Introducing New Features Across the Platform | Release 716

Product Update 716

Platform Release 716 contains 308 new features, improvements, and bug fixes from Windows Agent 24.45, Mac Agent 24.45, Web 24.47.1, Server 24.45, and BI 24.42 as well as other components since the last release.

See the highlights below. For a full rundown, check out the complete Release Notes.

User Activity Monitoring

Support for Island Browser

Webpages, instant messages (chats), and online meetings on the Island browser are now being tracked. Customers using the Island browser can also apply Webpages rules and use the SUSPEND MONITORING WHEN THESE WEBSITES ARE VISITED option to limit the tracking.

Use Cases: Island, known as the ‘Enterprise Browser’, is popular for its strong security and privacy features. Many organizations use it to access SaaS tools and internal web apps. By enabling support for Island, you’ll expand your monitoring and tracking capabilities while gaining more control over privacy settings. With Behavior Rules support, you can easily enforce policies for applications, webpages, and browser plugins, giving you greater flexibility and control.

Support for Zoom Workspace

Online meetings on the Zoom Workspace app will now be tracked.

Use Cases: Some companies prefer Zoom Workspace as it offers collaboration and communications tools into a single product with AI integration. Being able to monitor Zoom Workspace will extend your activity-tracking capability into the hybrid workspace arena.

Support for uniFLOW Printers

Printed documents can now be tracked over uniFLOW printers.

Use Cases: uniFLOW printers are popular for their flexibility, multifunctional capabilities and security. Now, with Teramind, you can extend your monitoring to these cloud-connected printers, giving you even more visibility. Plus, the improved printer driver helps prevent issues like paused or delayed print jobs and provides better offline monitoring, especially with secure, specialized printers.

Behavior Policy & Rule

New OS Version Criterion in Applications Rules

The new OS Version criterion of the Applications rule can be used to detect the OS version installed on the user’s computer. For example: ‘Windows 10’, ‘Windows 11’, etc. The OS version matching the trigger will be shown in the alert’s description.

The detected version of the OS will be displayed in the alert’s description on the BI Reports   > Behavior Alerts and the Behavior > Alerts reports.

Use Cases: Among other potential uses, this feature can be used to ensure app compatibility. As an example, you can use this criterion to block certain apps on Windows 7 while enabling them on other (newer) versions of Windows.

Ability to Change the OCR Rule Notification Frequency

Category: Behavior Rules

By default, the OCR Notification Alerts are limited to 1 per rule/application/agent/computer in a 4-minute window.

If you are an On-Premise customer, you can now receive all the alerts by adding the following parameter to your teramind.config file:

Use Cases: By using this option in conjunction with the Settings > Alerts > ALERT EMAIL LIMIT option you will have more control over alert throttling, emailing, and recording in the Behavior Alerts report.

Deployment & Security

New Agent Download Screen

The Download Agent screen is now updated with a new interface and resources.

Use Cases: The streamlined UI will make it easier for you to download and install the correct Agent. Quick access to the Knowledge Base resources will help you find help when needed.

Support for New Authentication Method for Azure Storage Accounts

You can now use the Shared Access Signature (SAS) Token to access your Azure storage bucket, in addition to the Primary Access Token. This update provides more flexibility for secure access.

Use Cases: SAS is a role-based access control (RBAC) providing benefits such as resource-specific access, permissions, and validity period. This will make it easier for you to securely delegate access to your Azure storage accounts.

Mac Updates

Ability to Use a Custom Proxy Certificate

Previously, the Mac Agent came with its own proxy certificate named “Internet Widgits”.

Now, you will be able to use your own custom certificate and assign it whatever Common Name (CN) you want. For example, “ACME Proxy Certificate”.

Use Cases: The proxy certificate is necessary for intercepting HTTPS traffic. However, having a fixed CN might expose its presence to the users. This feature will help you change the CN and other details effectively hiding the SSL injection and the Agent interception from casual observers.

Other New Features & Improvements

This release also comes with several enhancements in BI reports, remote troubleshooting, Mac, etc. See the highlights below and check out the full list here.

Enhanced Activity Monitoring

Enhanced Activity Monitoring

We’ve enhanced our monitoring and tracking features to make them even more efficient. Key updates include optimized email monitoring that uses less RAM, improved offline printer handling, more precise geolocation tracking, support for the new Microsoft Teams API, a streamlined way to manage monitoring profiles, and conditional registry events processing.

Optimized Agent Services

Optimized Agent Services

Key upgrades to the Agent and its services have been made to improve performance, stability, and security. These include certificate caching for faster connectivity, optimized threading, enhanced automated logging for the Revealed Agent, and more.

Backend Updates

Backend Updates

We have upgraded the Debian OS, Dockerfile, and deployment scripts to improve the security and stability of the platform, improved multi-node connectivity, and offline data syncing from the Agent to the server.

Mac Improvements

Mac Improvements

We have made several changes to the Mac Agent to improve support for macOS 15 (Sequoia) such as updated screen capture, better UI support on multi-screen setups, crash prevention, and more.

Author

Connect with a Teramind Expert

Get a personalized Teramind demo to learn how you can help your organization with insider threat detection, productivity monitoring, employe monitoring, data loss prevention, and more.

Table of Contents