BeyondTrust Discovery Agent 23.1.0 release notes
over 1 year ago
June 1, 2023
New features and enhancements:
- Convert to batch mode writes for storing events to the local database.
- Changed the default terminal type to dumb for SSH connections.
- Added collection of PBUL when not installed via package manager.
- No longer store the credentials in the scanner local database if the BI communications are capable of sending credentials on demand.
- Converted the third party SSH engine to Rebex.
- Added collection of Linux target role.
- Moved the configuration setting of LogCPMessages from the registry to the PhoenixConfig.json file.
- Optimized the credential test loop so that credentials aren't retried.
- Add collection of PuTTY keys for domain users who have logged onto the target.
- Cleaned up DCOM output to remove extraneous characters.
- Add support for Arista EOS devices.
- Finished support for Juniper (Junos) devices by adding support for User enumeration.
- Optimized the order of SSH credentials to prefer non-elevated credentials first.
- Added support for Palo Alto devices.
- Improved Fortinet device support.
- Added additional scan abort checks to allow for scan to abort in a timely fashion.
- Added additional optional timeouts to assist in resolving hung scans.
- Added a timeout for getting the remote system time.
- Added a timeout to deploying the remote agent.
Issues resolved:
- Resolved issue in which database credentials without ports weren't using the default port.
- Resolved issue in which the job option for enumerate database value wasn't set correctly.
- Resolved issues in which group enumeration wasn't occurring due to unsupported SidUseTypes.
- Fixed the collection of PuTTY keys for windows users.
- Resolved issue which caused early aborts for scheduled scans.
- Resolved issue which caused exceptions in IPTarget.Dispose().
- Resolved issue which allowed a DB credential to be tried on a target it wasn't configured for.
- Resolved an exception that occurred when a target had no IPv4 address returned by the DNS query.
- Resolved issue in which domain users had expired passwords.
- Resolved an issue allowing domain commands to be sent after it was determined not to allow further domain commands.
- Resolved error which caused a failure when expanding IP ranges.
Known issues:
- The installation dialogs have string substitution errors.
- Certain special characters in a MongoDB password will cause the connection string to be improperly formatted and the connection will fail. For this release, avoid using special characters in the MongoDB password.
Notes:
- Direct upgrades to this version are supported from versions 20.1.0 and later.
- This release is available by download from the BeyondTrust Client Portal at https://beyondtrustcorp.service-now.com/csm.
- The MD5 signature is: 63a3030a39062b51c3c7218cf6933980
- The SHA-1 signature is: 457c6580385be518d9e895fe693b4ae4879e7b89
- The SHA256 signature is: b9f7da37eaa01604eba47be4326bdaaddda1a89ddaa38390bcf259e46e716cdd