CISCO 3.9.1.38 Secure Workload User Guide

July 6, 2024
Cisco

cisco-logo

CISCO 3.9.1.38 Secure Workload

CISCO-3.9.1.38-Secure-Workload-PRODUCT

Product Information

  • Specifications:
    • Product Name: Cisco Secure Workload
    • Release Version: 3.9.1.38
    • First Published: 2024-06-17
    • Last Modified: 2024-06-16
  • Introduction to Cisco Secure Workload:
    • Cisco Secure Workload is a comprehensive software solution that provides features for enhancing security, simplifying operations, and improving user authentication within your network environment.
  • New Software Features:
    • Feature Name: Ease-of-Use
    • Description: Enhancements for improved usability and user experience.
  • Enhancements:
    • Feature Name: Disable Enforcement on Individual Workloads
    • Description: Allows users to selectively disable policy enforcement on specific workloads for troubleshooting purposes.
    • Feature Name: Support User Authentication Without Email Address
    • Description: Enables site admins to create users with usernames and temporary passwords without requiring an email address.
    • Feature Name: ServiceNow Integration
    • Description: Increased attribute fields import from ServiceNow and other enhancements for improved integration.
  • Resolved and Open Issues:
    • Feature Name: AnyConnect Connector
    • Description: Support for decoding Data Template, Version 7 with AnyConnect connector.
    • Feature Name: Improvements for Malicious IPv4 Addresses
    • Description: Enhanced endpoint to retrieve malicious IP addresses and threat categories.

Product Usage Instructions

  • Disable Enforcement on Individual Workloads:
    • Select the agent you want to disable enforcement for on the Agent List page.
    • Under Agent Controls, click “Disable Enforcement” to stop policy enforcement on that agent.
    • A warning sign will indicate agents with enforcement disabled. Click “Enable Enforcement” after troubleshooting is complete.
  • Support User Authentication Without Email Address:
    • Site Admins can create users with usernames and generate temporary passwords without providing an email address on the Secure Workload interface.

FAQs

  • Q: Who can access the “Disable Enforcement” feature?
    • A: The “Disable Enforcement” option is available only for users with Owner privileges and for enforcement agents with enforcement enabled through configuration.
  • Q: What is the purpose of the “ServiceNOW Integration” feature?
    • A: The “ServiceNOW Integration” feature allows for an increased number of attribute fields imported from ServiceNow for enhanced integration capabilities.

Introduction to Cisco SecureWorkload

  • The Cisco Secure Workload platform is designed to provide comprehensive workload security by establishing a micro perimeter around every workload.
  • The micro perimeter is available across your on-premises and multi-cloud environment using firewall and segmentation, compliance and vulnerability tracking, behavior-based anomaly detection, and workload isolation.
  • The platform uses advanced analytics and algorithmic approaches to offer these capabilities.
  • For information on how to upgrade the software version, see Cisco Secure Workload Upgrade Guide.

Note

  • As a best practice, we recommend patching a cluster to the latest available patch version before performing a major version upgrade.
  • This document describes the new features, enhancements, behavior changes, and bug fixes, if any, in the Cisco Secure Workload.

Release Information

  • Release Version: 3.9.1.38
  • Published Date: June 19, 2024

New Software Features in Cisco Secure Workload, Release 3.9.1.38

Feature Name Description

Ease-of-Use
Feature Name| Description
---|---
Disable Enforcement of Individual Workloads| You can now stop enforcement on individual applications, workspaces or scopes while troubleshooting policy enforcement on a server by selectively disabling enforcement on individual workloads. On the Agent List page, select the agent that you want to disable enforcement for. Under Agent Controls , click Disable Enforcement , which will stop policy enforcement on that specific agent. A warning sign is displayed for agents that have enforcement manually disabled by this feature. After troubleshooting is complete, click Enable Enforcement. Note The Disable Enforcement option is available only for users with Owner privileges and for enforcement agents with enforcement enabled through configuration. For more information, see Disable Enforcement on Workloads.
Operation Simplicity
Support User Authentication Without Email Address| Site Admins can now create users with usernames and generate temporary passwords on the Secure Workload interface, without necessarily providing an email address for initial access. For more information, see Reset Password.

Enhancements in Cisco Secure Workload, Release 3.9.1.38

Feature Name Description
ServiceNow Integration The number of attribute fields that can be imported

from ServiceNow is increased from 10 to 15.
Enhancements on the Vulnerability and Security Dashboard| You can download the aggregated workload vulnerability information in a CSV

format from the Vulnerabilities workload section in the Vulnerability Dashboard

page.

Filtering with workload is available on the Vulnerability Dashboard page.
Red Hat Enterprise

Linux 8.x Support on Agent

| Secure Workload Agents now support Red Hat Enterprise Linux 8. x as a Kubernetes node.
Support for Active Directory| Support is available for Active Directory for Identity Connector to ingest users or user groups.
Support for Microsoft Entra ID| Support is available for Microsoft Entra ID for Identity Connector to ingest users or user groups.
Integrate Identity Connector with ISE and AnyConnect Connectors| Integration of Identity Connector with ISE and AnyConnect connectors is available for users and user group tags.
Feature Name| Description
---|---
AnyConnect Connector| AnyConnect connector support for decoding of Data Template, Version 7 is available.
Improvements for Malicious IPv4 Addresses| The Maintenance Explorer endpoint is enhanced to retrieve 1,00,000 malicious IP address and their associated threat categories.
Improvements for Malicious IPv4 Addresses| Two new fields — Consumer threat categories and Provider threat categories are available on the Traffic page for filtering flows for the top N threats in the respective categories.
Improvements for Malicious IPv4 Addresses| Traffic alert configuration is enhanced to include threat categories.
Alerts Summarization Based on Alert Name| Compliance, Sensor, and Enforcement alerts are now summarized based on alert names.
Agent Health Summary| The status check of the Agent version in the Agent Health summary now displays the latest information.
Traffic Visibility| Consumer or Provider detection has been improved for flows when traffic visibility fidelity is set to conversation mode.

Resolved and Open Issues

  • The resolved and open issues for this release are accessible through the Cisco Bug Search Tool.
  • This web-based tool provides you with access to the Cisco bug tracking system, which maintains information about issues and vulnerabilities in this product and other Cisco hardware and software products.

Note

Resolved Issues

The following table lists the resolved issues in this release. Click an ID to access Cisco’s Bug Search Tool to see additional information about that bug.

Identifier Headline
CSCwj55092 Secure

Workload adhoc_ams_ext throwing “could not find Vault client token for policy trex_rw”
CSCwk32259| TSDB Metrics reporting stops due to too many tag values
CSCwh65327| Secure Workload ‘KubernetesApiServer’ service intermittent alerts
Identifier| Headline
---|---
CSCwj28469| Azure ingestion stopped after the Secure connector tunnel got wedged
CSCwj40017| Flow flip observed for some long-running TCP flows
CSCwj33801| Secure Workload Agent debug. sh needs to be updated for cs agent service change
CSCwj73276| Enforcer fails to download policies on Windows workload due to netsh error
CSCwj82989| Flow Export stopped on Windows workload. TetSen.exe restarts.
CSCwj59309| Netscaler external orchestrator to use token-based authentication
CSCwj38923| Enhancement Request – Service Now Connector – REST API url params
CSCwi61963| Enforcement fails with CE_RESOLVE_POD_FAILED error on RHCOS
CSCwj89135| Compliance alert config: Rule not getting processed post edit of the rule

Open Issues

The following table lists the open issues in this release. Click an ID to access Cisco’s Bug Search Tool to see additional information about that bug.

Identifier Headline
CSCwi40277 [Open

API] Agent Network Policy Config needs to show if the status is consistent with data shown in the UI
CSCwh72708| ADM Submissions fail if SLB Config files are in Default
CSCwh95336| Scope & Inventory Page: Scope Query: matches .* returns incorrect results
CSCwf39083| VIP switchover causing segmentation issues
CSCwh45794| ADM port and PID mapping is missing for some ports
CSCwf51818| Flow Search Queries Not Working Correctly
CSCwf43558| Services failures after upgrade with orchestrator DNS name not resolvable
CSCwi57094| M6-39RU Disk Decommission workflow with RAID5 disks
CSCwi98814| Error retrieving attack surface details for workload in the security dashboard
CSCwk06371| Cannot install CSW Agent on Solaris global zone

Changes in Behavior in Cisco Secure Workload, Release 3.9.1.38

  • Clusters force agents to refresh the client certificate if the certificates are close to expiration.

Additional Information

Additional Information for Secure Workload

Information Description
Compatibility Information For information about supported operating

systems, external systems, and connectors for Secure Workload agents, see the Compatibility Matrix.
Known Behaviors| For more information on the known behaviors, see Cisco Secure Workload Release Notes, 3.9.1.1.
Scalability Limits| For information about the scalability limits of Cisco Secure Workload (39-RU) and Cisco Secure Workload M (8-RU) platforms, see Cisco Secure Workload Platform Data Sheet.

Related Resources

Document Description

•  Cisco Secure Workload M6 Cluster Deployment Guide

•  Cisco Tetration (Secure Workload) M5 Cluster Hardware Deployment Guide

| Describes the physical configuration, site preparation, and cabling of a single-rack and dual-rack installation for the Cisco Secure Workload (39RU) platform and Cisco Secure Workload M (8RU).
Cisco Secure Workload Virtual (Tetration-V) Deployment Guide| Describes the deployment of Cisco Secure Workload virtual appliances.
Latest Threat Data Sources| The data sets for the Secure Workload pipeline that identifies and quarantines threats are automatically updated when your cluster connects with Threat Intelligence update servers. If the cluster is not connected, download the updates and upload them to your Secure Workload appliance.

Contact Cisco Technical Assistance Centers

  • If you cannot resolve an issue using the online resources listed above, contact Cisco TAC:
    • Email Cisco TAC: tac@cisco.com.
    • Call Cisco TAC (North America): 1.408.526.7209 or 1.800.553.2447
    • Call Cisco TAC (worldwide): Cisco Worldwide Support Contacts

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE OUTLINED IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version. Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R) © 2024 Cisco Systems, Inc. All rights reserved.

  • First Published: 2024-06-17
  • Last Modified: 2024-06-16

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals