On October 24th, 2018 Flexera upgraded its servers to only accept communication using TLS 1.2 security protocol.
Software Vulnerability Manager solution requires the security configuration of the systems that are being scanned or used for any of the SVM components such as Daemon or Plugins, or the SVM On-Prem server-side installation files, to be enabled to support TLS 1.2 encryption. We've seen isolated issues with that.
Microsoft has an extensive article that explains what settings may need configuring if any issues occurred.
Flexera customers who might be using a server version lower than version 7.5.0.11 should upgrade their servers Instantly. Updating your binaries will unlock the value of improvements to our agent and daemon including improved Mac application coverage, performance improvements, better coverage of Office 365 and the ability to leverage SCCM data regarding installed Microsoft updates.
Flexera continues to make regular improvements to the product. Recent updates have included the support of templates for patch configuration, CVSS v3 scoring of advisories, GDPR compliance updates, the ability to search by CVE, the inclusion of Threat Intelligence capabilities, API support for better automation and cross-partition reporting, nearly 1000 patches provided out-of-the-box with their respective silent parameters in the new Vendor Patch Module, and more improvements are coming.
For guidance, please see the appropriate help link below:
* Updating the SVM Agent: http://helpnet.flexerasoftware.com/csi/Default.htm#helplibrary/Agent_Deployment.htm
* Updating the SVM Agent using SCCM:
http://helpnet.flexerasoftware.com/csi/Default.htm#helplibrary/Run_Scan_from_System_Center_Configuration_Manager__SCCM_.htm
* Updating the SVM Daemon:
http://helpnet.flexerasoftware.com/csi/Default.htm#helplibrary/Download_and_Install_the_Software_Vulnerability_Manager_2018_Daemon.htm
* Updating the SVM SCCM Plugin: https://resources.flexera.com/web/www/landing/download-svm.html
Why TLS1.2?
Please follow the link below for more information on TLS1.2 security.
https://blog.pcisecuritystandards.org/are-you-ready-for-30-june-2018-sayin-goodbye-to-ssl-early-tls
https://www.appointmentplus.com/blog/top-8-things-know-about-tls-1-2/
The decision has been made to ensure our customers to be secured on each layer of communication. Please make sure your internal systems are upgraded to support TLS1.2 communication. For example: If your SCCM version is old and doesn't support TLS 1.2 then we strongly recommend to upgrade your SCCM to the latest one. Please check your SVM agent, Daemon and SCCM SVM plugin versions and If you have an old version then please upgrade all the binaries from the above-mentioned links.
For the latest product release notes, see http://helpnet.flexerasoftware.com/#csicloud00
For earlier product release notes, see http://helpnet.flexerasoftware.com/#csicloud99
If you haven't already, subscribe to the Flexera System Status Dashboard for Cloud service updates and outage notifications on https://status.flexera.com/.
on Nov 15, 2018 04:53 PM - edited on Sep 14, 2019 04:36 AM by RDanailov