Introduction to Cisco Secure Workload

The Cisco Secure Workload platform is designed to provide comprehensive workload security by establishing a micro perimeter around every workload. The micro perimeter is available across your on-premises and multicloud environment using firewall and segmentation, compliance and vulnerability tracking, behavior-based anomaly detection, and workload isolation. The platform uses advanced analytics and algorithmic approaches to offer these capabilities.

This document describes the features, bug fixes, and behavior changes, if any, in Cisco Secure Workload, Release 3.9.1.52.

For information on how to upgrade the software version, see Cisco Secure Workload Upgrade Guide.

Release Information

Release Version: 3.9.1.52

Published Date: September 20, 2024

Enhancements in Cisco Secure Workload, Release 3.9.1.52

  • You can download the aggregated workload vulnerability information in CSV format from Vulnerabilities > Vulnerability Dashboard page.

  • When you disable or re-enable Enforcement for specific agents from the Agent List page, the operation is logged in the Service > Settings > Change Logs page.

  • LDAP attributes for username-based authentication can now be configured with multiple attributes in the external authentication configuration page. To support external LDAP users, you can now create users without an email address, and users can authenticate using the user login or samAccountName attributes.


    Note


    Random password generation is not supported for users with username-based external authentication.


  • Alerts generated over Email when configured using the Email Connector are now displayed in a tabular format.

Changes in Behavior in Cisco Secure Workload, Release 3.9.1.52

AIX Agent now includes a Cisco-provided IPFilter kernel extension. During the transition from enforcement off to on, the agent will unload and uninstall any previously installed non-Cisco IPFilter, then load the Cisco IPFilter extension.

Resolved and Open Issues

The resolved and open issues for this release are accessible through the Cisco Bug Search Tool. This web-based tool provides you with access to the Cisco bug tracking system, which maintains information about issues and vulnerabilities in this product and other Cisco hardware and software products.


Note


You must have a Cisco.com account to log in and access the Cisco Bug Search Tool. If you do not have one, register for an account.


For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQ.

Resolved Issues

The following table lists the resolved issues in this release. Click an ID to access Cisco’s Bug Search Tool to see additional information about that bug.

Identifier

Headline

CSCwk71706

Improve windows agent flow user reporting for rejected flows.

CSCwk14715

[AnyConnect Connector] Incorrect Active Endpoint Tracking Leads to 5000 Limit Issue.

CSCwk76554

TetSen.exe crashes with exit code - 0xC0000409

CSCwk67590

Reinstall flag for agent installer does not work.

CSCwj92795

IP fragments are not handled correctly by ipfilter on AIX.

CSCwm01515

Proxied flows visibility: effective proxied flows have multiple provider domain names.

CSCwk53493

[druid index merger] Intermittent no data seen in traffic flow or policy analysis pages.

CSCwj40017

Flow client/server direction decision not used for some flows.

CSCwm11196

Agents Health may show Agent Restated anomaly for AIX workloads.

CSCwk67970

Secure Workload linux agent may generate flows to `169.254.169.254:80`.

CSCwk23217

Error with Live Analysis API Endpoint pagination.

Open Issues

The following table lists the open issues in this release. Click an ID to access Cisco’s Bug Search Tool to see additional information about that bug.

Identifier

Headline

CSCwi40277

[Open API] Agent Network Policy Config need to show enf status consistent with data shown in UI

CSCwh95336

Scope & Inventory Page: Scope Query: matches .* returns incorrect results

CSCwf39083

VIP switchover causing segmentation issues

CSCwh45794

ADM port and pid mapping is missing for some ports.

CSCwf43558

Services failures after upgrade with orchestrator dns name not resolvable.

Additional Information for Secure Workload

Information

Description

Known Behaviors

For more information on the known behaviors, see Cisco Secure Workload Release Notes, 3.9.1.1.

Compatibility Information

For information about supported operating systems, external systems, and connectors for Secure Workload agents, see the Compatibility Matrix.

Scalability Limits

For information about the scalability limits of Cisco Secure Workload (39-RU) and Cisco Secure Workload M (8-RU) platforms, see Cisco Secure Workload Platform Data Sheet..

Related Resources

Cisco Secure Workload documentation can be accessed from the following websites:

Document

Description

Describes the physical configuration, site preparation, and cabling of a single-rack and dual-rack installation for Cisco Secure Workload (39RU) platform and Cisco Secure Workload M (8RU).

Cisco Secure Workload Virtual (Tetration-V) Deployment Guide

Describes the deployment of Cisco Secure Workload virtual appliances.

Latest Threat Data Sources

The data sets for the Secure Workload pipeline that identifies and quarantines threats that are automatically updated when your cluster connects with Threat Intelligence update servers. If the cluster is not connected, download the updates and upload them to your Secure Workload appliance.

Contact Cisco Technical Assistance Centers

If you cannot resolve an issue using the online resources listed above, contact Cisco TAC: