Adaptive Defense 360 on Aether Platform

What's new in Adaptive Defense 360

Release Notes

VIII

09/17/2019

Aether Platform-based products: Release VIII (09/19/2019)

Adaptive Defense 360: 3.60.00

Agent and protection versions

  • Windows protection: 8.00.15.0030
  • macOS protection: 2.00.02.0000 and 2.00.03.0000 on Catalina
  • Linux protection: 2.00.02.0000
  • Android agent and protection: 3.4.4
  • Windows agent: 1.14.03.0000
  • macOS agent: 1.10.01.0000
  • Linux agent: 1.10.01.0000

New features

  • Patch Management: Ability to exclude specific patches for a specific computer or the entire organization.
  • Patch Management: Ability to exclude specific software (for example, Java) or entire software families (for example, Adobe or Windows).
  • Full Encryption: Executive reports now include information about the encryption status of computers in the organization.
  • The firewall protection now has full support for IPv6 environments. Ability to create firewall rules based on IPv4 and IPv6 addresses.
  • Ability to automatically detect if computers are connected to a public or private network (location awareness). Ability to create firewall rules for public networks, private networks or both. Rules will be applied based on the network the target computer is connected to.
  • Significant increase in the number of phishing detections thanks to the incorporation of an updated detection engine.
  • Ability to configure a whitelist of trusted URLs and domains that won’t be scanned for phishing or malware.
  • Windows 10’s Fast Startup feature is automatically disabled during protection updates. This way we make sure the protection is updated even on computers with Fast Startup enabled. The Hibernation feature is disabled on computers with updates pending for more than 15 days in order to force users to restart their computers.
  • Ability to block unknown and unwanted applications (basic application control) to stop unwanted applications, reduce bandwidth consumption and comply with regulatory requirements. Applications can be blocked by hash or process name. Blocked applications are displayed in a new widget in the security dashboard.
  • Ability to enable email notifications for blocked applications in the Alerts settings.
  • Ability to associate computers to one or multiple computers with the CACHE role. This option makes it possible to use workstations or servers with the CACHE role on multiple network segments.
  • The option ‘Run a background scan every time there is a knowledge update’ has been disabled in the default settings.
  • If a customer doesn't have any licenses available, and an end user launches an installation directly on their computer, they will be periodically informed in the progress screen that there are no licenses available for that computer. The agent installed on the computer will be integrated into Aether, but the protection will be disabled.
  • The PSINFO tool is now downloaded in compressed format so as not to be blocked by the perimeter protection used by many customers.
  • Ability to reinstall the protection from the web console on computers with protection errors. This option can be accessed by right-clicking any Windows computer from any list in the console.
  • Ability to hide the icon displayed in the Notification area of managed computer from the ‘Per-computer settings’ section.
  • Ability to view the user that is currently logged in to a computer from its ‘DETAILS’ tab.
  • Ability to select visible columns from the ‘COMPUTERS’ tab.
  • Ability to add and integrate computers into groups based on their IP address (IP-based integration).
  • Support for WPAD (Web Proxy Auto-Discovery Protocol). You can specify the URL from which to download the proxy policy file for your organization. Otherwise, the Aether agent will launch a discovery scan to automatically obtain the proxy.
  • Ability to schedule periodic tasks to send the executive report and any list or COMPUTERS view in the console to the specified email addresses.
  • If protection installation fails, more details are provided along with the error code.
  • If the status of a customer is ‘expired’ after the grace period is over, no messages will be accepted from the customer’s computers, and all tasks related to the account will be stopped.
  • If messages are received from the agents installed on the computers of a customer that has been deleted because all of their licenses expired days ago, a command will be sent to automatically uninstall all agents.
  • Added new options to filter computers by last connection date.
  • Added new filters (Security - Advanced protection mode, and Computer - Reinstalling protection and Pending restart).
  • Administrators can detect agent deployment problems and check the status of installed agents with their management tools or directly on computers by accessing their Event Log.

Bug fixes

  • Patch Management: When installing SQL Server patches, it wasn’t clear whether all SQL Server instances on the target computers needed to be patched.
  • Customers’ Software lists displayed duplicate records.
  • Scheduled reports continued to be sent to customers whose licenses had expired.
  • If a Discovery computer sent more than 100 discovered computers, computers in excess of that number were not checked against already integrated computers, which could result in duplicate records.
  • If there was an error updating the protection, the protection status was incorrectly reported.

VII

05/06/2019

Aether Platform-based products: Release VII (05/06/2019)

Adaptive Defense 360: 3.50.00

Agent and protection versions

  • Windows protection: 8.00.14.0002
  • macOS protection: 2.00.02.0000
  • Linux protection: 2.00.02.0000
  • Android agent and protection: 3.4.4
  • Windows agent: 1.13.04.0000
  • macOS agent: 1.10.01.0000
  • Linux agent: 1.10.01.0000

New features

  • Patch Management: Ability to disable Windows Update to centrally manage all patches (operating system and third-party software).
  • Patch Management: Ability to isolate computers from the 'Available patches' list, making it easier to isolate computers based on a specific patch or CVE.
  • Patch Management: Added the following information to executive reports: Patch Management status, Top 10 most vulnerable computers, and Top 10 most critical patches.
  • Patch Management: New context menu for the tasks displayed in the 'Last patch installation tasks' widget. This menu allows you to cancel tasks or view their results.
  • Patch Management: If an error occurs, the error code is now displayed in the file obtained when exporting the installations list and on the page detailing the result of a patch installation task.
  • Data Control: Ability to delete files and restore them within 30 days after deletion. Charts showing deleted files, lists with filter options, and ability to export to CSV the list of files deleted in a given time period or historically.
  • Data Control: Ability to search for duplicate files by content.
  • Data Control: Ability to set exclusions by folder, file, and file extension for the inventory, search and monitoring features.
  • Data Control: Ability to perform searches not only by text, but also by numeric and alphanumeric content.
  • Data Control: New options to select the PII entities to look for in advanced searches: find files with all selected items ('and' logic) or with any of the selected items ('or' logic).
  • Data Control: New context menu for searches with the ability to relaunch and edit them.
  • Data Control: Ability to expand the chart of files with personal data, and use the chart legend to select/unselect the types of data displayed.
  • Data Control: Ability to get inventories filtered by computers from the list of computers with personal data.
  • Data Control: Support for CSV files.
  • Data Control in AVT: We have replaced the individual counters of PII entities with Yes/No values. Added a new field to display the estimated number of PII entities. This field will indicate the number of PII entities confirmed by the technology.
  • Full Encryption: Ability to fully encrypt/decrypt all disk drives using BitLocker.
  • Full Encryption: Support for multiple authentication methods, including two-factor authentication (TPM) and boot password.
  • Full Encryption: Central management of recovery keys from the console.
  • Full Encryption: Automatic installation of BitLocker on compatible servers.
  • Full Encryption: Automatic creation of the unencrypted system partition required for startup.
  • Full Encryption: TPM activation.
  • Full Encryption: Full visibility of the organization's encryption status through a dedicated dashboard and filter-based lists.
  • Full Encryption: Central management of settings from Aether. Enforcement of administrator policies over local user settings.
  • Full Encryption: Encryption date for each computer, as required by certain regulations.
  • Full Encryption: Granular permissions.
  • Support for non-persistent VDI environments. Requires following the procedure described here.
  • Anti-theft protection for Android devices. Geolocation to locate lost or stolen devices, remote lock, remote wipe to delete all sensitive information from devices, ability to turn on the device's camera to take a photo of the potential thief and email it, and ability to trigger an alarm to locate your device or discourage the thief.
  • Native support for Android 8.
  • Software list detailing the software installed across the entire network (name, publisher and version). Ability to see, for each software package detected, the number of computers that have it installed and access details of those computers.
  • Hardware list detailing the hardware installed across the entire network (disk, CPU and available memory information).
  • Ability to deploy the Aether agent remotely from the list of discovered computers for computers with the traditional platform agent installed (which will be uninstalled).
  • Ability to select all computers in the Computers list at once without having to do so page by page. This allows you to take bulk actions on a large number of computers (isolate, scan, etc.) in one go.
  • Now, the searches performed from the Computers list also search the description field (comments) and IP addresses.
  • Improvements to make finding settings easier: ability to sort the settings created in ascending or descending order by creation date and name.
  • Ability to maintain, for each user of the management console, the state of the group and filter tree between sessions.
  • Support for Exchange Server 2019, the new version of Exchange Server.
  • Agent and protection certification on Windows 10 RS6.
  • Dozens of console improvements aimed at improving usability without affecting granularity or flexibility.
  • The ‘Users’ list now shows an icon next to users with Two-Factor Authentication (2FA) enabled in their profile.
  • The ‘Details’ tab for Windows computers displays the date and time when the computer settings were last checked.
  • The option to send email notifications when a malware URL, phishing threat or intrusion attempt is detected or access to a device is blocked has been disabled in the default settings.
  • The generic uninstaller, used when required during protection upgrades, is now downloaded in compressed format so as not to be blocked by perimeter protections.
  • Telemetry is sent from our protections for macOS and Linux to both ART and the SIEM solutions used by customers who contract SIEMFeeder.
  • Support for Debian 8, 9 and 10.
  • Support for new Ubuntu versions: 18.04 and 19.04.
  • Support for new Fedora versions: 26, 27, 28, 29 and 30.

Bug fixes

  • From this version on, users are prevented from editing or deleting the settings assigned to those computers not visible to them.
  • Automatic execution of the generic uninstaller if a protection update fails because the target computer is shut down in the middle of the process or for another reason.
  • Ability to keep the cache after updating the protection. This change will take effect in protection updates from this version and later.
  • Patch Management: Non-downloadable patches were shown on the list of available patches, despite those patches were filtered out.
  • Patch Management: Several fixes to patch installation.
  • Browsing problems on macOS computers with IP addresses outside the IPv4 ranges specified in the RFC 1918.

VI

10/22/2018

Aether Platform-based products: Release VI (10/22/2018)

Adaptive Defense 360: 3.41.00

Agent and protection versions

  • Windows protection: 8.00.12.0002
  • macOS protection: 1.02.02.0000
  • Linux protection: 1.02.01.0000
  • Android agent and protection: 3.2.4
  • Windows agent: 1.12.03.0000
  • macOS agent: 1.07.04.0000
  • Linux agent: 1.07.03.0000

New features

  • Patch Management: New details screen for installed and uninstalled patches, accessible from the installation history and from the results of a patch installation task.
  • Patch Management: Ability to roll back (uninstall) patches for those programs that support this feature. This option is available on the details page of installed patches.
  • Patch Management: Non-security patches are not displayed as Critical and are not installed by default in patch installation tasks.
  • Patch Management: Added a new widget that provides quick access to End-of-Life (EOL) software: software currently in EOL, software that is currently in EOL or will be in EOL in a year, and software with a known EOL date.
  • Patch Management: Ability to restart servers without a logged-in user that require a restart to finish installing a patch.
  • Patch Management: Update of the 'Available patches' information after restarting a computer.
  • Data Control. Status dashboard: New widget to show what features are active in the endpoints and servers: advanced search, inventory and / or monitoring and capacity to obtain its lists.
  • Data Control. Status dashboard: Redesign of the Data Control Status widget that now represents more clearly the Deployment Status.
  • Data Control. Inventory: KPI with the number of PII files and evolution chart.
  • Data Control. Inventory: KPI with the number of computers with PII files and evolution chart.
  • Data Control. Inventory: Chart showing the number of PII files by personal data type (e.g. number of PII files with credit card numbers).
  • Data Control. Inventory: List of PII files with ability to search, filter, add lists to the 'My list' panel and export lists
  • Data Control. Inventory: List of computers with PII files, with the ability to see the evolution of the number of PII files found between two dates.
  • Data Control. Inventory Settings: Ability to change settings to enable inventory generation.
  • Data Control. Granular permissions: New permission to control the ability to view inventories.
  • Data Control. Advanced search: Improved usability by selecting the personal data to search for through checkboxes.
  • Data Control: Available in Spain, Germany, UK, Sweden, France, Italy, Portugal, the Netherlands, Finland, Denmark, Switzerland, Norway, Austria, Belgium and Hungary.
  • Advanced Reporting Tool. Greater granularity of permissions: Two new permissions to separate the information available to IT/Security managers and to personal data processors. More specifically, you can configure access to the Data Access Control application, which collects particularly sensitive information (in the monitoredopen table).
  • Greater details in executive reports. More information available in executive reports: top 10 computers with most detections, 10 latest malware, PUP and exploit detections, and greater details in different sections.
  • New category added to the Web access control feature: Cryptocurrency Mining. This protection blocks all URLs designed to attack workstations and servers in order to mine cryptocurrencies, using up CPU resources and seriously affecting computer performance.
  • The first Windows computer where the protection is installed is designated as discovery computer to automatically discover unprotected computers on the network.
  • Dozens of console improvements aimed at improving usability without affecting granularity or flexibility.
  • Agent and protection certification on Windows RS5 and Windows Server 2019.
  • Support for Mojave, the newest version of the macOS operating system.

Bug fixes

  • Fixed bug in executive reports scheduled to be sent by email and created by partners by accessing clients' consoles via Single Sign-On.
  • Fixes for potential BSoDs caused by firewall drivers
  • Fixed bugs in protection updates

V

08/06/2018

Aether Platform-based products: Release V (08/06/2018)

Adaptive Defense 360: 3.40.00

Agent and protection versions

  • Windows protection: 8.00.10.0001
  • macOS protection: 1.02.01.0000
  • Linux protection: 1.02.01.0000
  • Android agent and protection: 3.2.4
  • Windows agent: 1.11.00.0000
  • macOS agent: 1.07.03.0000
  • Linux agent: 1.07.03.0000

New features

  • New Patch Management module: Patching of Windows operating systems and hundreds of third-party applications (Java, Adobe, Firefox, etc.)
  • New Patch Management module: Dashboards showing the patch status of the corporate network (outdated computers, missing patches, etc.)
  • New Patch Management module: Customizable lists and filters to find computers missing security patches, non-security patches and Service Packs
  • New Patch Management module: Ability to search for patches by computer, program, patch name or CVE
  • New Patch Management module: Ability to find programs in End-Of-Life (EOL) stage
  • New Patch Management module: History of all patching activity
  • New Patch Management module: Visibility into missing patches by computer and group
  • New Patch Management module: Configuration of patch searches (frequency, patch types to find, etc.)
  • New Patch Management module: Combined with Adaptive Defense, ability to isolate computers with critical vulnerabilities and patch them once isolated
  • New Patch Management module: Manual patching in real time
  • New Patch Management module: Ability to schedule patching tasks
  • New Patch Management module: Ability to configure computer restarts if required
  • New Patch Management module: Automatic management of patch interdependencies
  • New Patch Management module: Centralized storage of downloaded patches on cache computers
  • New Patch Management module: Roles with granular permissions to control access to the Patch Management features
  • Data Control: Dashboard showing the Data Control status of the network (computers without a license, offline computers, outdated computers, unindexed computers, etc.)
  • Data Control: Ability to perform quick and advanced searches on files by content, file name and extension. Two types of advanced searches are supported: free searches and guided searches with the ability to configure searches by file type, target computer, and search timeout
  • Data Control: Ability to perform up to 10 simultaneous searches on the network. Ability to cancel running searches at any time
  • Data Control: Ability to save and view recent searches. Ability to rename, relaunch and delete saved searches, as well as accessing search results
  • Data Control: List of files found during searches. Ability to filter results and export them to .CSV format
  • Data Control: Details on the files found during searches with information on the PII held (first and last names, ID card numbers, email addresses, etc.)
  • Data Control: List showing the status of the computers where personal data is searched for with the ability to filter information
  • Data Control: Added new granular permissions to search for personal data on network computers
  • Data Control: Predefined alerts in Advanced Visualization Tool to report anomalous activities on persona data files
  • Data Control: Available in Spain, Germany, UK, Sweden, France, Italy, Portugal, Netherlands, Finland, Denmark and Switzerland
  • Computer isolation. Now available for Windows servers as well. Ability to contain infections and potential infections by isolating specific computers, computer groups or the entire organization
  • Improvements to the local alerts displayed in multiuser environments
  • Advanced management settings for optimized performance on Gigabit Ethernet networks: ability to enable optimization settings on demand by contacting Support
  • Optimized performance with virtual adapters (Hyper-V, VMware, Citrix and VirtualBox): ability to enable optimization settings on demand by contacting Support
  • Improved integration with WDSC (Windows 10 RS2 or later)
  • Device Control won't install until the module is enabled through the settings
  • Usability improvements: filters and search options for tasks, more details on cache computers, etc.

Bug fixes

  • Fixed bug to allow settings to be inherited when moving a computer to its Active Directory group
  • Fixed bug to display the 'Trusted programs' bar in scheduled reports
  • Fixed bug to allow computers that connect to the Internet via a Panda proxy to access cache computers
  • Improved compatibility with third-party drivers (Fortinet, CheckPoint, SonicWall and VPNs)
  • Fix for potential BSoDs caused by a driver used to collect network data from the operating system
  • Fixed bugs in URL filtering and categorization
  • Improved loading of the Outlook plug-in (PSINOlkAddIn)
  • Fixed bugs in protection updates
  • Fixed bugs in Linux protection
  • Fixed bugs in macOS protection

IV

03/20/2018

Aether Platform-based products: Release IV (03/20/2018)

Adaptive Defense 360: 3.30.00

Agent and protection versions

  • Windows protection: 8.00.01.0000
  • macOS protection: 1.02.00.0000
  • Linux protection: 1.02.00.0000
  • Android agent and protection: 3.2.4
  • Windows agent: 1.10.00.0000
  • macOS agent: 1.07.02.0000
  • Linux agent: 1.07.02.0000

New features

  • New module: Data Control. Data Control finds, audits and monitors the personal data stored on endpoints and servers. This module assists organizations in complying with personal data protection laws such as the GDPR (General Data Protection Regulation), and is available in Spain, Germany, Sweden, United Kingdom, Italy and France.
  • Computer isolation. Ability to contain infections and potential infections by isolating specific computers, computer groups or the entire organization from the rest of the network. Computers are isolated in real time. Isolated computers will only be able to connect to Panda's servers in order to allow security administrators to change settings, launch disinfection tasks, etc.
  • Email alerts for the detections made by the antivirus protection
  • Email alerts every time new unprotected computers are discovered
  • Ability to launch and schedule tasks for computer groups
  • Ability to uninstall the agent and the Windows protection from the Web console
  • More details about the most common protection installation errors
  • New features added to the protection for Linux and macOS systems (real-time communications, double-click installation, ability to launch scan tasks from the Web console, managed computer restarts, and settings management)
  • Access from the Recipients section to the list of all computers that a specific task or settings profile is applied to
  • Remote installation from any discovery computer, not only from the last computer that discovered an unmanaged device
  • New Anti-Tamper protection to prevent Panda Security's drivers and services from being stopped
  • Support for Windows 10 RS4
  • Support for Windows Server Core 2016
  • Aesthetic and usability improvements to the Web console

Bug fixes

  • Advanced management on Gigabit Ethernet networks (using NBLs) to optimize performance on these networks when Panda's firewall is on

III

11/15/2017

Aether Platform-based products: Release III (11/15/2017)

Adaptive Defense 360: 3.20.00

Agent and protection versions

  • Windows protection: 7.70.02.0000
  • Linux protection: 1.00.00.0000
  • Android agent and protection: 3.2.4
  • Windows agent: 1.09.00.0000
  • Linux agent: 1.07.00.0000

New features

  • New look and feel for the widgets displayed on the STATUS page. The new colors are associated with the risk and more data is displayed in less space
  • We have improved administrators' first experience using the product by guiding them through the process of installing the protection agent.
  • Button to access Panda Cloud, the page that allows customers to access the Panda Security products they have contracted
  • Automatic discovery of unprotected computers
  • Ability to remotely install from the Web console the agent and the protection on all unmanaged computers discovered
  • Merging of the custom and Active Directory trees, so that all actions that administrators can take on the custom tree (settings, etc.) can also be carried out in Active Directory
  • A message has been included in the Web console explaining that Adaptive Defense's Hardening mode blocks not only unknown programs coming from the Internet but also from external storage drives.
  • We have improved the malware/PUP activity alerts and blocked program notifications to show information in a clearer, more organized way
  • Improved malware/PUP activity alerts to include information about the command line and the parameters used to launch programs. Additionally, it is now possible to export to CSV the information about the lifecycle of all malware detected in the organization
  • Ability to send email alerts (malware and PUP detections, blocked program and unprotected computer notifications) to users based on the computers visible to them. These alerts can now be configured for each user of the Web console
  • For customers with the advanced protection in Lock mode, all untrusted programs run before the Panda protection was started are closed.
  • More powerful exclusions for blocked programs. Excluding a file with an .EXE or .COM extension will allow the execution of both the program and its libraries on all computers (unless they are known threats). These programs and libraries will continue to be monitored by our Collective Intelligence platform ad Threat Hunting Team in order to determine whether they are malware or goodware
  • Ability to disable real-time communication with computers (advanced option in the proxy settings) for those companies which don't want to have an open socket for each managed computer (this is required for real-time communication)
  • Time range picker to display CPU/memory usage in the last hour, last 3 hours, or last 24 hours
  • Ability to access the latest Release Notes from the product's Web console
  • Customers have the ability to give Panda Security's Support team access to their product console to speed up troubleshooting
  • New supported languages: Russian, Japanese and Finnish (in the latter case only the local console)

II

7/28/2017

Aether Platform-based products: Release II (7/28/2017)

Adaptive Defense 360: 3.10.00

Agent and protection versions

  • Windows protection: 7.70.02.0000
  • Linux protection: 1.00.00.0000
  • Android agent and protection: 3.2.3
  • Windows agent: 1.08.02.0000
  • Linux agent: 1.07.00.0000

New features

  • Integration of the full portfolio of Panda's security solutions into Aether: Panda Endpoint Protection, Panda Endpoint Protection Plus, Panda Adaptive Defense and Panda Adaptive Defense 360
  • Updated the PROTECTION STATUS widget to include protected computers
  • Detailed information about the licenses contracted by customers
  • Centralized sending of email alerts regarding unprotected computers
  • Role-based computer visibility
  • Information about the patches installed on each computer
  • Ability to define the target (computers or groups) of settings when configuring them
  • Ability to define Repository/Cache computers to optimize bandwidth usage
  • Ability to notify a problem or incident to Panda directly from the Web management console
  • New widget on the STATUS page to show the activity of the exploits detected by the Anti-Exploit technology
  • New supported languages: Swedish, French, Italian, German, Portuguese and Hungarian
  • Online help in HTML format

Bug fixes

  • One-time bug installing the agent on certain Windows computers

I

5/16/2017

Aether Platform-based products: Release I (05/16/2017)

Release of Panda Adaptive Defense 360 on Aether, Panda Security's new and innovative management platform

  • Aether is Panda's new platform that integrates all of the company's endpoint solutions. Aether Platform's vision is to provide full security management capabilities from the cloud. With Aether Platform, organizations can centrally manage all of Panda's products with a single agent from a single Web console

Aether Platform: Key benefits and features

  • Ability to deploy settings and tasks in real time to hundreds or thousands of computers
  • Flexible computer organization: filters, customizable tree and Active Directory integration
  • Information about each computer's hardware and software components
  • Ability to track users' activity on the Web management console
  • User permissions (roles) to deny users particular actions
  • Ability to set up tasks independent from the general settings with advanced options such as maximum run time and expiration times
  • And many other new features that make Aether Platform the best platform to centrally manage Panda's security products