On October 24th, 2018 Flexera upgraded its servers to only accept communication using TLS 1.2 security protocol.
Software Vulnerability Manager solution requires the security configuration of the systems that are being scanned or used for any of the SVM components such as Daemon or Plugins, or the SVM On-Prem server-side installation files, to be enabled to support TLS 1.2 encryption. We've seen isolated issues with that.
Flexera customers who might be using a server version lower than version 220.127.116.11 should upgrade their servers Instantly. Updating your binaries will unlock the value of improvements to our agent and daemon including improved Mac application coverage, performance improvements, better coverage of Office 365 and the ability to leverage SCCM data regarding installed Microsoft updates.
Flexera continues to make regular improvements to the product. Recent updates have included the support of templates for patch configuration, CVSS v3 scoring of advisories, GDPR compliance updates, the ability to search by CVE, the inclusion of Threat Intelligence capabilities, API support for better automation and cross-partition reporting, nearly 1000 patches provided out-of-the-box with their respective silent parameters in the new Vendor Patch Module, and more improvements are coming.
For guidance, please see the appropriate help link below:
The decision has been made to ensure our customers to be secured on each layer of communication. Please make sure your internal systems are upgraded to support TLS1.2 communication. For example: If your SCCM version is old and doesn't support TLS 1.2 then we strongly recommend to upgrade your SCCM to the latest one. Please check your SVM agent, Daemon and SCCM SVM plugin versions and If you have an old version then please upgrade all the binaries from the above-mentioned links.