Fixed Issues In Release 113.0.0
Fixed Issues In Release 113.0.0
Here is the list of fixed issues in this release.
Issue Number | Category | Description |
---|---|---|
387518 | API Data Protection | With this fix, policies can be targeted at files that are shared only with ‘everyone’ preset group. This can be achieved in the policy wizard page by selecting Content > Specific Sharing Options > Enterprise Shared > Everyone. |
397523 | CASB Inline Protection | With this fix, you will be able to schedule Google meeting with room reservation via Reverse proxy. |
394732 | CASB Inline Protection | You can now access the release progress page of Azure devops using the direct link instead of navigating from Home page through Reverse Proxy. |
391936 | CASB Inline Protection | You can now integrate Knowbler with Salesforce through Reverse Proxy. |
396617 | Data Protection | Fixed an issue where DLP alerts and incidents were not generated when DLP received advanced profiles and DLP file profiles for scanning. |
413286 | Data Protection | Fixed an issue that resulted in missed profile match when an advance DLP profile was used with a combination of DLP rule and DLP fingerprints, and the file scanned is a container with multiple subfiles matching one of the conditions. |
423472 | Data Protection | Fixed an issue with advanced DLP profile that used two DLP rules. This resulted in a match, even though when one of the rules did not have matches over the threshold selected for action. |
394744 | Endpoint DLP (EPDLP) | Endpoint DLP now properly blocks Android devices mounted through USB when using the MacDroid application. |
355618 | Endpoint DLP (EPDLP) | Events now include true file type for all files copied to USB mass storage. |
330915 | Endpoint DLP (EPDLP) | In the macOS Endpoint DLP events, the Activity field is updated from Modify to Edit, to ensure consistency across platforms. |
394215 | Netskope Secure Web Gateway (NG SWG) | Fixed an issue where web pages did not load optimally with CEP or IPSEC/GRE configurations. This fix corrects how Content Security Policies (CSP) are applied, ensuring optimal loading across all affected websites. |
372010 | Netskope Secure Web Gateway (NG SWG) | Updated the text in Manage > Certificates > Signing CA, the certificate rotation section, from “Current Certificate (Expiring soon)” to “Expiring Certificate”. This will distinguish between certificates that are expiring and due for rotation and new certificates generated. |
371958 | Netskope Secure Web Gateway (NG SWG) | To strike a balance between notifying customers about expiring certificates and not hampering their operational workflows, the certificate rotation notice is now shown at most once, per login session. |
374195 | Netskope Secure Web Gateway (NG SWG) | Fixed an issue where username was not getting populated from IP surrogate for IPSEC based TLS client errors. |
371849 | Netskope Secure Web Gateway (NG SWG) | Fixed an issue when a a single request was sent with two files, the first file returned policy action as Block and second file returned policy action as Allow. Both the requests were allowed and the files were uploaded. |
357510 | Netskope Secure Web Gateway (NG SWG) | Fixed a lookup bug that skipped wildcard certificate creation for public suffix. This fix can be enabled by enabling staged config flag. This flag does not create wildcard certificates for all public suffix domains. |
341566 | Netskope Secure Web Gateway (NG SWG) | The “x-error” field in the transaction event will be populated with “unallowed-custom-port” error string when a user tries to connect to a non-standard port through the proxy. |
397985 | Netskope Secure Web Gateway (NG SWG) | Fixed a SQL syntax error that appeared while fetching policies for few tenants. |
395273 | Netskope Secure Web Gateway (NG SWG) | Fixed an issue where SSL Decryption Policies using Applications names older than three years were not triggered correctly. |
389669 | Netskope Secure Web Gateway (NG SWG) | With this fix, Netskope forwards http2 ping frames from client to backend server and provides you a chance to recover when server is not responding in the session. |
371939 | Netskope Secure Web Gateway (NG SWG) | Fixed the URL link from the Manage > Certificates Page to “/settings?view=certificates”. In addition, added sub-routes to different tabs in Certificates:
|
367850 | Netskope Secure Web Gateway (NG SWG) | Fixed an issue with Real Time Protection Policies with “Block/Alert/Allow” and “Device Classification” present in the source criteria, when applied to traffic generated in an isolated browsing session. |
18357 | Remote Browser Isolation (RBI) | Fixed a page rendering issue where RBI was delivering a full refresh rendering instead of refreshing only a portion of the isolated web page, resulting in a choppy user experience in certain user interactions. |
392206 | Traffic Steering | Fixed an issue in Netskope Client for Windows where the Netskope UI did not pop up when you left click the Netskope Client icon from the System Tray. |
391686 | Traffic Steering | Fixed an issue where Wi-Fi strength was displayed as 0% in macOS devices running Sonoma. |
402499 | Traffic Steering | Fixed an issue that caused the failure of adding a new account to Gmail on Android when NS tunnel was connected. Adding a new account uses QUIC based network connection, which is not supported by NS proxy. The QUIC connection was blocked due to which it falls back on regular TCP connection to ensure the success of adding a new Gmail account. |
400225 | Traffic Steering | With this fix, when the config encryption is enabled, the Netskope Client can now correctly read the user folder if it has multi-byte characters in that path. |
395253 | Traffic Steering | Fixed a traffic bypass issue that occurred when the user attempts to customize category to exclude some domains. |
394366 | Traffic Steering | Fixed Microsoft Teams app login issue on Android when NS tunnel was connected. The issue was caused by bypassing authentication traffic, which was not accepted by ADFS as the source IP was not in Netskope IP range. To fix the issue, we ensured the authentication traffic was steered so it is from Netskope IP range. |
394227 | Traffic Steering | Fixed an issue where using the same`nsdeviceuid` with different `username` threw duplicate user_info error. |
393590 | Traffic Steering | Before enrollment, the Netskope Client status events are generated with the default value. When the events are uploaded, the Client modifies the nsdeviceuid of the Client status event according to the tenant Client Configuration. |
392206 | Traffic Steering | Fixed an issue in Netskope Client for Windows where the Netskope UI did not pop up when you left click the Netskope Client icon from the System Tray. |
327682 | Traffic Steering | Fixed an unexpected traffic bypass issue on Windows when it is configured in a cert-pin app rule with Block action. |