What's New in ZENworks 11.4.2 Endpoint Security and Full Disk Encryption

ZENworks 11 SP 4 System Update 2 (11.4.2) is now available. This release fixes over 30 defects (see TID 7017469 for details) in Endpoint Security and Full Disk Encryption. Here are some highlights of customer-reported defects that are fixed:

  • Endpoint Security -- More fields for USB device matching in the Storage Device Control policy: The Storage Device Control policy's Preferred Device List now has the same USB data fields as the USB Connectivity policy's USB Device Access Settings list. This means you can now use the same criteria for matching USB devices in the Storage Device Control policy that you use in the USB Connectivity policy.

  • Endpoint Security -- Unwanted floppy drive access: Endpoint Security components are used to gather device information for reporting even when there are no security policies applied on the device. The information gathering process was causing floppy drive access (buzzing) on a regular interval. This is now fixed.

  • Endpoint Security -- Direct assignments not overriding group assignments: Plural policies (Application Control, Communication Hardware, Firewall, Location Assignment, Storage Device Control, USB Connectivity, and Wi-Fi) assigned directly to devices were not overriding policies assigned to groups. This is now fixed.

  • Endpoint Security -- Renamed applications blocked on shared drives: If an application is blocked by the Application Control policy, the application is blocked even if the user renames the application. This was not working if the application was on a shared drive. This is fixed so that renamed applications on shared drives are now blocked.

  • Endpoint Security -- Surface Pro 3 blue screens when adding hardware devices or drivers: Microsoft Surface Pro 3 devices would blue screen when device hardware or drivers were added. This issue is fixed.

  • Full Disk Encryption -- Second disk gets corrupted if shutdown or hibernated during encryption: When a device with a second disk is shutdown or hibernates while the second disk is being encrypted, the disk would become corrupted. This is now fixed provide that the AES algorithm is being used for encryption; encryption of the disk resumes when the device restarts. This is NOT fixed for other algorithms (Blowfish, DES, DESX).


New Release-Feature
Comment List