December 19, 2022 - Version 6402
Version information
Agent | API |
---|---|
2.7.3 |
4.5.0 |
New features
- We've enhanced the protection provided by your ransomware policy. With this release, Datto EDR can attempt to kill malicious processes when they are detected, reducing the impact of a ransomware attack. To enable this feature, visit the Policies page, select a ransomware policy, and, from the Edit Policy page, activate the Attempt to kill suspected process toggle. Learn more in our Working with the Policies page article.
- To help you save valuable setup time, the collection and response extensions included with Datto EDR will be set to active when a new tenant is created. For additional details about extensions, refer to our Leveraging collection and response extensions article.
- For improved visibility into how your licenses are being utilized, we've updated the Dashboard page to add the license counts purchased to the total number of monitored hosts. You'll also be able to see when your current license bundle expires. Visit our Getting started with the Dashboard page article for more details.
- You can now nest more than one property in a nested data payload of a webhook alert without needing to specify each property one at a time. To learn more about working with webhooks, consult Creating Datto EDR webhooks.
- If you use the RMM integration, you can now access your Datto EDR instance from within Datto RMM. When accessing your instance via this method, you'll notice a few functionality limitations. For more information, refer to Managing locations via Datto RMM and Working with the Policies page.
Bug fixes
- We've resolved an issue that could prevent ransomware alerts from being delivered via integrations. Your Datto EDR instance can now send alerts with your current integration configurations.
- This release resolves an issue that prevented the alert list from automatically filtering by hostname when pivoting from Host Summary to View more alerts.
- We resolved an issue that caused customers from the European Union and APAC regions to encounter 404 errors when logging into Datto EDR via the Partner Portal.
- Previously, an issue with the Endpoint Security agent caused it to consume high levels of system resources. This problem is now resolved.
- We have resolved an issue in which command line entries containing \n or \r\n could corrupt syslog messages.
- This release resolves an issue that could cause the Endpoint Security agent to continuously restart following the deployment of a ransomware policy.
Artifacts
agent.linux32.add5cf337c3de1954000b42dab7e3ad5c25285c4d39fd914be8814547944b3ef.exe.gz agent.linux64.4f28db8d5cc9b5f89d2ce06d0867b78182a79faaf27df2101c522bccdb9fed46.exe.gz agent.macos.1336e5192534c6f54c344ae463a7360bb0e16bd207631efd82649d62e1b6be7c.exe.gz agent.windows32.2170122124706414c647d524a539ab740c038da17d956adaeed58979789a55eb.exe.gz agent.windows64.46b7f08f6e34d20a2ea2a6f9abb8078d727bfbacb6897dedecf864442d6552e5.exe.gz controller.windows64.88db7f28343b3a9bc0559715f96ae91b6157add23e2014bb929b1ccd2a5cb268.exe.gz controller_installer.windows64.0d686831aa635febb1873379878d9ec76df55a92ffe19b288adec7c8a1c10d7c.exe.gz integrator.windows64.99616b83311402724df0c8bd1aa6713c99f3f552d2d3fab3bf867eb5c12eecb2.exe.gz