Introduction to Cisco Secure Workload, Release 3.10.4.8

This document describes the features, bug fixes, and behavior changes, if any, for the Cisco Secure Workload software patch Release 3.10.4.8. This patch is associated with the Cisco Secure Workload software major Release 3.10.1.1. For more information, see Cisco Secure Workload Release Notes, Release 3.10.1.1.

Release Information

Release Version: 3.10.4.8

Published Date: July 31, 2025

New Software Features in Cisco Secure Workload, Release 3.10.4.8

Feature Name

Description

Operation Simplicity​

User Identity Mapping

The User Identity Mapping feature for Cisco Secure Workload enables monitoring of user login events from Microsoft Entra ID domains. A newly introduced configuration option allows sign-in log ingestion when the Microsoft Entra ID type is selected. When Sign in Logs is enabled, the connector ingests near-real-time IP address-to-user mappings, enhancing Cisco Secure Workload inventory with user identity data.

For more information, see Microsoft Entra ID Connector.

Enhancements in Cisco Secure Workload, Release 3.10.4.8

  • From Release 3.10.3.69 and later, Cisco Secure Workload supports user-selectable language preferences, with English set as the default language. Japanese is now available in the User Preferences page.

  • The AI-Suggested Policy feature can now be disabled for a workspace using the Show AI suggested policy toggle button on the Update Workspace page.

  • Policy analysis now leverages the Secure Workload AI engine to enhance the processing of rejected flows. Flows with insufficient data receive a Low Analysis Confidence rating, allowing users to filter them out. When classification data is inadequate to definitively categorize flows as Permitted, Rejected, or Escaped, the AI engine assigns the most likely category to each flow.

  • Besides basic SMTP authentication, the Email Connector now supports Modern Microsoft Authentication (SMTP OAuth2.0) where, configuring the Email Connector requires a tenant ID, client ID, and client secret.

  • Secure Workload now supports Kubernetes worker nodes on Ubuntu 24.04.

Resolved and Open Issues

The resolved and open issues for this release are accessible through the Cisco Bug Search Tool. This web-based tool provides you with access to the Cisco bug tracking system, which maintains information about issues and vulnerabilities in this product and other Cisco hardware and software products.


Note


You must have a Cisco.com account to log in and access the Cisco Bug Search Tool. If you do not have one, register for an account.


For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQs.

Resolved Issues

The following table lists the resolved issues in this release. Click an ID to access the Cisco’s Bug Search Tool and see additional information about that bug.

Identifier

Headline

CSCwn87701

Smart License re-registration fails.

CSCwp10211 Consumer/Provider scope details missing in traffic alert details
CSCwo95565 Schedule PDF in Japanese is not working as expected.
CSCwo01704 EKS and VPC resources ignored if names are duplicated.
CSCwp21595 Failed to disable Label from UI
CSCwp02522 Error in Azure Connector when adding to scope tree
CSCwo54227 Blue Indicator line shift- UI Behavior
CSCwq02029 Ingest or virtual appliance remaining in pending registration state
CSCwp09310 CSW MonNet, network flow at maximum size
CSCwp65529 DaemonSet agent installation on linux platform fails post upgrade to 3.10.3.19 with error "Register failure Bad Request - Invalide params: Platform: regular expression mismatch"
CSCwo31391 [AIX] Information missing on workload profile page.
CSCwo81563 Kubernetes/Containers Vulnerabilities Are not being reported
CSCwq37511 AIX agents drop broadcast traffic when Broadcast Allow is set in the Agent Config Profile
CSCwp11466 CSW EKS enforcement agent is not enforcing policy
CSCwp46016 Global Visualization dashboard does not display results on using filters

Open Issues

The following table lists the open issues in this release. Click an ID to access the Cisco’s Bug Search Tool and see additional information about that bug.

Identifier

Headline

CSCwp36145

Quick Policy Analysis for Analysed flows provides incorrect policy mapping
CSCwf43558 Services failures after upgrade with orchestrator dns name not resolvable.
CSCwh45794 ADM port and pid mapping is missing for some ports.
CSCwk80972 CollectorSSLCheck and collector services failing
CSCwm30965 Increased DNS Queries to metadata.google.internal from On-Prem Cluster Going to External DNS Server
CSCwm40398 Multiple packages have been flagged with CVE 2022-1471 in RHEL8.9 system
CSCwm80745 Cisco Vulnerabilities Workloads Multiple selections across pages does not work in the UI
CSCwn15340 Failure in applying manual threat intelligence updates
CSCwn61888 RHEL OS CVEs Inconsistencies report.
CSCwn73226 User uploaded SSL certs for UI are not honored during upgrade
CSCwn75424 Azure agentless enforcement out-of-band change not being detected
CSCwn86124 Windows Agent - Missed Packets graph not being populated
CSCwn90706 Vulnerabilities page shows a backend service error
CSCwn99675 Installation of threat intelligence datasets rpms is failing
CSCwo11089 Customers would see temporary spikes in escaped flows when running policy analysis.
CSCwo53910 Commissioning of replaced baremetals is failing on postinstall playbook
CSCwo66813 Upgrade failing with VMMGR_CREATE_VMS_FAILURE
CSCwp15933 AI Policy Discovery feature under certain workspace the process fails to complete throws an exception
CSCwp19084 Firewall rules not programmed on hosts post On-Prem to SaaS migration
CSCwp28822 Incorrect workload license usage
CSCwp46016 Global Visulaization dashboard does not display results on using filters
CSCwp67461 ENH: Add Minimum Supported TLS Version (1.2) in CSW SaaS User Guide and Implement OpenSSL Version Pre-Check in Agent Installation Script
CSCwp95305 Windows Enforcement Agent Does Not Support Multiple Executables Per ANY Policy Rule
CSCwp97029 CSW 3.9.1.x : False positive scenario of flow rejection for permitted policies
CSCwq00489 Enforcement not pushed to FMC access control policies
CSCwq02029 Ingest or virtual appliance remaining in pending registration state
CSCwq19946 At times, Quick Policy Analysis fails to provide outcome
CSCwq20873 Intermittent incomplete results using Quick Hypothetical Flow Analysis

Contact Cisco Technical Assistance Centers

If you cannot resolve an issue using the online resources listed above, contact Cisco TAC: