Release Note for CTE v7.4 for Windows
Release Note | Version | Date |
---|---|---|
v7.3.0.135 | version 1 | 2022-11-22 |
v7.3.0.135 | version 2 | 2023-02-13 |
v7.3.0.154 | version 3 | 2023-02-17 |
Release v7.3.0.135 of CipherTrust Transparent Encryption (CTE) for Windows adds new features, fixes known defects and addresses known vulnerabilities.
New Features and Enhancements
The major improvements to CTE for Windows in this release are:
-
Ransomware Protection Support
CTE Agent now monitors volumes and detects Ransomware. It protects all of your data from a Ransomware attack.
See Ransomware Protection Support for more information.
-
Support for Microsoft Cluster Shared Volume
-
LDT Access Only Nodes
CipherTrust Transparent Encryption now supports clients accessing LDT CIFS shares for read/write operations without requiring them to become part of an LDT Communication Group, or participate in data transformation.
See LDT Access Only Node for more information.
-
Integration with Microsoft OneDrive with CTE
You can now encrypt Microsoft OneDrive files with CTE for standard policies on a Windows server.
See Encrypt Microsoft OneDrive files with CTE for more information.
**Scenario 2**: If user uninstalls CTE agent and then installs CTE v7.3.0, CTE will be running the `VMLFS` driver so the user must manually switch the driver back to the `VMFilter` driver to continue guarding the CIFS shares. To manually switch the driver back to the legacy `VMFILTR` driver: 1. Type: `voradmin config enable vmfiltr` 2. Reboot the system. Thales has now released [Patch 7.3.0.154]({filename}/pages/patch-notes/windows-pn/7.3.0.154_windows.md) to support standard policies protecting CIFS shares with the `VMLFS` driver which addresses the above mentioned deployment limitation. {.note}
-
CIFS shares guarded with a standard policy are not supported with the
VMLFS
driver in this release. It is only supported with theVMFILTR
driver.Scenario 1: The user upgrades from an earlier version of CipherTrust Transparent Encryption to v7.3.0. The upgrade process does not automatically switch the driver from legacy
VMFILTR
toVMLFS
so CTE will continue to run theVMFILTR
driver and therefore, continue to guard the CIFS shares with the assigned standard policy.Scenario 2: If user uninstalls CTE agent and then installs CTE v7.3.0, CTE will be running the
VMLFS
driver so the user must manually switch the driver back to theVMFilter
driver to continue guarding the CIFS shares. To manually switch the driver back to the legacy vmfiltr driver:-
Type:
voradmin config enable vmfiltr
-
Reboot the system.
-
CipherTrust Transparent Encryption v7.3.0, and subsequent versions, allows users to modify the Key Rules while an LDT policy is active and enforced on a client. Users can add new rules and modify the existing rules.
See Modifying Key Rules for more information.
-
-
DUO MFA Support
You can now use Cisco DUO for Multifactor Authentication for CTE GuardPoint.
See Using Cisco DUO for Multifactor Authentication for CTE GuardPoints for more information.
-
Support for sAMAccountName
You can now use a sAMAccountName name in User sets.
See Choosing a Login Name Type for more information.
-
Report exact number files encrypted in the GuardPoint
A new command has been added,
voradmin ldt summary <guard path>
to report the exact number files encrypted in the GuardPoint.See CTE-LDT Command-Line Administration for more information.
-
AES-NI
The host on which you want to install CTE must support AES-NI hardware encryption. If it does not, any attempt to install or upgrade CTE to release 7.0.0, or any subsequent version, will fail.
Resolved Issues
-
AGT-42578: QOS logs do not clear automatically
The Linux LDT QOS logs now automatically rotate as the logs grow in size. Previously, the log kept growing and caused system performance issues. Now, when the log reaches 1 MG in size, LDT rotates the log. LDT saves a maximum of five logs. After 5 files are created, it deletes the oldest log.
-
AGT-45502 [CS1470664]: Agent installation crashes a Windows Server 2019
Tanium, a third-party security product, attempted to access a CTE metadata filenode and was denied access. This caused an interoperability issue between Tanium and the CTE drivers and resulted in a system failure. This issue has been fixed.
-
AGT-45542 [CS1473172]: Failed to transform the data from ProtectFile to CTE when running Data Transformation
During Data Transformation, the read and write operations must be aligned with the disk sector. {dxf} was handling disks with a 512 byte sector size. It was failing for disks that had a 4096 byte sector size. This issue has been fixed.
-
AGT-46299: Server Freezing due to CTE
<<<<<<< HEAD * AGT-31170: Installed CTE first, then installed McAfee, McAfee could not initialize and failed to scan
**Work-around:**
You must install McAfee AV software **before** installing CTE agent. If CTE is installed first, McAfee cannot initialize
and all attempts to scan fail.
-
AGT-36734: LDT over CIFS: Folder with exe files is lagging/slow to be opened if rekey is in progress on it
Work-around:
Issue is caused by an incompatibility with SentinelOne.
-
AGT-39189: CTE failed to unguard after changing to incorrect CIFS credentials
Work-around:
Set the correct credentials and then guard, or enable, the GuardPoint again. This will guard the GuardPoint again properly and then unguard it.
-
AGT-40610: Initializing metadata failed and generated an error message in the event viewer when creating a symlink
Work-around:
You cannot have a symlink reside inside of a GuardPoint, that is pointing to another location in that same GuardPoint, or to the root of that same GuardPoint.
-
AGT-41857: Support Microsoft Cluster shared volume
Backups are currently not supported for CSV.
Work-around:
Restore the backup to an unguarded directory. Then apply the standard policy to the directory and create the GuardPoint.
This was due to a synchronization issue. CTE threads were waiting for certain locks to be released. They were not released because another APC level task interrupted the CTE thread progress. This has been fixed.
19de561e5ea912ea3e525d88d04891cd61589b9d