SaaS Alerts 2024-06-04 release notes
Respond 0.49.0
- Respond Rule History screen not loading any events for one specific account and rule
- Google Workspace for Respond
- Update 'Do Nothing' wording to 'Alert Only'
- Update 'Change Password' wording
Fortify Action Processor 1.12.0
- MS recAction: Ensure that mobile devices are set to never expire passwords (intune_mobile_never_expires_password)
- MS recAction: Ensumobile devices are set to wipe on multiple sign-in failures to prevent brute force compromise (intune_wipe_on_multiple_signin_failures)
- MS recAction: Ensure that mobile device encryption is enabled to prevent unauthorized access to mobile data (intune_mobile_device_encryption)
- MS recAction: Ensure that mobile device password reuse is prohibited (intune_mobile_password_reused_prohibited)
- MS recAction: Ensure that mobile devices require a minimum password length to prevent brute force attacks (intune_mobile_minimum_password_length)
- MS recAction: Ensure that mobile devices require complex passwords (Simple Passwords = Blocked) (intune_mobile_complex_passowrd_simple_passowrd_blocked)
- MS recAction: Ensure devices lock after a period of inactivity to prevent unauthorized access (intune_mobile_device_lock_after_inactivity)
- MS recAction: Ensure that mobile devices require complex passwords (Type = Alphanumeric) (intune_mobile_complex_passowrd_alphanumeric)
- MS recAction: Ensure mobile devices require the use of a password (intune_mobile_password_requirement)
- custom recAction: Conditional Access policy - Require a compliant device
- MS recAction: Ensure that users cannot connect from devices that are jail broken or rooted (intune_conection_from_jail_broken_rooted_devices)
^
Copyright © 2024 Kaseya Limited | Privacy Policy | Edit Cookies | Website Terms of Use