GFI MAX RemoteManagement – Dashboard v5.42.4 and Agent v9.5.5 (RC) Release

Hi Everyone,

I’m pleased to announce that Dashboard v5.42.4 and Agent v9.5.5 (RC) are being released overnight, so that they will be available in advance of the working day tomorrow, Wednesday 23rd of April.

This is a routine Service Release focused on systems performance, feature enhancements and bug fixes.

Full release notes for Dashboard v5.42.4 and Agent v9.5.5 (RC) are below.

 

Summary for Service Release, Tuesday 22nd April 2014:

  • Service Release focused on systems performance, minor feature updates and bug fixes
  • Dashboard v5.42.4
  • Agent v9.5.5 (RC)

Dashboard v5.42.4

  • UPDATE: Added auditing for Service operations (add/edit/delete service)
  • BUGFIX: Correct an issue that prevented some monthly reports from being generated
  • BUGFIX: Ensure the device list sort order is applied across multiple pages
  • BUGFIX: Ensure reports for Managed Antivirus do not exclude “unknown” threat classifications
  • BUGFIX: Ensure correct rendering of HTML entities in PSA dialogs
  • BUGFIX: Remove superfluous asterisk in Fault History Report dialog
  • BUGFIX: Fix issue with South Pane remaining minimised/blank in ‘Services’ tab when switching Clients
  • BUGFIX: Correct ServiceDesk System Tray Application integration URL

Agent v9.5.5 Release Candidate

  • UPDATE: Support WSUS Check on Windows Server 2012
  • BUGFIX: Extend Backup Check for Symantec System Recovery to cover additional event codes indicating success
  • BUGFIX: Correct a UI glitch in the Backup Check dialog for Symantec products which would remove explanatory texts for additional options checkbox
  • BUGFIX: Support updated Engine B in G Data 2014 in Antivirus update check

 

Thanks,

Brian Mackie

Product Manager @ GFI MAX

Posted in MAX RM service updates

GFI MAX RemoteManagement – US instance scheduled maintenance

Dear customers,

we would like to announce a scheduled maintenance overnight from Saturday to Sunday at the times indicated below. Continue reading

Posted in GFI MAX RemoteManagement, MAX RM service updates

issue updating MAV definitions – resolved

Dear Customers,

the issue updating MAV definitions has been resolved. A full definitions update has been promoted to the update system. The team is following up with an investigation and remediation to ensure that the issue cannot reoccur.

With kind regards,

The GFI MAX Team

Posted in GFI MAX RemoteManagement, MAX RM service updates

issue updating MAV definitions

Dear customers,

we are aware of customer reports indicating that updating MAV definitions after 28188 creates a loop up downloads and attempted updates. This has been escalated to the appropriate technical team and the issue is being investigated. As this affects site bandwidth, a possible remedial action is to temporarily suspend access to the URL below if using a proxy capable of filtering. http://updates.sunbeltsoftware.com/spurs/spurs.aspx

Update 11:00 UTC: We have received confirmation of the problem from the engineering team working on this.
Update 15:00 UTC: Definitions 28222 are released which should resolve the issue.

With kind regards,
The GFI MAX Team

Posted in GFI MAX RemoteManagement, MAX RM service updates

GFI MAX – OpenSSL “Heartbleed” bug update

Dear Customers, 

As soon as the vulnerability to OpenSSL was announced engineering teams across GFI have been implementing the necessary fixes to affected systems. 

This work is complete and updated OpenSSL packages have been applied to affected components. As a precautionary measure, keys and certificates are in the process of being re-issued. 

Remote Monitoring & Management platform

• RemoteManagement Dashboard: Systems were not running affected versions 
• Remote Background Management: Systems were not running affected versions 
• TeamViewer/Take Control: Sessions and passwords were not affected. Infrastructure components were checked and updated as necessary 
• Managed Online Backup: Systems were checked and updated as necessary 
• Patch Management: Systems were not running affected versions 
• App Control: Systems were checked and updated as necessary 
• Managed AntiVirus: Two servers used for MAV only, supporting the German infrastructure were updated, no other instances affected 
• ServiceDesk: Systems were checked and updated as necessary 


MAX Mail

The maxmail.gfi.com site and all of its MTAs do not use OpenSSL libraries and were not susceptible to the vulnerability. 

The compiled version of the OpenSSL software used on the branded site servers did not include the heartbeat function, and therefore those systems were not subject to the vulnerability. 

The SFTP servers for the archive import use OpenSSH for the SSH transport and thus were not affected (they do not use the TLS protocol). 


MAX Backup and Managed Online Backup 

A full system review was performed and updates were applied to the Backup service as necessary. 

Please note: If you are using Managed Online Backup or IASO Backup with your own storage you will have to update the storage node installer. Download updates Storage Node Installer here: 

http://downloads.gfimaxbackup.com/maxdownloads/?_ga=1.212815316.1780981287.1396271847 

You must then run a re-configure of the service and restart the Cloud Storage Node service. 


In Summary

We have performed a full systems review and patched OpenSSL where we encountered the vulnerability. 


Best Regards, 

The GFI MAX Team

Posted in MAX RM service updates

Comments on Heartbleed Vulnerability

There has been substantial press about the Heartbleed vulnerability in the widely used OpenSSL protocol.

For customers interested in how our systems may have been affected by this vulnerability,  the short answer is that we have reviewed the systems involved in the operation of the GFI Mail services and we do not believe that we were or are susceptible to this vulnerability.   Specifically:

* the control panel servers and all of our MTAs do not use OpenSSL libraries and were not susceptible to the vulnerability

* the compiled version of the OpenSSL software used on our branded site servers did not include the heartbeat function, and therefore those systems were not subject to the vulnerability

* the SFTP servers for the archive import use OpenSSH for the SSH transport and thus were not affected (they do not use the TLS protocol)

We hope that this information is helpful.  For those interested in more information on this particular vulnerability, please see  http://heartbleed.com/

Posted in GFI MAX Mail, MAX Mail service updates

GFI MAX RemoteManagement : Heartbleed – OpenSSL vulnerability update

Dear customers

We have been informed of the “Heartbleed” OpenSSL issue on Tuesday 08/04 morning and immediately reacted to it.
We have conducted an extensive search for vulnerable OpenSSL in our infrastructure.

GFI MAX RemoteManagement was not vulnerable, except for two MAV servers in Germany which have been immediately patched with a non vulnerable version of OpenSSL.
Out of precaution, we are in the process of regenerating keys and certificates

Best regards
The GFI Team

Posted in GFI MAX RemoteManagement