CISCO 3.9.1.38 Secure Workload
Product Information
- Specifications:
- Product Name: Cisco Secure Workload
- Release Version: 3.9.1.38
- First Published: 2024-06-17
- Last Modified: 2024-06-16
- Introduction to Cisco Secure Workload:
- Cisco Secure Workload is a comprehensive software solution that provides features for enhancing security, simplifying operations, and improving user authentication within your network environment.
- New Software Features:
- Feature Name: Ease-of-Use
- Description: Enhancements for improved usability and user experience.
- Enhancements:
- Feature Name: Disable Enforcement on Individual Workloads
- Description: Allows users to selectively disable policy enforcement on specific workloads for troubleshooting purposes.
- Feature Name: Support User Authentication Without Email Address
- Description: Enables site admins to create users with usernames and temporary passwords without requiring an email address.
- Feature Name: ServiceNow Integration
- Description: Increased attribute fields import from ServiceNow and other enhancements for improved integration.
- Resolved and Open Issues:
- Feature Name: AnyConnect Connector
- Description: Support for decoding Data Template, Version 7 with AnyConnect connector.
- Feature Name: Improvements for Malicious IPv4 Addresses
- Description: Enhanced endpoint to retrieve malicious IP addresses and threat categories.
Product Usage Instructions
- Disable Enforcement on Individual Workloads:
- Select the agent you want to disable enforcement for on the Agent List page.
- Under Agent Controls, click “Disable Enforcement” to stop policy enforcement on that agent.
- A warning sign will indicate agents with enforcement disabled. Click “Enable Enforcement” after troubleshooting is complete.
- Support User Authentication Without Email Address:
- Site Admins can create users with usernames and generate temporary passwords without providing an email address on the Secure Workload interface.
FAQs
- Q: Who can access the “Disable Enforcement” feature?
- A: The “Disable Enforcement” option is available only for users with Owner privileges and for enforcement agents with enforcement enabled through configuration.
- Q: What is the purpose of the “ServiceNOW Integration” feature?
- A: The “ServiceNOW Integration” feature allows for an increased number of attribute fields imported from ServiceNow for enhanced integration capabilities.
Introduction to Cisco SecureWorkload
- The Cisco Secure Workload platform is designed to provide comprehensive workload security by establishing a micro perimeter around every workload.
- The micro perimeter is available across your on-premises and multi-cloud environment using firewall and segmentation, compliance and vulnerability tracking, behavior-based anomaly detection, and workload isolation.
- The platform uses advanced analytics and algorithmic approaches to offer these capabilities.
- For information on how to upgrade the software version, see Cisco Secure Workload Upgrade Guide.
Note
- As a best practice, we recommend patching a cluster to the latest available patch version before performing a major version upgrade.
- This document describes the new features, enhancements, behavior changes, and bug fixes, if any, in the Cisco Secure Workload.
Release Information
- Release Version: 3.9.1.38
- Published Date: June 19, 2024
New Software Features in Cisco Secure Workload, Release 3.9.1.38
Feature Name | Description |
Ease-of-Use |
Feature Name | Description |
Disable Enforcement of Individual Workloads | You can now stop enforcement on individual applications, workspaces or scopes while troubleshooting policy enforcement on a server by selectively disabling enforcement on individual workloads. On the Agent List page, select the agent that you want to disable enforcement for. Under Agent Controls, click Disable Enforcement, which will stop policy enforcement on that specific agent. A warning sign is displayed for agents that have enforcement manually disabled by this feature. After troubleshooting is complete, click Enable Enforcement. Note The Disable Enforcement option is available only for users with Owner privileges and for enforcement agents with enforcement enabled through configuration. For more information, see Disable Enforcement on Workloads. |
Operation Simplicity | |
Support User Authentication Without Email Address | Site Admins can now create users with usernames and generate temporary passwords on the Secure Workload interface, without necessarily providing an email address for initial access. For more information, see Reset Password. |
Enhancements in Cisco Secure Workload, Release 3.9.1.38
Feature Name | Description |
ServiceNow Integration | The number of attribute fields that can be imported from ServiceNow is increased from 10 to 15. |
Enhancements on the Vulnerability and Security Dashboard | You can download the aggregated workload vulnerability information in a CSV
format from the Vulnerabilities workload section in the Vulnerability Dashboard page. |
Filtering with workload is available on the Vulnerability Dashboard page. | |
Red Hat Enterprise
Linux 8.x Support on Agent |
Secure Workload Agents now support Red Hat Enterprise Linux 8. x as a Kubernetes node. |
Support for Active Directory | Support is available for Active Directory for Identity Connector to ingest users or user groups. |
Support for Microsoft Entra ID | Support is available for Microsoft Entra ID for Identity Connector to ingest users or user groups. |
Integrate Identity Connector with ISE and AnyConnect Connectors | Integration of Identity Connector with ISE and AnyConnect connectors is available for users and user group tags. |
Feature Name | Description |
AnyConnect Connector | AnyConnect connector support for decoding of Data Template, Version 7 is available. |
Improvements for Malicious IPv4 Addresses | The Maintenance Explorer endpoint is enhanced to retrieve 1,00,000 malicious IP address and their associated threat categories. |
Improvements for Malicious IPv4 Addresses | Two new fields —Consumer threat categories and Provider threat categories are available on the Traffic page for filtering flows for the top N threats in the respective categories. |
Improvements for Malicious IPv4 Addresses | Traffic alert configuration is enhanced to include threat categories. |
Alerts Summarization Based on Alert Name | Compliance, Sensor, and Enforcement alerts are now summarized based on alert names. |
Agent Health Summary | The status check of the Agent version in the Agent Health summary now displays the latest information. |
Traffic Visibility | Consumer or Provider detection has been improved for flows when traffic visibility fidelity is set to conversation mode. |
Resolved and Open Issues
- The resolved and open issues for this release are accessible through the Cisco Bug Search Tool.
- This web-based tool provides you with access to the Cisco bug tracking system, which maintains information about issues and vulnerabilities in this product and other Cisco hardware and software products.
Note
- You must have a Cisco.com account to log in and access the Cisco Bug Search Tool. If you do not have one, register for an account.
- For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQ.
Resolved Issues
The following table lists the resolved issues in this release. Click an ID to access Cisco’s Bug Search Tool to see additional information about that bug.
Identifier | Headline |
CSCwj55092 | Secure Workload `adhoc_ams_ext` throwing “could not find Vault client token for policy trex_rw” |
CSCwk32259 | TSDB Metrics reporting stops due to too many tag values |
CSCwh65327 | Secure Workload ‘KubernetesApiServer’ service intermittent alerts |
Identifier | Headline |
CSCwj28469 | Azure ingestion stopped after the Secure connector tunnel got wedged |
CSCwj40017 | Flow flip observed for some long-running TCP flows |
CSCwj33801 | Secure Workload Agent `debug. sh` needs to be updated for `cs agent` service change |
CSCwj73276 | Enforcer fails to download policies on Windows workload due to netsh error |
CSCwj82989 | Flow Export stopped on Windows workload. TetSen.exe restarts. |
CSCwj59309 | Netscaler external orchestrator to use token-based authentication |
CSCwj38923 | Enhancement Request – Service Now Connector – REST API url params |
CSCwi61963 | Enforcement fails with CE_RESOLVE_POD_FAILED error on RHCOS |
CSCwj89135 | Compliance alert config: Rule not getting processed post edit of the rule |
Open Issues
The following table lists the open issues in this release. Click an ID to access Cisco’s Bug Search Tool to see additional information about that bug.
Identifier | Headline |
CSCwi40277 | [Open API] Agent Network Policy Config needs to show if the status is consistent with data shown in the UI |
CSCwh72708 | ADM Submissions fail if SLB Config files are in Default |
CSCwh95336 | Scope & Inventory Page: Scope Query: matches .* returns incorrect results |
CSCwf39083 | VIP switchover causing segmentation issues |
CSCwh45794 | ADM port and PID mapping is missing for some ports |
CSCwf51818 | Flow Search Queries Not Working Correctly |
CSCwf43558 | Services failures after upgrade with orchestrator DNS name not resolvable |
CSCwi57094 | M6-39RU Disk Decommission workflow with RAID5 disks |
CSCwi98814 | Error retrieving attack surface details for workload in the security dashboard |
CSCwk06371 | Cannot install CSW Agent on Solaris global zone |
Changes in Behavior in Cisco Secure Workload, Release 3.9.1.38
- Clusters force agents to refresh the client certificate if the certificates are close to expiration.
Additional Information
Additional Information for Secure Workload
Information | Description |
Compatibility Information | For information about supported operating systems, external systems, and connectors for Secure Workload agents, see the Compatibility Matrix. |
Known Behaviors | For more information on the known behaviors, see Cisco Secure Workload Release Notes, 3.9.1.1. |
Scalability Limits | For information about the scalability limits of Cisco Secure Workload (39-RU) and Cisco Secure Workload M (8-RU) platforms, see Cisco Secure Workload Platform Data Sheet. |
Related Resources
- Cisco Secure Workload documentation can be accessed from the following websites:
Document | Description |
• Cisco Secure Workload M6 Cluster Deployment Guide
• Cisco Tetration (Secure Workload) M5 Cluster Hardware Deployment Guide |
Describes the physical configuration, site preparation, and cabling of a single-rack and dual-rack installation for the Cisco Secure Workload (39RU) platform and Cisco Secure Workload M (8RU). |
Cisco Secure Workload Virtual (Tetration-V) Deployment Guide | Describes the deployment of Cisco Secure Workload virtual appliances. |
Latest Threat Data Sources | The data sets for the Secure Workload pipeline that identifies and quarantines threats are automatically updated when your cluster connects with Threat Intelligence update servers. If the cluster is not connected, download the updates and upload them to your Secure Workload appliance. |
Contact Cisco Technical Assistance Centers
- If you cannot resolve an issue using the online resources listed above, contact Cisco TAC:
- Email Cisco TAC: tac@cisco.com.
- Call Cisco TAC (North America): 1.408.526.7209 or 1.800.553.2447
- Call Cisco TAC (worldwide): Cisco Worldwide Support Contacts
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE OUTLINED IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version. Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R) © 2024 Cisco Systems, Inc. All rights reserved.
- First Published: 2024-06-17
- Last Modified: 2024-06-16
Documents / Resources
![]() |
CISCO 3.9.1.38 Secure Workload [pdf] User Guide 3.9.1.38 Secure Workload, 3.9.1.38, Secure Workload, Workload |