Known issues
The following issues have been identified in 5.2.1. For inquires about a particular bug or to report a bug, please contact Customer Service & Support.
Bug ID |
Description |
---|---|
889422 |
Remote shell connection cannot be established if collector connects to aggregator via a proxy server. |
834342 824506 |
New integrations (Google SCC and User Access) require the use of Core build 5.2.0.2139 or above. |
840669 |
Rest API is not enforcing users roles permissions. |
839706 |
Custom connectors and actions cannot be viewed by a user without checking the “Custom script” checkbox for that user. |
837796 |
In multi-tenant environments, SAML/LDAP authentication of Admin users with All organizations (hoster) scope provides permissions only to the default organization after the upgrade from 5.0 or 5.2.0 to 5.2.1. Workaround: Reconfigure SAML/LDAP in hoster view after upgrading to 5.2.1. |
837675 |
No on-premise support. |
812319 |
FortiEDR Connect cannot be used to run commands that are user-interactive |
811290 |
It is not possible to redirect FortiEDR web to a URL that is different than the one provided by Fortinet. |
809060 |
FortiEDR Connect session may be disconnected due to inactivity of the FortiEDR Console, even though the Connect session is active. |
807930 |
Application Control search only works by exact match |
786156 |
Windows security center registration is not supported with Windows servers 2019 and above. |
777707 |
Linux Collector content file is large and uploads slowly to the Central Manager. |
772449 |
In Windows Security Center > Virus and Threat Protection, when you click "open app", end-user notification is presented instead of the FortiEDR tray app. |
771666 |
OS indication is missing under Inventory and Dashboard for Linux Collector for Centos 6. |
771630 |
Device internal and external IP is missing from Threat Hunting events of Linux devices. |
771619 |
Organization filter under Threat Hunting Hoster view malfunctions. |
771044 |
SAML authentication cannot work with different organizations that use the same SAML Azure account. Workaround: Use different Azure accounts for different FortiEDR organizations. |
765785 |
In the presence of an email filtering system and/or a mail transfer agent that modifies the URL content, the installer download URL might include space(s) or %20s in it, which are added by the system/agent. This results in a signature error message from the installer storage. Workaround: In such cases, the URL should be amended to drop the redundant space/%20 before it can be used. |
765648 |
Threat hunting exclusions cannot be set on log events coming from Linux devices |
759573 |
Collector upgrade via custom installer requires password. |
733603 |
Downgrading the Collector Version: When downgrading and restarting a device, the Collector does not start. Workaround: Uninstall the Collector, reboot the device and then install the older version. |
733601 |
Isolation and communication control connection denial are not supported with Oracle Linux Collectors. |
733600 |
A newly created API user cannot connect to the system via the API. Workaround: Before sending API commands, a new user with the API role should log into the system at least once in order to set the user’s password. |
733598 |
Safari 11.1 on MacOS malfunctions when viewing events. |
733595 |
Limited support when accessing the Manager Console with Internet Explorer, EdgeHTML and Safari 13 or above. Chromium Edge is supported, as well as Chrome, FireFox and Safari 11 and above. |
733592 |
Number of destinations under communication control is limited to 100 IP addresses. |
733560 |
SAML Authentication can fail when used with Azure SSO due to exceeded time skew. Workaround: Sign out and then sign in again to Azure so that the date and time provided to FortiEDR are refreshed. |
733559 |
Some AV Products, including Windows Defender and some versions of FortiClient, require that their realtime protection be disabled in order to be installed alongside a FortiEDR Collector. This is the result of FortiEDR registration as an antivirus (AV) in the Microsoft Security Center that was introduced in V4.0. Although there is no need for more than a single AV product to be installed on a device, FortiEDR can be smoothly installed, even if there is another AV already running. However, there are some other products whose installation fails when there are other AV products already registered. Workaround: Disable realtime protection on the other product, or remove FortiEDR’s AV registration with Microsoft Security Centervia UI. |
733557 |
A Collector may fail to install or upgrade on old Windows 7 and Server 2008 devices that cannot decrypt strong ciphers with which FortiEDR Collector is signed. Workaround: Patch Windows with Microsoft KB that provides SHA-256 code sign support. |
733550 |
Upgrading from Older Versions: A direct upgrade path for backend components (Central Manager, Aggregator, Core, Threat Hunting Repository) of V5.0.2 or earlier is not supported. Workaround: Upgrade the older environment to V5.0.3 before upgrading it to V5.2. |
733548 |
Component Backward Compatibility: v5.2 Central Manager supports Cores/Collectors from older versions with limited functionality. Some new features introduced in later versions may not be available. |