 |
Support utilized session management for HTTP/HTTPS servers and Web APP proxy on all Linux based decoys. |
976829 |
Report hash md5 and sha256 for dumped files in syslog. |
981976 |
Uploading a license name with parenthesis () returns an invalid request. |
986593 |
Support SSH mitigation for Linux endpoint. |
990365 |
FortiDeceptor sometimes only syncs the detected attacker IP to part of the integrated FortiGates. |
990568 |
Windows
decoy: No events/incidents are reported when and attacker uses |
996260 |
FortiDeceptor cannot send emails if the mail server and deployment network are in the same VLAN. |
996920 |
Cannot configure LDAP password when it contains an equals (=) sign. |
1001097 |
Custom Windows decoy with IIS not accepting certificates. |
1001169 |
Auto VLAN discovery does not work. |
1004351 |
FDCVME models require a new OVF config file. |
1015070 |
Allow users to specify the HDD size when customizing decoy OS. |
1023691 |
Alert mail: Disable Binary Infection by default. |
1023723 |
Support for report MSSQL events generated by accessing locally. |
1028407 |
Support complex usernames extracted from LDAP import. |
1032133 |
Fabric CheckPoint can only install policy package named Standard. |
1035895 |
Remove HTTP/TELNET support from admin interface for all models |
1038557 |
Support
|
1045747 |
Decoy created from a saved template causes password errors unless lures are regenerated. |
1051515 |
Update the OVF configuration zip structure or both FDCVMS and FDCVME |
1053053 |
Deployment network is not able to deploy monitors for the cloud client. |
1053290 |
Convert supported certificate format to PEM |
FortiDeceptor Cloud
Common vulnerabilities and exposures
985985 |
FortiDeceptor 6.0.0 is no longer vulnerable to the following CVE:
|