May 15, 2024 - Version 8998
NOTE Datto EDR leverages a staggered release process. You'll receive an in-product notification when these updates are available to your instance.
IMPORTANT Datto AV exclusions are case sensitive. Always review the alert or endpoints folder structure to assure you have the correct casing in our exclusions for Datto AV.
Version information
Endpoint Security Agent | Ransomware Agent | Rollback Agent | API |
---|---|---|---|
3.7.0 |
1.3.0 |
1.2.2 |
5.0.0 |
New features
- Your Datto EDR platform now integrates with VSA 10. This integration will automatically sync organizations and locations with VSA 10 and manage all agent associations in Datto EDR to match agent associations in VSA 10. Refer to Configuring the VSA 10 integration.
- Datto EDR functions such as real-time scanning and scheduled collections have been moved to a new named policy. During the upgrade, we will automatically review your location EDR monitors and create matching EDR named policies. Those policies will be applied to your organizations and locations for you. As a result, for those already using Datto EDR, your current collection settings will not change; they will simply be moved to a policy.
Enhancements
- Multiple improvements have been made to Datto AV and Datto EDR dashboards, including the ability to refresh metrics, top alerting host, breakdowns of alerts by type, and more.
- For users with a Datto AV-only license, we will be updating your platform to display only AV-related information. This will remove Datto EDR-specific features to eliminate confusion in your experience.
- In this release, we are removing the application vulnerability scores to help us focus on providing Datto EDR- and Datto AV-focused features. Historically, Datto EDR leveraged the NIST database, which is not consistently managed. As a result, many applications, which have been patched by the vendors, may still show as vulnerable.
- We've added detection rules to the Endpoint Security engine that enable you to scan for and manage dual-use tool activity in your environment. To learn more, refer to What are "dual-use tool" detection rules?
Artifacts
agent.linux-amd64.f05359279b049f85ecb39026c545351f07a514c1f637dec42f4c2224bfb6aef3.bin.gz agent.linux-arm64.90469c34b6bde8f1961cd6d0f7dc125eb610cbf69a10a23c6f760ef369e9b9d5.bin.gz agent.linux-x86.705bda5a28983ba3323179fa70bf04bcce635d90d7ff1fa3ed60b408133a537f.bin.gz agent.macos-amd64.67875a6568e6cfa65d455cbda561ffbec91bd2dd2f1d7dc0875e5106506bc9dc.bin.gz agent.macos-arm64.f9a5a7bd95595dd76c717f86f13044929f383d7da21dc5d4fe681dcc24f6b7a5.bin.gz agent.windows-amd64.00591aafc172673a95b7aaa00fb5f67602bd0b4a0dd151b4d854ce5bf1672e6d.exe.gz agent.windows-x86.cc9a6e7617e1d7f5803d80d895bfee2cbc31306fd75f7ff141014b0f824b2320.exe.gz integrator.windows64.29a94f336fda3e39861b69ab55dbe8814667c767c0e70ac46ac25623ebb09d20.exe.gz