Introduction to Cisco Secure Workload, Release 4.0.1.1
The Cisco Secure Workload platform is designed to secure your applications by creating micro perimeters at the workload level across your entire infrastructure consistently, whether these are deployed on bare-metal servers, virtual machines, or containers. The micro perimeter is available across your on-premises and multicloud environments using firewall and segmentation, compliance and vulnerability tracking, behavior-based anomaly detection, and workload isolation. The platform uses advanced analytics and algorithmic approaches to offer these capabilities.
This document describes the features, bug fixes, and behavior changes, if any, for the Cisco Secure Workload software Release 4.0.1.1.
![]() Note |
Agents upgrade to this version will fail, unless cluster and agents are running at least 3.10.6.3 version. |
Release Information
Release Version: 4.0.1.1
Published Date: November 26, 2025
New Software Features in Cisco Secure Workload, Release 4.0.1.1
|
Feature Name |
Description |
|---|---|
|
Operational Simplicity |
|
|
Cisco Application Centric Infrastructure (ACI) and Cisco Secure Workload Integration |
The Application Centric Infrastructure (ACI) and Secure Workload integration is a data center security and automation solution that does the following:
This integration streamlines application workload provisioning with simplified segmentation and centralized monitoring, extending the value of the existing ACI infrastructure and linking with Cisco’s broader security ecosystem. For more information, see ACI Integration with Secure Workload. |
|
SMTP Authentication in Secure Workload |
Secure Workload now supports configuration of SMTP using Microsoft Modern Authentication (OAuth) in addition to the basic SMTP authentication. This enhancement offers improved security through industry-standard OAuth 2.0 when connecting to Microsoft SMTP servers. For more information, see SMTP Server Configuration for Cluster and Site Configuration. |
|
Cisco Secure Workload Software Appliance |
Cisco Secure Workload is now available as a software appliance that can be deployed in customer-managed data centers using VMware vSphere. The software appliance delivers the same functionality and features as the hardware appliance and supports 20,000 or 40,000 agent license scale options. Customers can deploy the software appliance on any vSphere cluster, leveraging existing virtualization infrastructure for installation and lifecycle management. This new deployment model provides greater flexibility for on-premises environments while maintaining full feature parity with the hardware appliance. For more information, see Secure Workload Software Appliance Deployment Guide. |
|
Enhancing User Experience |
|
|
Enhanced UI for Secure Workload Landing page |
The application landing page has been redesigned to make it easier to locate and manage applications, especially in environments with a large number of applications. The new page highlights key features, such as Policy Statistics and Policy Conditions while offering a cleaner and more intuitive interface. Key updates:
|
|
Dark Mode option |
With the new Dark Mode option, users can toggle between the Dark and Light modes by using the User Preferences page that is available on the user login menu. |
|
Platform Enhancements |
|
|
Agents-only patch upgrade |
You can now apply agents-only patches to clusters. These patches support updated agent package versions without affecting other cluster components or causing downtime to cluster services. Key benefits:
|
|
Revoke Agent Packages |
The ability to revoke agent packages in Cisco Secure Workload allows administrators to block the installation or upgrade of specific agent versions or packages having critical issues for certain operating systems. This revocation is precise to the affected package and reversible, enabling administrators to temporarily prevent deployment or automatic upgrades to problematic agent versions, as needed. This feature helps maintain system stability and security by controlling agent versions in the environment. Key points:
This concise control over agent package deployment enhances operational security and stability in Secure Workload environments. For more information, see Revoke Agent Packages. |
|
Service Protection for AIX and Linux Agents |
The service protection feature is now supported in Secure Workload agents running on AIX and Linux. When enabled in the Agent Configuration Profile, this feature prevents system administrators from disabling or stopping the |
|
Cluster Certificate |
The Secure Workload SaaS platform uses a new set of Cisco-provided certificates for its agent-facing services. This update
enhances security by ensuring trusted TLS negotiations between agents and the SaaS cluster. The certificates are publicly
trustable, which means all TLS connections initiated by agents to the Secure Workload SaaS cluster will be secured with certificates
trusted by public certificate authorities. The new certificates will only validate Fully Qualified Domain Name (FQDN) endpoints
under the root domain |
|
Binary and User-based Enforcement on Linux |
Linux agents running on Version EL7.1+ and equivalent distributions now support binary and user-based policy enforcement. This enhancement allows policies to match and enforce rules based on the specific binary oruser-initiated outgoing flows, in addition to existing network-based parameters. Key benefits
|
|
Supplement RPM |
A new RPM package, tetration_os_supplement_k9, has been introduced to provide supplementary fixes for each major release. When deploying a 4.0 cluster or upgrading an existing cluster to 4.0, upload this RPM in the Setup page along with the other required RPMs. |
Enhancements in Cisco Secure Workload, Release 4.0.1.1
-
All AIX, Linux, and Solaris agent packages are now GPG‑signed by a centralized Cisco signing authority. As a result, the GPG tool (or an equivalent) is required for installing Version 4.0.1.1 agents, and to upgrade existing agents to 4.0.1.1. This requirement applies to agents running on Debian, Ubuntu, AIX, and Solaris.
-
Linux agents will now apply segmentation policies directly using nftables on hosts with nftables package Version 1.0.0 or later.
-
Secure Workload agents support Fedora versions 32 through 37.
Changes in Behavior in Cisco Secure Workload Release, 4.0.1.1
After the agent is installed on the workload, unzip is no longer necessary for subsequent agent upgrades.
Resolved and Open Issues
The resolved and open issues for this release are accessible through the Cisco Bug Search Tool. This web-based tool provides you with access to the Cisco bug tracking system, which maintains information about issues and vulnerabilities in this product and other Cisco hardware and software products.
Note: You must have a Cisco.com account to log in and access the Cisco Bug Search Tool. If you do not have one, register for an account.
For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQ.
Resolved Issues
|
Identifier |
Headline |
|---|---|
| CSCvf63373 | Sensor: signed with public trusted CA to meet STIG requirement |
| CSCwo89435 | Agent Enforcement Health shows 'Policy out of Sync' |
| CSCwp19084 | Firewall rules not programmed on hosts post On-Prem to SaaS migration |
| CSCwq10185 | FMC connector creation failing when using FMC HA |
| CSCwq83014 | CSW : Access policy is lost on FTD failover |
| CSCwr46882 | AIX CSW Agent does not add existing users of config file when creating /etc/security/audit/config.tet |
| CSCwr57676 | Agent reports flow export stopped anomaly when using proxy |
| CSCwr61435 | TetSen.exe Crash on CSW Windows Agent Related to dns_cache Feature |
| CSCwr78143 | Agent fails to save/delete offline flows after upgrade to 3.10.4.8 |
Open Issues
|
Identifier |
Headline |
|---|---|
| CSCwf43558 | Services failures after upgrade with orchestrator dns name not resolvable. |
| CSCwh45794 | ADM port and pid mapping is missing for some ports. |
| CSCwk80972 | CollectorSSLCheck and collector services failing |
| CSCwm30965 | Increased DNS Queries to metadata.google.internal from On-Prem Cluster Going to External DNS Server |
| CSCwm40398 | Multiple packages have been flagged with CVE 2022-1471 in RHEL8.9 system |
| CSCwm80745 | Cisco Vulnerabilities Workloads Multiple selections across pages does not work in the UI |
| CSCwn15340 | Failure in applying manual threat intelligence updates |
| CSCwn61888 | RHEL OS CVEs Inconsistencies report. |
| CSCwn73226 | User uploaded SSL certs for UI are not honored during upgrade |
| CSCwn75424 | Azure agentless enforcement out-of-band change not being detected |
| CSCwn86124 | Windows Agent - Missed Packets graph not being populated |
| CSCwn90706 | Vulnerabilities page shows a backend service error |
| CSCwn99675 | Installation of threat intelligence datasets rpms is failing |
| CSCwo11089 | Customers would see temporary spikes in escaped flows when running policy analysis. |
| CSCwo53910 | Commissioning of replaced baremetals is failing on postinstall playbook |
| CSCwo66813 | Upgrade failing with VMMGR_CREATE_VMS_FAILURE |
| CSCwp15933 | AI Policy Discovery feature under certain workspace the process fails to complete throws an exception |
| CSCwp28822 | Incorrect workload license usage |
| CSCwp36145 | Quick Policy Analysis for Analysed flows provides incorrect policy mapping |
| CSCwp46016 | Global Visulaization dashboard does not display results on using filters |
| CSCwp67461 | ENH: Add Minimum Supported TLS Version (1.2) in CSW SaaS User Guide and Implement OpenSSL Version Pre-Check in Agent Installation Script |
| CSCwp95305 | Windows Enforcement Agent Does Not Support Multiple Executables Per ANY Policy Rule |
| CSCwp97029 | CSW 3.9.1.x : False positive scenario of flow rejection for permitted policies |
| CSCwq00489 | Enforcement not pushed to FMC access control policies |
| CSCwq02029 | Ingest or virtual appliance remaining in pending registration state |
| CSCwq19946 | At times, Quick Policy Analysis fails to provide outcome |
| CSCwq20873 | Intermittent incomplete results using Quick Hypothetical Flow Analysis |
| CSCwr89903 | Memory limiting on Windows TetSen.exe process may not work |
| CSCwr89957 | TetSen.exe consumes too much memory |
| CSCwr97565 | ACI In line documentation points to the wrong location |
| CSCws02884 | PDF Download and PDF send in Reporting page is slow |
| CSCws07592 | Excessive Lag in Flow Analyitcs Pipeline can cause HDFS to enter SafeMode |
| CSCws12498 | Agent installer script fails on Debian/Ubuntu in 4.0.1.1 |
| CSCws12561 | CSW: Delayed Policy Push for Short-Lived Pods |
|
Disk Usage critical on longevity |
Related Documentation for Cisco Secure Workload
Contact Cisco Technical Assistance Center
If you cannot resolve an issue using the online resources listed above, contact Cisco TAC:
-
Email Cisco TAC: tac@cisco.com
-
Call Cisco TAC (North America): 1.408.526.7209 or 1.800.553.2447
-
Call Cisco TAC (worldwide): Cisco Worldwide Support Contacts

Feedback