BeyondInsight for Unix and Linux 21.2 Release Notes
October 26, 2021
New Features and Enhancements:
Console Auditing Management:
Added middleware to capture user.
Added console audit section and session grid.
Added session summary grid.
Added sessions details to session summary.
Added audit models and API.
Added new settings to optionally send console audit data to syslog.
File Integrity Monitoring (FIM) Reports:
Added FIM reports section and grid.
Added report detail section.
Added reporting filters to details and reports sections.
Added FIM Client section and FIM host list.
Added FIM landing page to policy section.
Added FIM execution client.
FIM policy assignment moved to FIM client section, removed from header menu.
Added API to execute FIM reports.
ADB Management Enhancements:
Added domain leave, delete computer object option to uninstall.
Added domain leave action.
Added domain join as an optional step for ADB installation.
Added domain browser to domain join and install actions.
Improved logging for failed SSH connections.
Added row menu to policy server list.
RBP and script policy sub-navigation is now a single element that redirects based on configuration.
Added uniquieid as IO log builder variable.
Multiple IP addresses can now be discovered in one action.
Expiring and expired certificates are highlighted in certificate management grid.
Added table of contents configuration to IO log builder in script policy.
Added v2 and v3 endpoints to Swagger.
Resolved profile crash on unknown RNS primary.
Resolved error rolling secrets when data was empty.
Updated parsing of namingContexts for IDM to retrieve first valid one.
Cleanup now occurs when an action fails when using delegation.
BeyondTrust is the worldwide leader in intelligent identity and access security, enabling organizations to protect identities, stop threats, and deliver dynamic access. We offer the only platform with both intelligent identity threat detection and a privilege control plane that delivers zero-trust based least privilege to shrink your attack surface and eliminate security blind spots.