Introduction to Cisco Secure Workload

The Cisco Secure Workload platform is designed to secure your applications by creating micro perimeters at the workload level across your entire infrastructure consistently, whether these are deployed on bare-metal servers, virtual machines, or containers. The micro perimeter is available across your on-premises and multicloud environments using firewall and segmentation, compliance and vulnerability tracking, behavior-based anomaly detection, and workload isolation. The platform uses advanced analytics and algorithmic approaches to offer these capabilities.

This document describes the features, bug fixes, and behavior changes, if any, for the Cisco Secure Workload software patch Release 3.9.1.66. This patch is associated with the Cisco Secure Workload software major Release 3.9.1.1. For more information, see Cisco Secure Workload Release Notes, Release 3.9.1.1.

For information on how to upgrade the software version, see the Cisco Secure Workload Upgrade Guide.

Release Information

Release Version: 3.9.1.66

Published Date: April 07, 2025

Enhancements in Cisco Secure Workload, Release 3.9.1.66

  • Upgrading from the 3.9 release train to Release 3.10 or later is not supported for Secure Workload appliances running on M4 hardware. However, there will still be support for patch upgrades within the 3.9 release train.

Resolved and Open Issues

The resolved and open issues for this release are accessible through the Cisco Bug Search Tool. This web-based tool provides you with access to the Cisco bug tracking system, which maintains information about issues and vulnerabilities in this product and other Cisco hardware and software products.


Note


You must have a Cisco.com account to log in and access the Cisco Bug Search Tool. If you do not have one, register for an account.


For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQs.

Resolved Issues

The following table lists the resolved issues in this release. Click an ID to access Cisco’s Bug Search Tool and see additional information about that bug.

Identifier

Headline

CSCwi91219

Threat Intelligence Summary NOT visible to 'Tenant Owner'

CSCwm36263

TetV Cluster Stops Functioning After Some Time Even With Valid Licenses

CSCwn75469

TetSen.exe crashes on Windows Server 2008 R2 when PID Lookup/User Lookup Is Enabled

Open Issues

The following table lists the open issues in this release. Click an ID to access Cisco’s Bug Search Tool and see additional information about that bug.

Identifier

Headline

CSCwn21608

Azure Enforcement does not work if flow logs are configured and more than 100 VMs are in the VPC

CSCwn21611

Identity Connector: Azure Active Directory only first 20 groups per user are ingested

CSCwn21622

Azure Kubernetes AKS connector does not work with non-local accounts configuration

CSCwn21713

Amazon Elastic Kubernetes Service (EKS) connector does not work with EKS-API-only access config

CSCwf43558

Services failures after upgrade with orchestrator dns name not resolvable

CSCwh45794

ADM port and pid mapping is missing for some ports

CSCwh95336

Scope & Inventory Page: Scope Query: returns incorrect results

CSCwk44967

Online documentation does not include all of the API attributes that are returned

CSCwk80972

CollectorSSLCheck and collector services failing

CSCwm30965

Increased DNS Queries to metadata.google.internal from On-Prem Cluster Going to External DNS Server

CSCwm80745

Cisco Vulnerabilities Workloads Multiple selections across pages does not work in the UI

CSCwm89765

Start Restore Process is greyed out 

CSCwn15340

Failure in applying manual threat intelligence updates

Additional Information for Secure Workload

Information

Description

Known Behaviors

For information on the known behaviors, see Cisco Secure Workload Release Notes, 3.9.1.1.

Compatibility Information

For information about supported operating systems, external systems, and connectors for Secure Workload agents, see the Compatibility Matrix.

Scalability Limits

For information about the scalability limits of Cisco Secure Workload (39-RU) and Cisco Secure Workload M (8-RU) platforms, see Cisco Secure Workload Platform Data Sheet.

Related Resources

The following are the additional resources relating to Cisco Secure Workload:

Document

Description

These documents describe the physical configuration, site preparation, and cabling of a single-rack and dual-rack installation for Cisco Secure Workload (39RU) platform and Cisco Secure Workload M (8RU).

Cisco Secure Workload Virtual (Tetration-V) Deployment Guide

Describes the deployment of Cisco Secure Workload virtual appliances.

Latest Threat Data Sources

Contains information about the data sets for the Secure Workload pipeline that identifies and quarantines threats that are automatically updated when your cluster connects with Threat Intelligence update servers. If the cluster is not connected, download the updates and upload them to your Secure Workload appliance.

Contact Cisco Technical Assistance Centers

If you cannot resolve an issue using the online resources listed above, contact Cisco TAC: