Fixed Issues In Release 110.0.0
Here is the list of fixed issues in this release.
|318550||API Data Protection||Fixed an issue in Microsoft Teams where Netskope miscalculated the exposure of external users from B2B direct connect as internal in direct messages and/or chats.|
|316193||API Data Protection||Fixed an issue in Google Drive where clicking the Has External User count on the Google Drive dashboard page would not open the Teams page with Has External User filter set to Yes.
|295682||CASB Real-time Protection||Fixed an issue with dropbox edit activity where Instance detection was not working intermittently.|
|308063||CASB Real-time Protection||Fixed an issue where as IOS device was getting Identified generically as “Mac Device”, with this fix the device would be identified more specifically as “IOS Device”.|
|324448||CASB Real-time Protection||Fixed an issue where 0 KB files were not being processed by app connectors. With this fix admin has the ability to block 0 KB files, in case there is exfiltration happening through the filename as an example.|
|314919||Cloud Security Posture Management (CSPM)||Fixed a few rules by renaming and updating to suit CIS compliance standard more accurately :
|320874||Data Protection||Fixed an issue where DLP detects a container file with only subfolders (and no subfiles) as encrypted.|
|330447||Endpoint DLP (EPDLP)||Fixed a bug in Windows that could caused printers blocked by Printer Device Control policy to not re-enable if the policy changed. Additionally, the “Netskope DLP Service” could crash on restart if the printer was in this state.|
|322371||Endpoint DLP (EPDLP)||Some security applications interfered with Endpoint DLP content scanning on Windows. Shadow files are now evaluated using the kernel file handle rather than reopening the file for evaluation.|
|320786||Endpoint DLP (EPDLP)||Fixed a bug in Windows that could cause extra CPU use by epdlp.exe when the system was idle.|
|327741||Endpoint DLP (EPDLP)||Fixed a bug that enables the Endpoint DLP agent to function correctly with VMware Horizon VDI. Previously, the device control driver would cause the VMware Horizon virtual USB controller to hang on reboot.|
|322883||Netskope Private Access (NPA)||Fixed an issue where application discovery policies were not cached, resulting in user connection issues to private application.|
|321316||Netskope Private Access (NPA)||Fixed an issue to display the correct number of hosts in the troubleshooter|
|295769, 318604||Netskope Secure Web Gateway (NG SWG)||Improved x-policy-action Transaction Event field to report “forward” and “isolate” action more accurately.|
|317254||Netskope Secure Web Gateway (NG SWG)||When a content inspection policy is applied for HTTP1.0, the content-length header can be removed while sending http response after content inspection.
Contact Netskope support to resolve this issue.
|320771||Netskope Secure Web Gateway (NG SWG)||Fixed an authentication issue where the user was redirected to auth server multiple times.|
|321521||Netskope Secure Web Gateway (NG SWG)||There was an issue with XFF header insertion for host app when Telemetry app swap was being done and the referrer app had XFF header insertion disabled. This is now fixed and the host app would get the XFF inserted according to its configuration.|
|319108||Netskope Secure Web Gateway (NG SWG)||Fixed an issue when creating a real-time protection policy with inline file constraints. Although the constraint supports a file size limit up to (and including) 1024 GB, an error message pops when 1024 GB or larger is entered.|
|322668||Netskope Secure Web Gateway (NG SWG)||Added auth-redirect in Transaction Event x-error field when proxy is redirecting the request for authentication.|
|205384||Platform Services||Fixed an issue where if there are large number of policies with pending differences, then the request to load the pending differences modal times out .|
|15329||Remote Browser Isolation (RBI)||Fixed a bug that prevented downloading images from some sites (such as Google Images) after performing several attempts, due to an issue with the internal download path leveraged to perform the action.|
|15234||Remote Browser Isolation (RBI)||Fixed a bug that made the isolated context menu to close unexpectedly. This issue could happen if the context menu was opened within the next few seconds after the isolated web was loaded, and it was more common if isolated web pages with dynamic ads.|
|13893||Remote Browser Isolation (RBI)||Fixed an issue handling popups in isolated websites that use Cross-Site Request Forgery (CSRF) prevention techniques. The same popup URL was being visited from multiple RBI services, which led to website errors. With this fix popup URLs are only visited once within isolation.|
|15068||Remote Browser Isolation (RBI)||The pop-up indicator message did not reflect all configuration settings in web UI. Now it also includes the following settings:
|294324||SaaS Security Posture Management (SSPM)||Fixed an issue where bulk muting all the SSPM raw findings was not working correctly. Previously it muted only a fraction of findings.|
|313601||Traffic Steering||Fixed a bug on macOS when secure DNS was enabled, loopback UDP connection was broken. Even the 127.0.0.1 IP has been added to IP exception list.|
|318026||Traffic Steering||Fixed an issue that occurred with R107 new dynamic steering enhancement feature, where if global traffic mode was set to “all”, after enable dynamic steering. The off-prem steering mode was hardcode to “web” as default. This fix resets the off-prem traffic mode to “all”.|
|312188||Traffic Steering||Fixed a bug on iOS unified app that sometimes stops traffic steering functions after network switching.|
|318828||Traffic Steering||Fixed a bug in CASB mode where iOS app cannot tunnel traffic after upgrading.|
|298130||Traffic Steering||Fixed the role permission issue on Users, Devices, and Groups page where only Settings are checked but not End Users.|
|315545||Traffic Steering||When user doesn’t add any justification in client block popup, client sends “not entered by user” message to indicate this fact.|
|318954||Traffic Steering||Fixed a bug where the iOS app UI doesn’t show correct state when WiFi was disabled.|
|313093||Traffic Steering||A long e-mail address and device classification is truncated on Windows/MAC if its width does not fit in configuration box.
With the fix on MAC, long e-mail address and device classification will be truncated in the middle and can be fully displayed with extension tip.
With the fix on Windows, configuration box will adjust to fit long e-mail address and device classification with length <=128. The length longer than 128 will result in the truncation in the end.
Due to different native UI framework, these OS have different behaviors.
|320816||Traffic Steering||Fixed a bug on Windows that sometimes the client is unable to reconnect after waking up.|
|318653||Traffic Steering||Fixed a crash issue caused by accessing invalid iterator when inspecting network traffic.|
|334636||Traffic Steering||Fixed a battery consumption issue for Android devices by adding a feature flag for Netskope Client app running on Android platform.|
|309831||Traffic Steering||On Linux devices, The stAgentApp may crash randomly if there is a second user logon or on switching logon user. When stAgentApp crashes, only the communication between the Netskope client service and UI process is disconnected. However, the Linux system will auto restart the stAgentApp immediately, and the communication between service and UI will be reconnected. The other functionalities are not impacted.|
|330297||Traffic Steering||Marked the GSLB connection for OS level bypass to avoid client bypass enforcement in Android.|
|319712||Traffic Steering||Fixed a frequent tunnel disconnection issue on Chromebook. The disconnection is caused by low gateway switch threshold for 25% tunnel RTT reduction. We increased this threshold from 25% to 50% to reduce the gateway switch events.|
|329528||Traffic Steering||In Devices page, if user selected time range filter includes current time (for example: last x days), we will add current + 1 day in future to capture any incoming new device event.|
|335387||Traffic Steering||Fixed a crash issue when unenrolled extension was launched by iOS on locked device.|