Edit Points of Presence (PoP):
New Auto Update Toggle:
New Event Hooks for Post-Connection Scripts on macOS devices:
New Malware Download Protection:
New mobile app support for Active Service Tunnels:
New Service Tunnel Disconnect Logs:
Mac Installer Package Versioning (MDM):
Persistent Service Tunnel over TCP Toggle:
Netagent New Points of Presence (PoP) Management:
Desktop App Event Hooks for Post-Connection Scripts on Windows devices:
4.10.0 or later.Desktop App New app-generated sessions for multi-user Service Tunnels:
UI Force re-authentication support for SAML:
Desktop App Cloud Secure Edge support for MacOS 26.3.1:
Desktop App Cloud Secure Edge desktop app re-branding:
4.0.0 or later, admins should use this desktop app installer for mdm.Netagent New CORS toggle:
UI New Firewalls tab:
UI Gemini Log Summarizer:
UI New Internet Access Logging:
ITP New AI & ML Category in Internet Threat Protection Policies:
UI New Proof of Value Reporting:
service_tunnel_accesseslog.UI New Entra ID API Auto-Configuration:
Desktop App New ARM Architecture support on CSE desktop app:
UI Improved the UI experience for device root certificate and reporting token expiry.
ITP Explicit URL Blocking is now available.
Netagent New HTTP-2 Transport Toggle:
Connector New Active Directory Support using LDAP:
UI New Onboarding Guided Setup:
ITP New Geo-Blocking Toggle:
Netagent Registered domains can now route to multiple points of presence (PoP) on the Global Edge Network, improving network performance and reliability.
Netagent Trustscoring has been hardened so that device Trust Levels cannot be altered, improving device security.
Connector New Windows Connector support for public IPs; until certified with Microsoft, there is a limit of 49 public IPs.
New Risk-based URL Filtering:
New Service Tunnel logging of connections and disconnections to Service Tunnels; These logging messages can be found under the Access event type.
Use Geolocation is now enabled by default in Advanced Settings, for more convenient use of the Geolocation Trust Factor.
Service Tunnel Connect on Login is now enabled by default.
Real-time Trust Factor assessments have been enhanced and now include local checks on the CSE app every minute as well as cloud syncing of any changes within this interval.
New Zero Touch Deployment tab for ITP:
New Enable Auto Login:
Fix After users re-authenticate in the CSE app, infra services were occasionally binding to random ports even when the specified listening port was available.
Hotfix With ITP enabled, Service Tunnel was delaying connecting and disconnecting to configured domains.
Extended Network Access for Connectors:
New Lookup Domain Policy Verdict:
Enable Service Tunnel over TCP:
Enable Continuous Ping:
Block Domains <30 Days Old:
Fix Zero-touch script link was broken.
Fix Users with non-admin privileges were unable to clear the Windows defender notifications after Intune pushes.
New Zero Touch Deployment Tab for ITP on Managed Chromebooks:
Improved RDP file download option:
Fix Admin service was not starting after device reboot.
Fix Bug messages were sent when end users were upgrading app versions.
Fix After device restart, end users were receiving a notification requesting admin password entry.
Enhanced Internet Threat Protection Policies:
Fix Entra ID first-time setup now pre-selects the Metadata URL option, instead of admins having to manually select this option.
Enhanced IDP Device Registration:
Connector and Access Tier Download links for all install methods updated to “Latest” endpoints in the Cloud Secure Edge Command Center.
Terraform enhancements: Access policy configuration enhancements, bug fixes, new resource descriptions via API, and new registered domains functionality.
New Open Virtual Appliance Install available for the Connector:
Support for macOS Sequoia:
Upgraded Docker and Ubuntu packages to reduce known vulnerabilities during Access Tier installation.
Read Only admins can now view System Logs (with sensitive information redacted).
Fix IDP configurations for user authentication were not functioning for admins that were previously using the CSE IDP for device registration.
Fix Admins were unable to add or edit the Registry Check trust factor.
Fix Tunnel access policies were not editable when CIDR entries were empty.
Fix MASQUERADE rule was only being used for the default user interface.
Fix In Access Tier versions greater than 2.4.2, using a hosted website with two services using the same frontend domain but different dns_names caused the browser name resolution to fail.
Simplified Entra ID config for end user authentication:
New Filter for Unauthorized Access Attempts via Service Tunnels:
User Attributes are now Collected by CSE Services:
Fix Remove API key after Access Tier install package.
Fix New hosted web services erroring out due to certificate issues.
New Cloud Secure Edge License Management:
Support for a Windows-based Connector:
Enhanced Connector Install and Details page:
Enhanced Service Tunnel Policy:
Fix Connector status reporting was showing the incorrect status colour.
Fix Custom remediation messaging was not being shown in Linux.
Fix Read only admins were unable to view Access Tier details.
Fix Identity Providers were prompting authentication twice in certain scenarios.
Hotfix Internet connectivity issues encountered when devices were waking from sleep.
New Cloud Secure Edge Licensing:
Name Resolution Policy Table (NRPT) Setting for Windows devices:
Fix Serial number casing changed, which made the app unable to recognize registered devices.
Fix The app was facing technical issues calculating Trust Level directly after a device awakened from sleep.
Event Geolocation Setting:
New Geolocation Trust Factor:
Define File Properties for RDP Services:
Trusted Network Detection:
Enhanced Event Chart UI for Troubleshooting:
Hotfix Search Domains: Domain names and FQDNs are now case insensitive.
Fix Service Tunnels with certain configurations were not appearing in the Service Tunnels list.
Hotfix Search Domains:
New Service Tunnel UI:

Connect on Login:

System for Cross-Domain Identity Management (SCIM):
Connector Open Virtual Appliance (OVA) Install:
Geolocation Visibility Events:
Global Edge Troubleshooting:
Hotfix Admins were unable to create a Service Tunnel for public traffic only without selecting a Connector. (Last updated April 19th, 2024)
Internet Access Enable URL Filtering:
Event Charting:
Internet Access Active Roles in Internet Threat Protection (ITP) Policies:
Terraform Exemptions:
Internet Access Create a Custom Public App:

Support for Oracle Linux in the OS Version Trust Factor:
Simplified Silent Cert Authentication:
mdm-config file in order for this flow to work.New Cloud Command Center User Interface (UI) Re-design:

New Enable Private Resource Discovery:
New Encrypting DNS via DoT:
New Auto re-enablement of ITP:
New Silent Cert Authentication for User Sessions:
Fix CSE app was still using previously configured (outdated) remediation links.
Fix Zero touch install script (deployed through Kandji) was failing to execute and timing out.
Fix App login sessions were not refreshing when users selected the Re-Login button.
Fix AI-assisted admin search was indefinitely loading.
New Managed Service Provider (MSP) console:
New Kubernetes config file now updates by default:
Fix Connection test was failing for hosted web services with capitalized Access Tier names.
Fix Okta group name was preventing services from publishing to end users.
New App-based routing for Service Tunnel:
New Security Actions for Public Apps:
New AI-Assisted Admin Search:

New Let's Encrypt Wildcard Support:
New Terraform Import Tool:
Fix (Discover Public Resources) Accessing the same FQDN resource using a second Service Tunnel was not updating the tunnel information on the list page or in the "Last Reported" status.
Fix The admin-server did not have access to the http proxy on the user context for the desktop app. The app now supports HTTP proxy setting consistently across app components (including the admin server).
Fix dns-names was failing to update when the user changed the URL or cloned a service; now, if dns-names matches the spec, it will update accordingly.
Private Resource discovery:
Zero Touch install for Chrome Browser Extension:
Refreshed TrustScoring on reawakening devices:
Chrome Version Trust Factor (for CSE Chrome Extension):
Trust Scoring and Internet Threat Protection (ITP) without the desktop app running:
Authorized Connection events were removed from hosted web services in Netagent.
Support for non-standard websockets (like socket.io), enabled through a new API option:
enable_websocket_duplex to true via Access Tier's local config API call (PUT).mdm_config) after using patch API (/v2/orgs/{id}/mdm_config) to update fields.Netagent Health Check:
Session Expiration Timer

Added Trust Factor information in Log Events

Service Tunnel Active Connections:

Internet Threat Protection - Exclude Users:

Clientless Chrome Browser Extension:

New Trust Factor: Enhanced OS Version
New Trust Factor: CrowdStrike Registered With
Branding Customization

Event Log Viewer for Service Tunnel Activity:

Lookup Domain:

Service Tunnel Access Logs - blocked access attempts:
DNS filter in Captive Portal environments:
Mobile Tunnel:
Enhanced Roles UI:

Internet Threat Protection – Policy Sync Status:


Service Tunnel - Exclude CIDRs:

StatsD support for monitoring Service Tunnels:
wmic commands.Domain-Based Tunnel Policies:

New Registry Key Check Trust Factor:

Admin-Enabled Autorun:
Internet Threat Protection (DNS Filtering) Policies:

Time-Based One Time Passcode for Local Admins:
New Get Started guide in CSE’s Command Center:

Self-Service Connector Installation flow:

New Trust Factor – Property List Check:

Refreshed Devices Page:
Terraform Provider v1.1:
Support for ChromeOS on mobile app:
In v3.6.1 of CSE’s desktop app, the WireGuard Service only listens on Port 53 (default port) when Service Tunnel for public domains is enabled.
[Resolved] Trust Level was not being calculated when devices were first registering to the CSE app.
[Resolved] The Let’s Encrypt certificate chain for hosted websites did not include an intermediate certificate.
[Resolved] iPadOS and Ubuntu were not adhering to the OS Version Trust Factor.
Service Tunnel for Public Domains:


New Trust Factor - CSE App Version:
New Trust Factor - File Check:


Internationalization of CSE Trust Factors:
Removed Support URL from Remediation tab:
Support for ARM architecture in Connector install
Trust Profiles:

Access Tier Version 2 - Simplified Installation and Management:

Custom Help Messaging for End Users:

Enhanced WireGuard performance (bandwidth and speed) for Windows devices.
The desktop app registration process is now language-agnostic (we now support registration for non-English devices).
There are upcoming Trust Scoring changes in our October 2022 release. CSE will provide more details related to the migration as we get closer to the date.
Granular Trust Scoring:


App Support:

Trust Integration with SentinelOne:

Desktop app v3.3.0:
Service Tunnel Quick Connect: The CSE desktop app icon (in the menu bar or system tray) now features a drop-down menu that allows users to:
• Log in or out of the desktop app,
• Jump to settings,
• Quick connect to (or disconnect from) Service Tunnel, or
• Quit the CSE app.
App log files send to CSE Support: If end users encounter issues, they can directly send logs to CSE support via a new button in the desktop app, called Send Log Files to CSE Support, to expedite the troubleshooting process.
Trust Integration with CrowdStrike:
Service Tunnel enhancements:
Desktop app users will now see an error if validation fails while attempting to connect.
the Run Diagnostic Tool now collects logs related to Service Tunnel.
The Support link has been removed from the desktop app.
[Resolved] Auto-Update TrustScore factor was showing as disabled when JAMF config profile was used.
[Resolved] Device registration was failing for Mac users if the device hostname was missing.
[Resolved] Netagent logs were not being collected through Netagent Support Bundle
[Resolved] Websocket connections were not being closed in certain conditions.
Use multiple Access Tier instances with the same hostname:
Access Activity tab for Service Tunnel:

[Resolved] CSE’s Private DNS resolution was case-sensitive; DNS resolution is no longer case-sensitive.
[Resolved] Enhanced DNS routing was not resolving correctly for Windows.
Desktop app v3.1.0:

[Resolved] Updating the Access Tier tunnel configuration in CSE’s Cloud Command Center was causing Netagent to bring down the WireGuard (wg) interface.
[Resolved] In some scenarios, enhanced DNS routing was not resolving correctly.
CrowdStrike Integration:
Desktop App v3.0.0:

Added 'user creation' logs in the System Log when Team Edition admins create new users:
Enhanced DNS Routing:
Refresh token support for SAML-based admins:
Option to disable Strict-Transport-Security HTTP Response Header within Netagent configuration:
Streamlined OneLogin passwordless setup:
Device trust for Azure AD federated apps:
Admins can now sort Devices by 'App Version' in the CSE Cloud Command Center.
Character limits were extended for preferred apps process names, enhancing regex pattern matching.
Terraform Provider:
Streamlined passwordless set-up for Okta:
Service Accounts:
Access Groups for Infrastructure Policies:

New Support for HTTP/3 for the Cloud Command Center:
New TrustScore Statuses for Devices:

We introduced a toggle (in all policy types) that allows admins to hide the service from the service catalog. Previously, hiding a service in the service catalog of the CSE App was only possible through the API or a custom policy.
We have improved our logging capabilities by adding sign-in events for local admins.
Delete unregistered devices:
New Service Tunnel (L4) Policies:
New Web (L7) Policies:
Expiration Notification:
CSEproxy now auto-detects and uses the system proxy for outgoing connections.
Enhanced Zero Touch Installation scripts:
We simplified installation, adding (i) steps to upgrade the app via Zero Touch and (ii) steps to start the app after Zero Touch deployment.
We added a configuration option to hide the HTTP backend connection log (used for troubleshooting purposes) from view.
Netagent was stripping out invalid HTTP cookies. Now, it forwards invalid cookies.
macOS users now receive the correct IP address when they use Service Tunnel.
If admins added an IP exemption within a policy and then removed the Access Tier attached to this same service, IP addresses were being retained (when they should have been removed).
Admin SAML login changes:
New Admin System Log:
Added Devices to Auto-Deletion Setting:
Automatic Device Certificate Renewal:
Run Diagnostic Tool:
If end users are having trouble (e.g., with registering a device, accessing a service, or their Trust Scoring is mis-reporting) and want to investigate whether there are issues with the CSE Desktop App, they can use our new Run Diagnostics Tool to help diagnose their issue.
End users can also use the diagnostics tool to package logs to send to their administrator.
Support for Specifying Users in Zero Touch Registration:
Keychain Explainer Prompt:
Enhanced App Logging:
Service Tunnel
Service Tunnel is a modern WireGuard VPN service that provides encrypted network connectivity to various network segments. It supports Banyan device trust and continuous evaluation.
Discover and Publish for AWS
CSE automatically discovers AWS resources that need to be accessed by your end users. You can then publish these discovered resources as Banyan services from the Command Center.
Discover and Publish for Azure, Google Cloud, and Oracle Cloud
Extends CSE’s cloud resource discovery solution to additional Infrastructure as a Service (IaaS) providers.
| Client Components | Server Components | Management Components |
|---|---|---|
| Desktop App v4.2.0 (Changelog) | Netagent v2.10.6 (Changelog) | Shield v1.57.0 (Changelog) |
| Mobile App v2.3.5 (Changelog) | Connector v2.0.8 (Changelog) |
* Updated in the latest release
(1) Differentiated the Device Trust Verification and Passwordless steps in the process flow; (2) Added auto-continue (replacing manual continuation) after verification has been completed.
We now support an access tier scope for API key use so that admins don’t have to use a Refresh Token while installing the Access Tier.
CSE’s Refresh Token API endpoint now accepts API keys as a form of authentication (in addition to Refresh Tokens). Now, when the Refresh Token endpoint receives an API key, it will return the API key (instead of an Access Token).
To improve user experience of the application, the Device Trust Verification and Passwordless steps have been differentiated in the process flow.
API keys for service accounts:
Clone services:
Support for unregistered devices on mobile:
The Org Name was added to the toolbar of the CSE console so that customers with multiple instances of CSE can now clearly identify which Org they’re presently logged into.
The device verification page was updated (the challenge code was removed) to reflect mobile devices’ use of certificates in app keychains.
Error page designs were updated for consistency.
Service test connection fails when service uses http_connect mode
Incorrect error message when a device is not MDM-compliant
Support for Zero Touch Installation on macOS Big Sur: macOS Big Sur prevents administrators from silently installing CSE certificates through a device manager. CSE now stages the device certificates on the end user’s device, and installation completes when the user launches the app and enters their admin credentials.
Connector v1.3.0 supports installations via Docker on macOS.
Users can now convert an existing service to Custom JSON for advanced configurations.

| Client Components | Server Components | Management Components |
|---|---|---|
| Desktop App* v4.2.0 (Changelog) | Netagent* v2.10.6 (Changelog) | Shield* v1.57.0 (Changelog) |
| Mobile App* v2.3.5 (Changelog) | Connector* v2.0.8 (Changelog) |
* Not updated since last major release
User-defined Service Bundles
Service Test Connection (Requires Netagent v1.37.0+)
Note: Currently, service test connection does not support services that use HTTP Connect.
| Client Components | Server Components | Management Components |
|---|---|---|
| Desktop App* v4.2.0 (Changelog) | Netagent v2.10.6 (Changelog) | Shield v1.57.0 (Changelog) |
| Mobile App* v2.3.5 (Changelog) | Connector* v2.0.8 (Changelog) |
* Not updated since last major release
statsd to send metrics to Datadog via Dogstatsdstatsd to send metrics to Datadog via Dogstatsdbnn_trust JWT token as a Custom HTTP header for hosted websites

| Client Components | Server Components | Management Components |
|---|---|---|
| Desktop App v2.2.1(Changelog) | Netagent v1.37.0 (Changelog) | Shield v1.35.0 (Changelog) |
| Mobile App* v1.10.0 (Changelog) | Command Center v1.66.0 |
* Not updated since last major release
As part of the upcoming CSE Desktop App 2.2 release (expected to release June 30th), we are introducing enhancements to streamline the Desktop App registration and access flows.


Support Contact Information For questions or concerns, please reach out to your Customer Success Engineer or support@sonicwall.com.

| Client Components | Server Components | Management Components |
|---|---|---|
| Desktop App v2.1.0(Changelog) | Netagent v1.36.1 (Changelog) | Shield v1.34.1 (Changelog) |
| Mobile App* v1.10.0 (Changelog) | Command Center v1.66.0 |
* Not updated since last major release
| Client Components | Server Components | Management Components |
|---|---|---|
| Desktop App v2.0.1(Changelog) | Netagent v1.36.1 (Changelog) | Shield v1.34.1 (Changelog) |
| Mobile App* v1.10.0 (Changelog) | Command Center v1.61.1 |
* Not updated since last major release
| Client Components | Enforcement Components | Management Components |
|---|---|---|
| Desktop App v1.14.1 (Changelog) | Netagent v1.35.0 (Changelog) | Shield v1.33.0 (Changelog) |
| Mobile App* v1.10.0 (Changelog) | Command Center v1.58.0 |
* Not updated since last major release

values.yaml file.service.json to support larger service request bodies.*.example.com) now support the root domain (example.com).| Client Components | Enforcement Components | Management Components |
|---|---|---|
| Desktop App v1.13.1 (Changelog) | Netagent v1.34.1 (Changelog) | Shield v1.32.0 (Changelog) |
| Mobile App* v1.10.0 (Changelog) | Command Center v1.54.0 |
* Not updated since last major release
banyanproxy in RDP Gateway mode, the CSE Desktop App sent an incompatible connection header.banyanproxy is close to expiration or expired.| Client Components | Enforcement Components | Management Components |
|---|---|---|
| Desktop App v1.12.2 (Changelog) | Netagent v1.33.0 (Changelog) | Shield v1.31.0 (Changelog) |
| Mobile App* v1.10.0 (Changelog) | Command Center v1.50.0 |
* Not updated since last major release
Welcome to our first release of 2021! This release is a small maintenance release, but next week we will roll out a new Desktop App that includes zero touch installation capabilities, along with other enhancements and improvements.
| Client Components | Enforcement Components | Management Components |
|---|---|---|
| Desktop App v1.11.1 (Changelog | Netagent v1.32.0 (Changelog) | Shield v1.30.0 (Changelog) |
| Mobile App v1.10.0 (Changelog) | Command Center v1.45.0 |
* Not updated since last major release
/)) in service names.| Client Components | Enforcement Components | Management Components |
|---|---|---|
| Desktop App v1.10.1 (macOS, Windows, Linux-Ubuntu, Linux-RPM) | Netagent v1.31.0 (Changelog) | Shield v1.29.0 (Changelog) |
| Mobile App v1.9.0 (iOS, Android) | Command Center v1.41.0 |
* Not updated since last major release
kubectl. Includes support for just-in-time user provisioning and integration with native K8S RBAC. No updates to kubectl client or Kubernetes API required.| Client Components | Enforcement Components | Management Components |
|---|---|---|
| Desktop App* v1.9.0 (macOS, Windows, Linux) | Netagent* v1.30.0 (Changelog) | Shield* v1.28.0 (Changelog) |
| Mobile App* v1.8.0 (iOS, Android) | Command Center v1.38.0 |
* Not updated since last release
HTTP_CONNECT mode in Netagent. (This feature requires Desktop App v1.8.0+).| Client Components | Enforcement Components | Management Components |
|---|---|---|
| Desktop App* v1.8.2 (macOS, Windows, Linux) | Netagent* v1.29.1 (Changelog) | Shield* v1.28.0 (Changelog) |
| Mobile App* v1.8.0 (iOS, Android) | Command Center v1.33.0 |
* Not updated since last release
*). Now, the target parameter supports actual domains.| Client Components | Enforcement Components | Management Components |
|---|---|---|
| Desktop App v1.7.1 (macOS, Windows, Linux) | Netagent v1.28.0 (Changelog) | Shield v1.27.0 (Changelog) |
| Mobile App* v1.6.0 (iOS, Android) | Command Center v1.29.0 |
* Not updated since last release
HTTP_CONNECT mode to Netagent and a corresponding HTTP_CONNECT_DAISY_CHAIN mode in the Desktop App banyanproxy. When enabled, the banyanproxy forwards the client's HTTP CONNECT request to Netagent, and Netagent forwards the request to the configured destination.nameid format for SAML applications.nameid.| Client Components | Enforcement Components | Management Components |
|---|---|---|
| Desktop App* v1.6.0 (macOS, Windows, Linux) | Netagent* v1.27.1 (Changelog) | Shield* v1.26.1 (Changelog) |
| Mobile App v1.6.0 (iOS, Android) | Command Center v1.23.1 |
* Not updated since last release
| Client Components | Enforcement Components | Management Components |
|---|---|---|
| Desktop App v1.5.2 (macOS, Windows, Linux) | Netagent v1.25.1* (Changelog) | Shield v1.23.1* (Changelog) |
| Mobile App* (iOS v.1.4.0, Android v.1.3.1) | Command Center v1.18.0 |
* Not updated since last release
| Client Components | Enforcement Components | Management Components |
|---|---|---|
| Desktop App v1.5.1 (macOS, Windows, Linux) | Netagent v1.23.0* (Changelog) | Shield v1.21.0* (Changelog) |
| Mobile App* (iOS v.1.4.0, Android v.1.3.1) | Command Center v1.16.0 |
* Not updated since last release
| Client Components | Enforcement Components | Management Components |
|---|---|---|
| Desktop App v1.5.0 (macOS, Windows, Linux) | Netagent v1.22.0 (Changelog) | Shield v1.19.0* (Changelog) |
| Mobile App* (iOS v.1.4.0, Android v.1.3.1) | Command Center v1.14.0 |
* Not updated since last release
*.example.com) have been extended to cover WEB services (wildcards previously only worked for TCP services).| Client Components | Enforcement Components | Management Components |
|---|---|---|
| Desktop App v1.4.1 (macOS, Windows, Linux) | Netagent v1.20.0 (Changelog) | Shield v1.16.0* (Changelog) |
| Mobile App* (iOS v.1.4.0, Android v.1.3.1) | Command Center v1.12.0 |
* Not updated since last release
| Client Components | Enforcement Components | Management Components |
|---|---|---|
| Desktop App v1.3.0 (macOS, Windows) | Netagent v1.18.0 (Changelog) | Shield v1.16.0 (Changelog) |
| Mobile App (iOS v.1.4.0, Android v.1.3.1) | Command Center v1.10.0 |
banyanproxy now placed in PATH consistently| Client Components | Enforcement Components | Management Components |
|---|---|---|
| Desktop App v1.3 (macOS), Windows | Netagent v1.17.0 (changelog) | Shield v1.15.0 (changelog) |
| Mobile App v1.3 (iOS, Android) | Command Center v1.9 |
| Client Components | Enforcement Components |
|---|---|
| Desktop App v1.2.1 | Netagent v1.15.1 |
| Client Components | Enforcement Components |
|---|---|
| Desktop App v1.0.11 | Netagent v1.13.0 |
| Mobile App (Android) v1.2 |
| Client Components | Enforcement Components |
|---|---|
| Desktop App v1.0.6 | Netagent v1.11.0 |
| Mobile App (iOS) v1.2 |
| Client Components | Enforcement Components |
|---|---|
| Desktop App v0.3.7 | Netagent v1.9.0 |
| Client Components | Enforcement Components |
|---|---|
| Desktop App v0.3.5 | Netagent v1.7.0 |
| Client Components | Enforcement Components |
|---|---|
| Netagent v1.5.0 |
New app-generated sessions for multi-user Service Tunnels.
Event hooks for post-connection scripts on Windows.
Fix Service Tunnel Active Connection was reporting inconsistently.
Download:
Cloud Secure Edge support for MacOS 26.3.1: The CSE App must be upgraded to v4.0.1 before upgrading to MacOS 26.3.1.
Download:
Desktop app re-brand: App executable names, package names, service names, and directory names are now SonicWall Cloud Secure Edge branded.
Fix Application Check Trust Factor not updating in real time.
Download:
Fix Auto-Update Trust Factor was failing.
Fix Multiple PowerShells were running indefinitely.
Fix After zero-touch deployments, tunnels were not auto-connecting.
Download:
New ARM Architecture support on CSE desktop app: Desktop app now supports ARM architecture on macOS and Windows devices.
Fix Service Tunnel was failing to connect over TCP.
Fix Firewall Trust Factor erroneously reporting a Low Trust Level.
Fix Mandarin characters were displayed in the app after upgrading to v3.26.0.
Fix Service Tunnel exclude public domains function was not working on Windows devices.
Download:
Fix Shared access on ethernet adaptors was not starting automatically.
Download:
Fix CSE app couldn’t identify devices via Serial Number.
Fix Symlinks for login were returning device trust verification errors on select versions of Windows devices.
Fix Select Trust Factors were failing on app first startup until refreshed.
Download:
Performance enhancements.
Download:
Hotfix With ITP enabled, Service Tunnel was delaying connecting and disconnecting to configured domains.
New Enable Auto Login toggle on the app; when enabled, this feature automatically re-authenticates user sessions on app start up; Available on macOS and Windows devices.
Download:
App start-up automatically initiates login flow once session expires
Fix After re-authenticating in the CSE app, infra services are sometimes binding to random ports even when the specified listening port is available.
Download:
New Enable Continuous Ping toggle to keeps sessions alive and prevent connections from dropping.
New Enable Service Tunnel over TCP toggle for end users who require internet access temporarily on restrictive networks; this toggle is for Private Edge traffic only.
Download:
Fix Certificate install was failing on macOS versions 15+ in new orgs.
Fix Admins were unable to connect to Captive Portal or pay-walled networks when using ITP.
Fix Admins were receiving an error when connecting to Service Tunnels designated as Trusted Networks.
Fix Admins were experiencing delayed updates when toggling ITP on or off on macOS versions of the desktop app; ITP updates are now reflected within 15 minutes.
Download:
Performance enhancements.
Download:
New Fedora 40 support
Download:
Fix In some cases, end users running desktop app versions 3.21+ were unable to log in while connected to non-CSE VPNs.
Download:
Support for macOS Sequoia.
Download:
Hotfix Internet connectivity issues encountered when devices were waking from sleep.
Download:
Fix End users were being prompted twice for credentials during login.
Download:
Fix Serial number casing changed, which made the app unable to recognize registered devices.
Fix The app was facing technical issues calculating Trust Score directly after a device awakened from sleep.
Download:
Hotfix Search Domains: Domain names and FQDNs are now case insensitive.
Download:
Trusted Networks support.
RDP file properties support.
Download:
Performance enhancements.
Download:
Support for URL filtering
New Internet access issue after the app showed the following error "Internet Threat Protection could not be configured; port 53 in use".
Previous versions of the app (3.8.2 and older) were able to handle registrations for machines that did not have a serial number by creating a serial number. This functionality was restored.
Download:
Support for Oracle Linux in OS Version Trust Factor.
Download:
New Auto re-enablement of ITP after one hour of being disabled.
New Device-side DNS resolution now defaults to resolving over TLS, which is encrypted.
Download:
New CSE’s desktop app now updates (instead of regenerates) the kube config file when end users connect to a Kubernetes service, retaining previous configuration used by kubectl.
Download:
Fix The admin-server did not have access to the http proxy on the user context for the desktop app. The app now supports HTTP proxy setting consistently across app components (including the admin server).
Download:
Fix Desktop app no longer enforces automatic retry for sending features and TrustScoring.
Download:
Fix Refreshed TrustScoring on reawakening devices
Download:
New Trust Level updates when users switch orgs via the desktop app.
New ITP and TrustScoring now function via the Admin Service alone (independently of the desktop app); therefore, the desktop doesn't need to be running in order for these functionalities to work.
New Chrome Version Trust Factor in early preview.
Fix End users were receiving a 'Could not fetch devices' error when switching networks on the desktop app.
Download:
New Session expiration timer in app.
Download:
Fix Enabling ITP was misrouting DNS in Ubuntu.
Download:
Fix The CSE client will use the host DNS server for any DNS requests until captive portal authentication is complete and internet access is available.
Download:
Fix Launching the desktop app (from the Windows start menu) when the app was already running was causing the tunnel to disconnect.
Download:
New OS version and Bios serial number update on app start up.
Download:
Fix CSE app has migrated commands to PowerShell; the app no longer uses wmic commands.
Fix When users connected to Service Tunnel on Windows devices, the IP address without mask defaulted to /8.
Download:
Performance improvements for cases in which there are large numbers of public domains in a Service Tunnel.
Download:
New Registry Key Trust Factor for Windows devices.
New Admin-enabled Autorun setting in the Command Center.
New Internet Threat Protection (ITP) policies and functionality.
Download:
Fix Preinstalled Firefox Extension (without the core browser) was failing device registration
Fix MDM parameters were not working as expected for Linux devices
Fix Registered 10ZiG devices were showing up as a single device in the Command Center
Download:
New Property List Check Trust Factor
Download:
the WireGuard Service now only listens on Port 53 (default port) when Service Tunnel for public domains is enabled.
Download:
New Internationalization of CSE Trust Factors.
New CSE App Version and File Check Trust Factors.
Download:
New Internationalization of registration on Windows devices.
Enhanced WireGuard performance on Windows devices.
Fix Firewall Trust Level Factor now supports Group Policy settings for Windows devices.
Download:
New Trust Levels are replacing numerical Trust Scores in CSE's new Granular Trust Scoring model.
Lengthened Service Tunnel startup probe timeout.
New Help button that redirects end users to an internal ticketing system for any assistance.
Fix WireGuard interface now sets the correct MTU size of 1380, allowing Service Tunnel traffic to pass through faster.
Download:
New App logs can be sent directly to CSE Support from the Health Check page.
New App session expiry icon.
New Service Tunnel quick connect option from the CSE app icon in the menu bar.
New macOS ARM build (in Early Preview).
Download:
Fix Auto-Update TrustScore factor was shown as disabled when using JAMF config profile.
Fix Device registration failed for Mac users when the device hostname was missing.
Enhanced Service Tunnel validation on connecting; an error now appears if the validation fails.
New Run Diagnostic Tool now collects Service Tunnel related logs and data.
The support link has been removed from the desktop app.
Download:
Enhanced support for Zero-Touch Installation
Download:
Fix Device Trust Verification issues on Linux devices have been resolved.
Download:
Fix Service Tunnel issues on Windows devices have been resolved.
Download:
New Admin Service: The desktop app now has an administrative component, for any actions within the app that require admin privileges.
Enhanced logging, with admin logs.
New Home tab: A single location for accessing Service Tunnels, Recently Accessed Services, and Active Connections.
New Enhanced Search: End users can easily search their services catalog without having to re-open the desktop app.
New Service Tunnel interface with an Autorun option, so that Service Tunnel connects when an end user logs into the desktop app.
Download:
Full support for Fedora (34 and later) in CSE's desktop app.
Download:
New Expiration notification when a user’s login token is 2 hours away from expiring. The expiration notification time is configurable.
Download:
New Run Diagnostic Tool.
New Support for specifying users in ZeroTouch registration.
Enhanced app logs.
New Keychain explainer prompt to notify macOS users that CSE needs access to their keychains.
Download:
New The CSE Service Tunnel feature is now available in Early Preview.
Download:
User defined Service Bundles
Added filters for service types within the service catalog.
Download:
Fix CMD+W shortcut was not usable with other applications when CSE App running.
Download:
Simplified Desktop App Registration
Viewing Hosted Web Services will require an identity provider login
Additional keyboard shortcuts
Performance and stability improvements
Download:
Integrated CSE CLI to run in-terminal commands to connect to CSE services without interacting with the CSE Desktop App. *(This feature is in early preview.
Devices enrolled via Zero Touch installation support CSE's Passwordless authentication. (This feature is in early preview and must be explicitly enabled for your organization)
(Bug fix) Devices enrolled via Zero Touch installation were unable to favorite services or set services to autorun.
Download:
Fix Autorun did not respect the configured port and instead chose a random port.
Fix The status of a service did not update properly until the app was refreshed.
Fix Certificate selection pop-up was not suppressed on Windows.
Download:
Desktop app re-design:
Quicker refresh of Trust Score when checking device posture.
(Bug fix) If an organization had multiple devices having serial numbers as "Default string" (literal value) rather than an actual serial number, then the devices appeared in the Command Center as a single device with multiple users.
(Bug fix) The one-time passcode exclusion feature was not working for policies configured for individual roles and only worked for policies configured with the ANY roles option.
Download:
(Bug fix) Fixes related to wildcard TCP services.
Download:
When tunneling to a collection of TCP services with the Domains to Proxy feature, the banyanproxy did not properly start.
Download:
Service descriptions now support clickable links.
Download:
Device certificate auto-renewal (Not supported for devices registered via Zero Touch Deployment).
(Bug Fix) Token size limit reached due to having a large group claims.
Download:
(Bug fix) Trust Factor calculations were incorrect for Firewall & AutoUpdate on Linux-RPM.
(Bug fix) Suppress error messages when invalid requests are made for port 8118.
(Bug fix) Kubernetes services configured without a specific port did not connect because the Desktop App used a random port (as expected) while banyanproxy expected port 8080.
Download:
Leverages full application path instead of symlink.
(Bug fix) Token size limit reached due to having a large group claims.
(Bug fix) The RDP Gateway mode did not work in CSE DesktopApp for Windows.
Download:
Fixes for macOS Big Sur M1 on ARM64 and X64 devices.
Deprecate banyanproxy mode options (HTTP_CONNECT and HTTP_CONNECT_BASTION).
In-app indicator for length of time remaining in session.
Tray icon indicator for when session is about to expire (yellow at < 2hrs, red after expiry).
Display prompt when session expires (configurable in Desktop App settings).
New utility functions (--unregister and --remove-staging) for command line when distributing the CSE Desktop App using a device manager.
CSEproxy, when running in HTTP_CONNECT_DAISY_CHAIN mode, can be configured to only proxy certain IncludeDomains using MTLS. All other domains will be passed through transparently.
(Bug fix) banyanproxy did not initiate auth flows for some TCP services when the certificate expired.
Download:
(Bug fix) Fixed issue involving Zero Touch installation and excessive token length.
Download:
(updated Jan-14-2021)
Added capability to allow Zero Touch Desktop App installation and CSE organization registration via Device Managers (such as Intune).
View services with login token rather than the reporting token.
(Bug fix) Link to CSE's Privacy Policy was incorrect.
(Bug fix) banyanproxy did not inform the end user that the configured local port was already in use.
(Bug fix) mdm-config.json was deleted when Desktop App was upgraded.
Download:
(Bug fix) If a user is a member of many groups, the resulting login token became excessively long which caused logins to fail.
Download:
Added .rpm version of the Desktop App to support Fedora-based Linux distros. (The .rpm version of the Desktop App does not currently support Trust Scoring for up-to-date OS or Org Preferred Apps.)
SSH Config is now saved to its own file (~/.ssh/banyan.config).
Display a notification if the device loses Internet connection.
Display Device Ownership type.
Improved support for Firefox.
Improved logging.
Windows Firewall Trust Factor determination only considers public and private firewall settings, and ignores the domain firewall setting.
Collect Windows bios serial number if baseboard is blank or "default string"
SSHCert format changed to SHA-256.
Enhanced experience for login certificate renewal.
Desktop App now uses an include command to incorporate SSH configs written to ~/.ssh/banyan.config.
Download:
One-click access for Kubernetes Services.
Enhanced support RDP Servers.
Added Trust Factors (Firewall and Disk Encryption) for Linux.
(Bug fix) Desktop App for Linux was not properly collecting and reporting preferred apps running on the device.
Download:
Administrators can customize TrustScore remediation instructions and links displayed to end users in the Desktop App. These instructions can be customized for each TrustScore factor and are specific to the device's operating system.
Initial release of Device Trust Verification capability to support native "sandboxed" apps. "Sandboxed" apps are iOS/Android/MacOS/Windows apps that use WebViews for authentication that are unable to access the CSE Device Cert placed in the device cert store or keychain. (This feature is in early preview and must be explicitly enabled for your organization.)
Improved implementation and management of connectivity to SSH services.
Download:
Complete UI refresh.
Preferred Apps for Device Trust Scoring now supports regex pattern matching for apps having process names that are variable or change regularly.
Improved feature collection.
Download:
Added a HTTP_CONNECT_DAISY_CHAIN mode for banyanproxy to forward the client's HTTP CONNECT request to the given proxy host and port. (This feature requires CSE Netagent v1.27.0+)
Administrators can preconfigure all the parameters the end user needs to connect from the CSE Desktop App to TCP Services.
If allowed by Administrators, end users can override preconfigured parameters when connecting to TCP Services.
Added configuration to use TrustCert and/or SSHCert.
Added configuration to not write to SSH Config.
Download:
Added configuration options for deploying desktop app via Device Managers.
For devices managed by Workspace ONE UEM, device TrustScore calculation accounts for Workspace ONE UEM factors.
Download:
Added configuration options when deploying desktop app via Device Managers.
Device Manager configurations are no longer contained in config.json; instead these should be in a mdm-config.json file in the Desktop App installation directory. If you configured Device Manager settings with CSE Desktop App v.1.5.0, you must move the existing configurations from config.json to mdm-config.json.
Download:
Added features to enable fleet deployments using Device Managers, including:
Simplified authentication flows needed for an end user to view their Services and TrustScore
Added feature to automatically suppress the Device Certificate pop-up in Windows (Chrome, IE) and MacOS (Chrome, Safari) browsers
Better support for developers workflows
banyanproxy now has an HTTP Connect Mode for TCP Services(Bug fix) Devices where SerialNumber is "0" (such as VirtualBox VMs) are now treated the same as devices that do not have a serial number.
Download:
Released CSE Desktop App for Linux (Ubuntu-only) with the following known feature limitations:
certutil installed.(Bug fix) Implemented fixes to TrustScore calculations when overridden.
(Bug fix) Fixed behavior related to Desktop App starting on bootup.
(Bug fix) Implemented fixes to Root & Intermediate Cert install/uninstall.
Download:
Added option to automatically launch Desktop App on device startup.
Display a list of other devices the user has registered with CSE.
Simplified connection workflow to generic TCP services.
Prompt to ask for Device Ownership on registration.
Allow installation of Desktop App when a device has no SerialNumber value.
Added support for organizations with Intermediate CA certificates (existing capability supported Root CA certificates).
Download:
Added auto-update capability so end users are automatically notified of new versions and can update with a button click.
Fixed intermittent ‘Delete Device Registration’ error.
Ensure banyanproxy is placed in PATH consistently.
Download:
Fixed DNS connectivity during network changes.
App now displays Session Expiry time in app Settings.
Users can now save logs to their local device and share later, using Export Logs in app Settings.
General stability improvements
Download:
When Service Tunnel is connected and app is closed, tunnel remains active; when app is re-opened, tunnel re-syncs.
Users can extend their session from Settings before their session expires.
App now displays Session Expiry time in app Settings.
Users can now save logs to their local device and share later, using Export Logs in app Settings.
Download:
Fix Mobile Service Tunnel was not respecting IP whitelisting.
Compliance updates.
Updated app description.
Download:
Fix Landscape mode was not working on Android devices.
Download:
Fix Crash on iOS with expiration task.
Download:
New Support for ChromeOS on the Android mobile app.
Download:
Fix Device Trust Verification was not functioning correctly when the mobile app was turned on from deep sleep mode.
Download:
Re-introduced the shield icon in Device Trust Verification, which allows users to enter challenge code as a verification method.
Download:
Performance and stability improvements.
Download:
Streamlined Mobile App Registration
Updated device trust flows to use Device Trust Verification.
Download:
Support to enable/disable email OTP for device registration.
Updated Device Trust Verification (beta) screen.
Download:
Revamped CSE Mobile Apps (iOS and Android) for performance and stability improvements.
Download:
New Allow using the device serial number when the Chrome Browser Extension is force installed on a Chromebook using Google Workspace policy.
Download:
Performance enhancements.
Download:
New Zero touch installation for the Chrome Browser Extension so admins can use Google Workspace to distribute to their fleets of managed chromebooks and browsers.
Download:
New Points of Presence (PoP) Management: Admins can now select geographic locations in which they want to provision points of presence (PoPs). PoP selection is available for new orgs (created after March 27th, 2026) with SPA licensing.
Fix A 3rd-party vulnerability scanner was producing false positives.
Download:
New CORS toggle: Admins can now enable a CORS toggle to secure authorization requests on hosted websites.
Fix Service Tunnel performance improved.
Download:
Download:
Fix Duplicate entries within the service_tunnel_accesseslog.
New HTTP-2 Transport Toggle: Admins can now enable HTTP-2 Transport so that users connecting to resources can do so via the HTTP-2 protocol; not enabled by default.
Fix Hosted website sub-URL redirect was not working.
Fix Global Edge Access Tiers were being terminated, which impacted access to internal services via the Service Tunnel.
Download:
Service Tunnel over TCP (on port 443) is now available for Global Edge orgs.
Fix Chunk encoding was not handled properly.
Fix Multiple users receiving low Trust Levels due to caching issues.
Download:
Registered domains can now route to multiple points of presence (PoP) on the Global Edge Network, improving network performance and reliability.
Trustscoring has been hardened so that device Trust Levels cannot be altered, improving device security.
Download:
Fix Tunnel access policies were not editable when CIDR entries were empty.
Fix MASQUERADE rule was only being used for the default user interface.
Fix In Access Tier versions greater than 2.4.2, using a hosted website with two services using the same frontend domain but different dns_names caused the browser name resolution to fail.
Download:
Fix Remove API key after Access Tier install package.
Download:
Hotfix Search Domains: Domain names and FQDNs are now case insensitive.
Download:
Netagent bypasses systemd-resolved.
Download:
Performance enhancements for the Global Edge.
Download:
Performance enhancements for the Global Edge.
Download:
New Enhanced Netagent performance (lowered CPU usage).
Download:
Fix Connection test was failing for hosted web services with capitalized Access Tier names.
Download:
Fix (Discover Public Resources) Accessing the same FQDN resource using a second Service Tunnel was not updating the tunnel information on the list page or in the "Last Reported" status.
Download:
Fix Improved support for private resource discovery
New /health API endpoint supports query parameters to filter results specific to a service or component
Download:
Fix Access Tiers were collecting stale certificates from outdated services.
New Support for non-standard websockets (like socket.io), enabled via Access Tier Local Config API.
Download:
New Netagent Health Check.
Download:
Fix Enabling ITP misroutes DNS in Ubunutu.
Download:
New Debugging interface now enabled by default (memprofile set to true).
Fix Users were intermittently being disconnected from Infra Services and Service Tunnel; warnings were generated but error messages were not.
Download:
Fix ICMP admin prohibited packets are returned for rejected traffic.
Efficiency improvements in Service Tunnel L4 policy changes.
Download:
Fix Hotfix for Netagent - Shield connection.
Download:
Improved Netagent reporting.
New StatsD support for monitoring Service Tunnels.
Download:
Fix FQDNs used in Tunnel-based policies were failing to resolve in some cases.
Download:
Fix Domain-based policies weren't working as expected when FQDNs' IP addresses were changed.
Download:
Fix When using intermediate CA certificates, the CA certificate format was incorrectly written, causing the Netagent to fail on start.
Fix WireGuard kernel module, required for running kernel version in Amazon Linux 2, was missing.
Browser-based Error messages have been updated.
Download:
Fix Private domains (ipv6) were not resolving over Service Tunnel.
Download:
Fix Hotfix for Service Tunnel with Connector.
Download:
New Service Tunnel for Public Domains.
New Service Tunnel Discovery.
Download:
Simplified the Access Tier installation process.
New Local configs (i.e., advanced configs) are done via API/UI instead of the config.yaml file.
Download:
New Netagent logs will now report the TLS ciphers and versions for every connection.
New Access type Event Logs will now report Access Tier name along with its public address for every connection.
Download:
Performance and stability improvements.
Download:
Fix Netagent was unable to correctly handle websocket connections in case of OIDC exempt requests.
Download:
Fix Websocket connections were not being closed in certain conditions.
Fix Netagent logs were not being collected through Netagent Support Bundle.
Download:
Fix CSE’s Private DNS resolution was case-sensitive; DNS resolution is no longer case-sensitive.
Fix Enhanced DNS routing was not resolving correctly for Windows.
Download:
Fix Updating the Access Tier tunnel configuration in CSE’s Cloud Command Center was causing Netagent to bring down the WireGuard (wg) interface.
Fix In some scenarios, enhanced DNS routing was not resolving correctly.
Download:
New Option to disable Strict-Transport-Security HTTP R
New Option to disable Strict-Transport-Security HTTP Response Header within Netagent configuration.
Download:
New Support for Service Accounts in the Cloud Command Center.
Admins can customize the SameSite cookie property of the bnn_trust cookie used by Hosted Websites.
Fix Service Tunnel iptables rules were not deleting after the Access Tier was removed from the Service Tunnel.
Download:
Fix Service Tunnel issues that were causing select TrustScores to be ignored.
Download:
Fix Service Tunnel users were experiencing packet loss when users were added or removed.
Download:
New Admins can now easily define L7 rules within web policies through the CSE console.
New Admins can now create network-level (L4) Service Tunnel policies.
Download:
Fix Netagent was stripping out invalid HTTP cookies. Now, it forwards invalid cookies.
Fix macOS users now receive the correct IP address when they use Service Tunnel.
Download:
New Netagent now returns a connection test response when it receives a request from
shield with * in the site name.
New The REST API server now reports for all access-tiers in a cluster.
Download:
Restored “Netagent Details” for hosted websites and infrastructure
Removed enforcement of “Site Domain Names” configuration parameter
Download:
Metrics collection using statsd to send metrics to Datadog via Dogstatsd
Use Let's Encrypt certificates for hosted websites
Frontend domain with upper case letters
Download:
Performance and stability improvements.
Download:
Various improvements to Access events.
reported_by field to display the specific Netagent sending the event.correlation_id identifies the TCP connection.Added Headers field under HTTP Settings in the Service Spec.
Download:
Optimized standard config parameters down to only four values and updated defaults for many parameters to simplify common Netagent configurations. The following defaults have changed:
secure_bootstrap = trueaccess_tier = true, site_domain_names = "*"code_flow = true, groups_by_userinfo = true, redirect_to_https = trueMiscellaneous Access event improvements.
(Bug fix) If a request had two Trust cookies -- one that is valid and a second one which is not valid -- then depending on the order in which they are getting processed by Netagent, the valid one could end up getting deleted, which would make the user have to re-authenticate. Now, in that scenario the valid cookie will not be deleted.
(Bug fix) Netagent v1.34.0 did not properly handle expired cookies, which caused end users' browsers to get stuck in an endless redirect loop when attempting to access a web service.
Download:
Wildcard Web Service definitions (such as *.example.com) now support the root domain (example.com).
(Bug fix) Netagent handling of cookies for wildcard domains.
(Bug Fix) Valid short-lived certificates that were older than 24 hours were rejected. Now, short-lived certificates can be up to 72-hours old.
Performance and stability improvements.
Performance and stability improvements.
OIDC Services - Added ability to exempt specific Source IPs from Policies
OIDC Services - Add ability for Netagent to query TrustProvider's userinfo endpoint to obtain a user's group membership. This is especially useful for organizations where the end users belong to a large number of groups, which increases group information included in the TrustCookie and triggers browser limitations on cookie size.
(Bug Fix) OIDC Services - the bnn_return cookie logic used to return the end user to the original path they were attempting to access (for example, /foo) now also supports query parameters (such as, foo?bar=123).
Enriched information collected about a Netagent when generating a one-click support bundle. The bundle now collects additional Netagent configuration files and CIDR ranges as well as common commands support staff needs to better understand the Netagent environment.
Ability to create allow list of backends and ports (including CIDR ranges) when configuring services.
(Bug Fix) OIDC Services - Previously, when configuring CORS, the target parameter only supported a wildcard (*). Now, the target parameter supports actual domains.
Updated a shared-library dependency involving default values for the allow_user_override metadata tag, which (in some scenarios) reset admin-configurations and led to erroneous blocking of end user access.
Added HTTP_CONNECT mode for Backend routing; when set, Netagent will rely on an HTTP Connect request to derive the backend target address (i.e., ipaddress:port or fqdn:port).
(Bug Fix) Successful WebSocket closure statuses were returning incorrectly.
(Bug Fix) Netagent Service configurations were not properly updating.
(Bug Fix) Netagent v.1.25.0 introduced a regression for Cognito that passed an OAuth “scope” called “groups”, which Cognito does not support.
Support of exempting CORS traffic.
Added ability to zip up logs folder and send, via Shield, to the Command Center to create a Support Bundle for troubleshooting.
Fixed cookie logic for WebSockets and Multi-domain Services so that CSE TrustCookies are removed from HTTP requests that are forwarded to upstream servers.
The CSE TrustCookie still can be forwarded by setting the forward_trust_cookie parameter to true. CSE TrustCookie removal is performed both with and without the domain parameter to avoid a browser redirect loop scenario.
Added a configuration option redirect_to_https to redirect traffic from Port 80 (HTTP) to Port 443 (HTTPS).
Added a configuration option https_proxy to use an HTTP Connect Proxy to make outbound connections to Shield and TrustProvider
Added a configuration option forward_trust_cookie to not strip out the bnn_trust cookie before sending an HTTP request to the backend application
(Bug Fix) OIDC Services - Strip out the bnn_ cookies, that are used in OIDC authentication flows, before sending an HTTP request to the backend application. This enables Netagent to proxy traffic to applications that cannot tolerate additional cookies due to their max-http-header-size parameter.
Service configuration details are now reported from Netagent and displayed in the CSE Command Center.
The service spec has a new exempted_paths field which allows specifying a list of HTTP paths that will be accessible without OpenID Connect authentication.
In the Service Spec, the oidc_settings.service_domain_name URL value can include a wildcard (*) in the first component of the domain name. Including the wildcard enables one CSE service to permit a dynamic, non-fixed set of OpenID Connect redirect URLs. Please note: The OpenID Connect standard does not support wildcard redirect URLs, and so this feature should be used with care.
Added a configuration option code_flow for opt-in support for OpenID Connect Authorization Code flow. The default mechanism for OIDC authentication remains OpenID Connect Implicit Code flow.
Changed wildcard support in site_domain_names parameter in the config.yaml settings file, used when Netagent is run in Access Tier mode. Now, the wildcard (*) will match any prefix, not just the first component, of the SNI name. Previously, "*.example.com" in the service_domain_names parameter would match SNI "www.example.com" but not "alpha.beta.example.com"; now, it will match both.
(Bug Fix) OIDC Services - Fixed a race condition at the token validation stage that was causing sporadic hanging of connections to applications.
(Bug Fix) Fixed issue where Netagent stopped working if the underlying host was upgraded.
Performance and stability improvements.
Disconnect existing TCP connections (SSH, RDP, etc.) automatically if the device's TrustScore drops below the level specified in the Policy condition.
Added name_delimiter field to backend target in Service spec
Performance and stability improvements
Configuration guardrails - Require site name, site address, or site domain name
(Bug Fix) Proxy WebSocket - Passing all headers for WebSocket request
Improvements to log messages
(Bug Fix) Workload identification - Improved handling when process or parent process has exited
(Bug Fix) Workload identification - Client cert issued to Unidentified container even if it has no roles
(Bug Fix) OIDC Services - robust deep-linking
Support for Services with mixed (user and workload) client types
OIDC Services - Trust cookie is a session cookie (auto-removed on browser shutdown)
(Bug Fix) OIDC Services - Obey Source IP Exceptions as long as Service is non-SNI
(Bug Fix) Workload Roles - Affix Roles even if workload is "Unidentified"
Inactivity & max session timeouts
"BadActor" module for DoS prevention
Connection IDs in events & log files for easier troubleshooting
OIDC Services - deep-linking, HTTP Strict Transport Security (HSTS)
Support for proxying Websocket
Send complete cert chain on TLS handshake
Uninstall script
GA Release
Access Tier mode
Trust Scoring support
Service definition via Web Console
CIDRs automatically installed from Service definition
OIDC workflows
HTTP authorization policies
Forwarding Gateway mode
Various stability enhancements
Fix LDAP configuration was disappearing when the Connector was disconnected.
Download:
Windows C++ Redistributable is now packaged with the Windows Connector installer.
Download:
New Active Directory Support using LDAP: Admins can now set up Active Directory authentication in CSE.
Download:
Fix Resource IP was not translating correctly on Windows Connector when there were more than 50 IPs.
Download:
New Windows Connector support for public IPs; until certified with Microsoft, there is a limit of 49 public IPs.
Download:
New Open Virtual Appliance install available for the Connector.
Download:
Cloud connectivity check was added to installer.
Help commands for TCP health check were added for Mac, Linux, and Windows.
Download:
Enhancements for the new release of the Windows-based Connector.
Download:
Connector bypasses systemd-resolved.
Download:
Performance and stability improvements.
Download:
Performance and stability improvements.
Download:
Performance and stability improvements.
Download:
Performance and stability improvements.
Download:
Performance and stability improvements.
Download:
Performance and stability improvements.
Download:
Performance and stability improvements.
Download:
Performance and stability improvements.
Download:
Performance and stability improvements.
Download:
Performance and stability improvements.
Download:
Performance and stability improvements.
Download:
New ARM architecture support for install.
Download:
Performance and stability improvements.
Download:
Optimized Docker image size for Connector.
Download:
Performance and stability improvements.
Download:
Connector will now include /etc/hosts when proxying DNS requests.
Download:
Support for Service Tunnel.
Support for Connector deployment on M1.
Download:
Support for users who want to install the CSE Connector via Docker on a MacOS device.
Download:
Configure Connectors from Command Center
CIDR-less support
Added example services
Download: