15.4.2 Release Notes

New Cloud Control Center updates for 15.4.2

This release includes various bug fixes, and a plethora of new and improved features detailed below. 


Dynamic Policy Group AND/OR Logic

Elisity Cloud Control Center 15.4.2 enhances Dynamic Policy Groups with the integration of AND/OR logic, enabling more nuanced security policy applications. The "OR" logic allows devices to be grouped if they meet any one of multiple criteria within a category, such as different device types. This functionality is extended with "AND" logic, where administrators can overlay additional criteria, like vendor-specific requirements, on the initial groupings. This dual logic system facilitates the formation of policy groups that are either very specific, targeting particular device configurations, or broadly inclusive, encompassing a wide range of devices. This update provides administrators with increased flexibility and precision in defining security policies in networked environments. To learn more, click here.


Risk Score

Elisity Cloud Control Center 15.4.2 introduces 'Risk Score,' a core attribute that quantifies the security risk of individual devices within a network. The Risk Score, ranging from 0 to 100, offers a clear metric to gauge a device's security posture. This scoring system is crucial for differentiating the varying levels of risk associated with each device. Administrators can utilize the Risk Score as a criterion in defining Policy Groups, enabling more targeted and effective security management. The Risk Score is determined through integrations with specialized solutions like Claroty xDome, Medigate, or Palo Alto Networks IoT Security. It supports various match logics including equals, not equal, greater than, less than, and their respective 'or equal to' variants, thereby providing a versatile and detailed approach to network security and device management. To learn more, click here


Enhanced Visibility into Device Events

Elisity Cloud Control Center 15.4.2 enhances its device event monitoring system, offering administrators a comprehensive and user-friendly view of all device activities within the network. The system meticulously tracks each device's lifecycle, including additions, updates, and removals, as well as changes in network connections and policy group associations. Additionally, the platform enriches device data with contextual information for better understanding. It features customizable data retention, with adjustable periods to meet operational and compliance needs, easy access to historical data for audits, and time-based event filtering for focused analysis. Prioritizing data management and privacy, the platform automatically purges logs of removed devices and presents events in an intuitive chronological timeline, ensuring efficient and clear monitoring of network activities. To learn more, click here.


SSO Endpoint Discovery

Elisity Cloud Control Center 15.4.2 now supports the SSO Discovery Endpoint, a significant feature for organizations utilizing Identity Server. This discovery endpoint is essential for retrieving crucial metadata about the Identity Server, such as issuer name, key material, and supported scopes. Compatible with leading Single Sign-On (SSO) solutions like PING, OKTA, and Azure SSO, this feature streamlines the integration and management of identity services. To see an example of this, click here.

Matched Asset Count for Static (Network) Policy Groups

A new feature has been added to enhance the creation of Static (Network) Policy Groups. Now, when administrators submit subnets for these policy groups, a "Matched Assets" count is prominently displayed. This count indicates the number of known assets within the network that will be matched upon the creation of the Static Policy Group. To learn more, click here

Cloud Control Center User Management Update

Administrators can now easily edit user details, including roles and personal information, and have the option to delete users entirely from the system. Enhanced security features include the ability to reset passwords, which sends an instructional email to the user, and a new function to unlock accounts locked due to unsuccessful login attempts, without waiting for a lockout timer. The user status, including locked accounts, is now visibly indicated next to their email addresses, streamlining user account monitoring and management. To learn more, click here


Edit Policy Matrix Custom Views

You can now edit Policy Matrix Custom Views. You can rename the Custom View and add/remove Policy Groups to the Custom View. To learn more, click here.


Tooltip for Effective Attribute Sources in Identity Graph

In the latest version of Elisity Cloud Control Center 15.4.2, a new feature enhances the user experience within the Identity Graph. Now, when users hover over an Effective Attribute, a convenient tooltip appears, displaying the specific data source from which that attribute was derived. This feature provides immediate clarity on the origin of the attributes, facilitating a better understanding of the data and its context. This addition improves transparency and aids administrators in efficiently tracking and verifying the sources of attribute information within their network. To learn more, click here.


Suppression List

15.4.2 introduces the 'Suppression List,' a feature designed to manage network stability by allowing the suppression of attach and identity events from unstable devices. Administrators can navigate to Settings > System > Suppression List to access this feature. Here, they have the option to add new devices to the list either by their IP address or MAC address using the '+ Add New Device' function. Once a device is added to the Suppression List, all events generated by it will be ignored by the Cloud Control Center, effectively treating the device as 'offline' in the device list page. This feature enhances the network management capabilities by providing control over event generation from specific devices. To learn more, click here.

Was this article helpful?
0 out of 0 found this helpful