Introduction to Cisco Secure Workload

This document describes the features, bug fixes, and behavior changes, if any, for the Cisco Secure Workload software patch Release 3.9.1.69. This patch is associated with the Cisco Secure Workload software major Release 3.9.1.1. For more information, see Cisco Secure Workload Release Notes, Release 3.9.1.1.

For information on how to upgrade the software version, see the Cisco Secure Workload Upgrade Guide.

Release Information

Release Version: 3.9.1.69

Published Date: July 07, 2025

Resolved and Open Issues

The resolved and open issues for this release are accessible through the Cisco Bug Search Tool. This web-based tool provides you with access to the Cisco bug tracking system, which maintains information about issues and vulnerabilities in this product and other Cisco hardware and software products.


Note


You must have a Cisco.com account to log in and access the Cisco Bug Search Tool. If you do not have one, register for an account.


For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQs.

Resolved Issues

The following table lists the resolved issues in this release. Click an ID to access Cisco’s Bug Search Tool and see additional information about that bug.

Identifier

Headline

CSCwn87701

Smart License re-registration fails.

Open Issues

The following table lists the open issues in this release. Click an ID to access Cisco’s Bug Search Tool and see additional information about that bug.

Identifier

Headline

CSCwn21608

Azure Enforcement does not work if flow logs are configured and more than 100 VMs are in the VPC

CSCwn21611

Identity Connector: Azure Active Directory only first 20 groups per user are ingested

CSCwn21622

Azure Kubernetes AKS connector does not work with non-local accounts configuration

CSCwn21713

Amazon Elastic Kubernetes Service (EKS) connector does not work with EKS-API-only access config

CSCwf43558

Services failures after upgrade with orchestrator dns name not resolvable

CSCwh45794

ADM port and pid mapping is missing for some ports

CSCwh95336

Scope & Inventory Page: Scope Query: returns incorrect results

CSCwk44967

Online documentation does not include all of the API attributes that are returned

CSCwk80972

CollectorSSLCheck and collector services failing

CSCwm30965

Increased DNS Queries to metadata.google.internal from On-Prem Cluster Going to External DNS Server

CSCwm80745

Cisco Vulnerabilities Workloads Multiple selections across pages does not work in the UI

CSCwm89765

Start Restore Process is greyed out 

CSCwn15340

Failure in applying manual threat intelligence updates

Additional Information for Secure Workload

Information

Description

Known Behaviors

For information on the known behaviors, see Cisco Secure Workload Release Notes, 3.9.1.1.

Compatibility Information

For information about supported operating systems, external systems, and connectors for Secure Workload agents, see the Compatibility Matrix.

Scalability Limits

For information about the scalability limits of Cisco Secure Workload (39-RU) and Cisco Secure Workload M (8-RU) platforms, see Cisco Secure Workload Platform Data Sheet.

Related Resources

The following are the additional resources relating to Cisco Secure Workload:

Document

Description

These documents describe the physical configuration, site preparation, and cabling of a single-rack and dual-rack installation for Cisco Secure Workload (39RU) platform and Cisco Secure Workload M (8RU).

Cisco Secure Workload Virtual (Tetration-V) Deployment Guide

Describes the deployment of Cisco Secure Workload virtual appliances.

Latest Threat Data Sources

Contains information about the data sets for the Secure Workload pipeline that identifies and quarantines threats that are automatically updated when your cluster connects with Threat Intelligence update servers. If the cluster is not connected, download the updates and upload them to your Secure Workload appliance.

Contact Cisco Technical Assistance Centers

If you cannot resolve an issue using the online resources listed above, contact Cisco TAC: