BeyondTrust Discovery Agent 23.1.0 Release Notes

June 1, 2023

New Features and Enhancements:

  • Convert to batch mode writes for storing events to the local database.
  • Changed the default terminal type to dumb for SSH connections.
  • Added collection of PBUL when not installed via package manager.
  • No longer store the credentials in the scanner local database if the BI communications are capable of sending credentials on demand.
  • Converted the third party SSH engine to Rebex.
  • Added collection of Linux target role.
  • Moved the configuration setting of LogCPMessages from the registry to the PhoenixConfig.json file.
  • Optimized the credential test loop so that credentials aren't retried.
  • Add collection of PuTTY keys for domain users who have logged onto the target.
  • Cleaned up DCOM output to remove extraneous characters.
  • Add support for Arista EOS devices.
  • Finished support for Juniper (Junos) devices by adding support for User enumeration.
  • Optimized the order of SSH credentials to prefer non-elevated credentials first.
  • Added support for Palo Alto devices.
  • Improved Fortinet device support.
  • Added additional scan abort checks to allow for scan to abort in a timely fashion.
  • Added additional optional timeouts to assist in resolving hung scans.
  • Added a timeout for getting the remote system time.
  • Added a timeout to deploying the remote agent.

Issues Resolved:

  • Resolved issue in which database credentials without ports weren't using the default port.
  • Resolved issue in which the job option for enumerate database value wasn't set correctly.
  • Resolved issues in which group enumeration wasn't occurring due to unsupported SidUseTypes.
  • Fixed the collection of PuTTY keys for windows users.
  • Resolved issue which caused early aborts for scheduled scans.
  • Resolved issue which caused exceptions in IPTarget.Dispose().
  • Resolved issue which allowed a DB credential to be tried on a target it wasn't configured for.
  • Resolved an exception that occurred when a target had no IPv4 address returned by the DNS query.
  • Resolved issue in which domain users had expired passwords.
  • Resolved an issue allowing domain commands to be sent after it was determined not to allow further domain commands.
  • Resolved error which caused a failure when expanding IP ranges.

Known Issues:

  • The installation dialogs have string substitution errors.
  • Certain special characters in a MongoDB password will cause the connection string to be improperly formatted and the connection will fail. For this release, avoid using special characters in the MongoDB password.

Notes:

  • Direct upgrades to this version are supported from versions 20.1.0 and later.
  • This release is available by download from the BeyondTrust Client Portal at https://beyondtrustcorp.service-now.com/csm.
  • The MD5 signature is: 63a3030a39062b51c3c7218cf6933980
  • The SHA-1 signature is: 457c6580385be518d9e895fe693b4ae4879e7b89
  • The SHA256 signature is: b9f7da37eaa01604eba47be4326bdaaddda1a89ddaa38390bcf259e46e716cdd