14.4.0 Release Notes

New CCC and VE Features in 14.4.0

Virtual Edge (VE) interoperation with existing switch configurations

When a switch is added to perform identity gleaning and policy enforcement the Elisity platform will recognize conflicting configuration if it exists on the switch and will attempt to work with the existing configuration where possible.

Flexible time window for traffic visualization

Customers are now able to select the last 24 hours, last 7 days, last 28 days, or a custom time range for traffic visualizations in the Elisity Cloud Control Center. This replaces the previous static 30-day range.

Elisity Active Directory (AD) Agent to Domain Controller Status Indicator

Viewing the status of a connected Elisity AD Agent in Cloud Control Center now shows the status of the agent and the status of its connection to Active Directory Domain Controllers. The last status change time is also provided in this view.

Ability to classify devices and apply policy based on them being known in Active Directory

Devices can now be classified based on whether they are members of a connected Active Directory Domain. Based on this classification policies can be implemented to allow least privileged access for devices based on their membership in Active Directory.

Bulk configuration of multiple Elisity Virtual Edge (VE) containers to Elisity Cloud Control Center (CCC)

Customers are now able to upload an Excel document containing information for multiple Virtual Edge configurations to the Elisity CCC. CCC will then provide a bulk download of Docker compose files to enable rapid deployment of multiple Virtual Edge containers.

Bulk addition of multiple Virtual Edge Nodes to Elisity Cloud Control Center (CCC)

As with the bulk configuration of Virtual Edges, customers can now upload an Excel workbook containing configuration information for multiple switches in the environment that are intended to act as Virtual Edge Nodes. Once uploaded to CCC, the Elisity Virtual Edge will connect to the Virtual Edge nodes and configure them for identity gleaning and policy enforcement.

Active queries to improve OS detection

Administrators can initiate a targeted active scan from Virtual Edges to monitored subnets in their environment. These targeted scans attempt to enumerate the running operating system on endpoints to improve identification of devices and enable more granular policy definition.