Author Topic: SecureAPlus v6.2.0  (Read 22693 times)

Offline hendy

  • SecureAPlus Developer
  • Sr. Member
  • *****
  • Posts: 351
  • Kudos +16/-0
SecureAPlus v6.2.0
« on: May 25, 2020, 09:11:47 AM »
We are pleased to announce the release of SecureAPlus v6.2.0

There are a few new highlight features in this version:
- Recommended action. When SecureAPlus application whitelisting prompts for an untrusted file from running, it will change the color to green or red, to give a hint for the end user whether to trust or continue to block the file from running.
- Vulnerability assessment. This module will searched for vulnerability software installed in the system.
- Automatically trust Windows Update files during boot-up

Here are the detail of the changes:
Bugs fixed:
- The following command line was not automatically trusted: C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Unrestricted -NonInteractive -NoProfile -WindowStyle Hidden "& C:\WINDOWS\system32\WindowsPowerShell\v1.0\Modules\SmbShare\DisableUnusedSmb1.ps1 -Scenario Client"
- Windows 7 without Service Pack 1 was not able to boot up after updating from SAP v6.0.3 to v6.1.0
- SecureAPlusService.exe is not running in some machines.
- In Polish language, "Continue blocking" words in Command Line blocking was cut off.
- For SecureAPlus managed by Management server, request for Whitelist approval, and check for Global Whitelist, is sent to portal.
  It is supposed to be sent to Management Server.
- For script file, the GUI used to show the interpreter as the process name. Now it will show the parent process of the interpreter as the process name.
- "Go to log location" will only open "C:\ProgramData\SecureAge Technology\SecureAge\log" folder only. Previously it will also open log folder in %localappdata%
- Shows Japanese EULA in Japanese OS
- Updated Italian translation.
- KB3033929 was not installed in Windows 7 SP1 64-bit.
- Do not show "Online Store" for SecureAPlus managed by Portal.
- in interactive mode, no command line blocked prompt shown in Windows Server 2016 & 2019, when running untrusted command line.
What's new:
- New dialog when blocking untrusted file, with Recommended Action.
- Vulnerability Assessment
- Automatically trust the untrusted Windows Update files during boot-up
- Besides of whitelist.log, untrusted files that are supposed to be blocked, but not blocked, in the observation mode is also written in Blocked.log
- Allow trusted installer to run any command line.
- Trusted application that is signed by a trusted certificate is allowed to run any command line and script
- No longer support ClamAV.
- Trust all now can be managed from Management Server.
- Added "tortoiseproc.exe" into restricted application list.

« Last Edit: May 25, 2020, 09:26:17 AM by hendy »