Fixed Issues In Release 113.0.0

Fixed Issues In Release 113.0.0

Here is the list of fixed issues in this release.

Issue NumberCategoryDescription
387518API Data ProtectionWith this fix, policies can be targeted at files that are shared only with ‘everyone’ preset group. This can be achieved in the policy wizard page by selecting Content > Specific Sharing Options > Enterprise Shared > Everyone.

397523CASB Inline ProtectionWith this fix, you will be able to schedule Google meeting with room reservation via Reverse proxy.
394732CASB Inline ProtectionYou can now access the release progress page of Azure devops using the direct link instead of navigating from Home page through Reverse Proxy.
391936CASB Inline ProtectionYou can now integrate Knowbler with Salesforce through Reverse Proxy.
396617Data ProtectionFixed an issue where DLP alerts and incidents were not generated when DLP received advanced profiles and DLP file profiles for scanning.
413286Data ProtectionFixed an issue that resulted in missed profile match when an advance DLP profile was used with a combination of DLP rule and DLP fingerprints, and the file scanned is a container with multiple subfiles matching one of the conditions.
423472Data ProtectionFixed an issue with advanced DLP profile that used two DLP rules. This resulted in a match, even though when one of the rules did not have matches over the threshold selected for action.
394744Endpoint DLP (EPDLP)Endpoint DLP now properly blocks Android devices mounted through USB when using the MacDroid application.
355618Endpoint DLP (EPDLP)Events now include true file type for all files copied to USB mass storage.
330915Endpoint DLP (EPDLP)In the macOS Endpoint DLP events, the Activity field is updated from Modify to Edit, to ensure consistency across platforms.
372010Netskope Secure Web Gateway (NG SWG)Updated the text in Manage > Certificates > Signing CA, the certificate rotation section, from “Current Certificate (Expiring soon)” to “Expiring Certificate”. This will distinguish between certificates that are expiring and due for rotation and new certificates generated.
371958Netskope Secure Web Gateway (NG SWG)To strike a balance between notifying customers about expiring certificates and not hampering their operational workflows, the certificate rotation notice is now shown at most once, per login session.
374195Netskope Secure Web Gateway (NG SWG)Fixed an issue where username was not getting populated from IP surrogate for IPSEC based TLS client errors.
371849Netskope Secure Web Gateway (NG SWG)Fixed an issue when a a single request was sent with two files, the first file returned policy action as Block and second file returned policy action as Allow. Both the requests were allowed and the files were uploaded. 
357510Netskope Secure Web Gateway (NG SWG)Fixed a lookup bug that skipped wildcard certificate creation for public suffix. This fix can be enabled by enabling staged config flag. This flag does not create wildcard certificates for all public suffix domains.
341566Netskope Secure Web Gateway (NG SWG)The “x-error” field in the transaction event will be populated with “unallowed-custom-port” error string when a user tries to connect to a non-standard port through the proxy.
397985Netskope Secure Web Gateway (NG SWG)Fixed a SQL syntax error that appeared while fetching policies for few tenants.
395273Netskope Secure Web Gateway (NG SWG)Fixed an issue where SSL Decryption Policies using Applications names older than three years were not triggered correctly.
389669Netskope Secure Web Gateway (NG SWG)With this fix, Netskope forwards http2 ping frames from client to backend server and provides you a chance to recover when server is not responding in the session.
371939Netskope Secure Web Gateway (NG SWG)Fixed the URL link from the Manage > Certificates Page to “/settings?view=certificates”. In addition, added sub-routes to different tabs in Certificates:

  • Trusted CA: /settings?view=certificates?tab=trusted

  • Signing CA: /settings?view=certificates?tab=signing

  • Private APP Cert: /settings?view=certificates?tab=private-app
367850Netskope Secure Web Gateway (NG SWG)Fixed an issue with Real Time Protection Policies with “Block/Alert/Allow” and “Device Classification” present in the source criteria, when applied to traffic generated in an isolated browsing session.
18357Remote Browser Isolation (RBI)Fixed a page rendering issue where RBI was delivering a full refresh rendering instead of refreshing only a portion of the isolated web page, resulting in a choppy user experience in certain user interactions.
392206Traffic SteeringFixed an issue in Netskope Client for Windows where the Netskope UI did not pop up when you left click the Netskope Client icon from the System Tray.
391686Traffic SteeringFixed an issue where Wi-Fi strength was displayed as 0% in macOS devices running Sonoma.
402499Traffic SteeringFixed an issue that caused the failure of adding a new account to Gmail on Android when NS tunnel was connected. Adding a new account uses QUIC based network connection, which is not supported by NS proxy. The QUIC connection was blocked due to which it falls back on regular TCP connection to ensure the success of adding a new Gmail account.
400225Traffic SteeringWith this fix, when the config encryption is enabled, the Netskope Client can now correctly read the user folder if it has multi-byte characters in that path.
395253Traffic SteeringFixed a traffic bypass issue that occurred when the user attempts to customize category to exclude some domains.
394366Traffic SteeringFixed Microsoft Teams app login issue on Android when NS tunnel was connected. The issue was caused by bypassing authentication traffic, which was not accepted by ADFS as the source IP was not in Netskope IP range. To fix the issue, we ensured the authentication traffic was steered so it is from Netskope IP range.
394227Traffic SteeringFixed an issue where using the same`nsdeviceuid` with different `username` threw duplicate user_info error.
393590Traffic SteeringBefore enrollment, the Netskope Client status events are generated with the default value. When the events are uploaded, the Client modifies the nsdeviceuid of the Client status event according to the tenant Client Configuration.
392206Traffic SteeringFixed an issue in Netskope Client for Windows where the Netskope UI did not pop up when you left click the Netskope Client icon from the System Tray.
327682Traffic SteeringFixed an unexpected traffic bypass issue on Windows when it is configured in a cert-pin app rule with Block action.
Share this Doc

Fixed Issues In Release 113.0.0

Or copy link

In this topic ...