Introduction to Cisco Secure Workload
The Cisco Secure Workload platform is designed to secure your applications by creating micro perimeters at the workload level across your entire infrastructure consistently, whether these are deployed on bare-metal servers, virtual machines, or containers. The micro perimeter is available across your on-premises and multicloud environments using firewall and segmentation, compliance and vulnerability tracking, behavior-based anomaly detection, and workload isolation. The platform uses advanced analytics and algorithmic approaches to offer these capabilities.
This document describes the features, bug fixes, and behavior changes, if any, for the Cisco Secure Workload software patch Release 3.9.1.66. This patch is associated with the Cisco Secure Workload software major Release 3.9.1.1. For more information, see Cisco Secure Workload Release Notes, Release 3.9.1.1.
For information on how to upgrade the software version, see the Cisco Secure Workload Upgrade Guide.
Release Information
Release Version: 3.9.1.66
Published Date: April 07, 2025
Enhancements in Cisco Secure Workload, Release 3.9.1.66
-
Upgrading from the 3.9 release train to Release 3.10 or later is not supported for Secure Workload appliances running on M4 hardware. However, there will still be support for patch upgrades within the 3.9 release train.
Resolved and Open Issues
The resolved and open issues for this release are accessible through the Cisco Bug Search Tool. This web-based tool provides you with access to the Cisco bug tracking system, which maintains information about issues and vulnerabilities in this product and other Cisco hardware and software products.
![]() Note |
You must have a Cisco.com account to log in and access the Cisco Bug Search Tool. If you do not have one, register for an account. |
For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQs.
Resolved Issues
The following table lists the resolved issues in this release. Click an ID to access Cisco’s Bug Search Tool and see additional information about that bug.
Identifier |
Headline |
---|---|
Threat Intelligence Summary NOT visible to 'Tenant Owner' |
|
TetV Cluster Stops Functioning After Some Time Even With Valid Licenses |
|
TetSen.exe crashes on Windows Server 2008 R2 when PID Lookup/User Lookup Is Enabled |
Open Issues
The following table lists the open issues in this release. Click an ID to access Cisco’s Bug Search Tool and see additional information about that bug.
Identifier |
Headline |
---|---|
Azure Enforcement does not work if flow logs are configured and more than 100 VMs are in the VPC |
|
Identity Connector: Azure Active Directory only first 20 groups per user are ingested |
|
Azure Kubernetes AKS connector does not work with non-local accounts configuration |
|
Amazon Elastic Kubernetes Service (EKS) connector does not work with EKS-API-only access config |
|
Services failures after upgrade with orchestrator dns name not resolvable |
|
ADM port and pid mapping is missing for some ports |
|
Scope & Inventory Page: Scope Query: returns incorrect results |
|
Online documentation does not include all of the API attributes that are returned |
|
CollectorSSLCheck and collector services failing |
|
Increased DNS Queries to metadata.google.internal from On-Prem Cluster Going to External DNS Server |
|
Cisco Vulnerabilities Workloads Multiple selections across pages does not work in the UI |
|
Start Restore Process is greyed out |
|
Failure in applying manual threat intelligence updates |
Additional Information for Secure Workload
Information |
Description |
---|---|
Known Behaviors |
For information on the known behaviors, see Cisco Secure Workload Release Notes, 3.9.1.1. |
Compatibility Information |
For information about supported operating systems, external systems, and connectors for Secure Workload agents, see the Compatibility Matrix. |
Scalability Limits |
For information about the scalability limits of Cisco Secure Workload (39-RU) and Cisco Secure Workload M (8-RU) platforms, see Cisco Secure Workload Platform Data Sheet. |
Related Resources
The following are the additional resources relating to Cisco Secure Workload:
Document |
Description |
---|---|
These documents describe the physical configuration, site preparation, and cabling of a single-rack and dual-rack installation for Cisco Secure Workload (39RU) platform and Cisco Secure Workload M (8RU). |
|
Cisco Secure Workload Virtual (Tetration-V) Deployment Guide |
Describes the deployment of Cisco Secure Workload virtual appliances. |
Contains information about the data sets for the Secure Workload pipeline that identifies and quarantines threats that are automatically updated when your cluster connects with Threat Intelligence update servers. If the cluster is not connected, download the updates and upload them to your Secure Workload appliance. |
Contact Cisco Technical Assistance Centers
If you cannot resolve an issue using the online resources listed above, contact Cisco TAC:
-
Email Cisco TAC: tac@cisco.com
-
Call Cisco TAC (North America): 1.408.526.7209 or 1.800.553.2447
-
Call Cisco TAC (worldwide): Cisco Worldwide Support Contacts