![]() Resolved error when using import and save custom SSL certificate in the IMDC. Resolved comment import no-op for file import with. Resolved E-mail notifications not sending using external SMTP server. Support SNMP community starting with TLS error on HTTPS probe (Inbuilt Probe). Resolved TCP dropping and server stuck spinning on ETIMEDOUT. Resolved setting a password for Intermapper DataCenter not holding. Resolved issues with non-default installation locations on Windows, Linux and MacOS.įixed incorrect disk space check during database migration/upgrade.įixed port 636 failure caused IM Database to have strings more than 256 chars. New link alert configuration features work correctly under version skew. Resolved IMDC database failure with CheckViolation error. Updated LibPNG related libraries, addressed vulnerability CVE-2019-7317. Refer to the Installation Guide for further details on updating Linux to 6.6. Included SHA-2 in supported SNMPv3 Auth options.Īdded functionality to control if interface status change would effect device status changing.Īdded watermark on maps for 'Trial License Only'.Īdded SystemD for management of Intermapper services for Linux, and updated to conform with the Linux File Systems for packaged applications. Updated icons for devices in Intermapper.Īdded Advanced Network Mapping Capability (Virtual Network Monitoring for AWS). Resolved Email notification with Office 365Īdded support for new platforms: Windows 2022 Server, Ubuntu 21.04, 22.04, MacOS 11. Resolved issues with Host Resources Probe Resolved SNMP users no longer able to accept dashes \('-'\) for the username Resolved Email notifier crashes when list of emails is too longīuffer overrun Assertion in NT\_Services Probe Code \(IM Server\) Resolved notification emails truncating links Upgraded OpenJDK to address Java Vulnerabilities: Windows, Linux, and MacOS ![]() Resolved Chart Data Upper and Lower bounds showing incorrect numbers See the Intermapper User Guide for more information. You can authenticate LDAP on port 389 with or without SSL and on port 636 which is an encrypted connection by default. ![]() Updated libraries to address vulnerabilities on Windows, Linux, and Mac systems ![]() ![]() Refer to the User Guide for more information. Added password policy in Server Settings to enforce password minimum and maximum lengths. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |