Release Notes 7.8.4

Total Page:16

File Type:pdf, Size:1020Kb

Release Notes 7.8.4 Release Notes 7.8.4 © 2020 DriveLock SE Release Notes Table of Contents Part I Introduction 3 1 Document Conventions 3 2 DriveLock Documentation 3 Part II System Requirements 5 1 DriveLock Agent 5 2 DriveLock Management Console and Control Center 5 3 DriveLock Enterprise Service 5 Part III Supported Platforms 7 Part IV Version History 9 1 DriveLock 7.8.6 9 2 DriveLock 7.8.4 9 3 DriveLock 7.8.2 10 Part V Known Issues 11 1 Installation of Management Components Using Group Policy 12 2 DriveLock Device Scanner 12 3 Manual Updates 12 4 Self Service unlock 12 5 DriveLock iOS and iTunes 12 6 Windows Portable Devices (WPD) 12 7 DriveLock Disk Protection 13 8 DriveLock File Protection and Microsoft OneDrive 14 9 Antivirus 14 Part VI Test Installation and Upgrade 15 1 DriveLock Evaluation 15 2 Updating DriveLock Components 15 General Issues 15 Updating DriveLock Disk Protection 15 Release Notes 7.8.4 2 © 2020 DriveLock SE Introduction 1 Introduction This document contains important information about the new version of DriveLock and changes from previous DriveLock versions. The DriveLock Release Notes also describes changes and additions to DriveLock that were made after the documentation was completed. This and other documentation can be found on our online help page www.drivelock.help. 1.1 Document Conventions Throughout this document the following conventions and symbols are used to emphasize important points that you should read carefully, or menus, items or buttons that you need to click or select. Caution: This format means that you should be careful to avoid unwanted results, such as potential damage to operating system functionality or loss of data Hint: Useful additional information that might help you save time. Italics represent fields, menu commands, and cross-references. Bold type represents a button that you need to click. A fixed-width typeface represents messages or commands typed at a command prompt. A plus sign between two keyboard keys means that you must press those keys at the same time. For example, ALT+R means that you must hold down the ALT key while you press R. A comma between two or more keys means that you must press them consecutively. For example ‘ALT, R, U’ means that you must first press the Alt key, then the R key, and finally the U key. 1.2 DriveLock Documentation The DriveLock Documentation consists of the following manuals: · DriveLock QuickStart Guide The QuickStart Guide describes the required steps to setup DriveLock using the DriveLock QuickStart setup wizard.The DriveLock QuickStart setup wizard can be used to simplify the installation and configuration of a basic DriveLock environment. · DriveLock Installation Guide The Installation Guide describes the available installation packages, the system requirements and the steps for installing each DriveLock component. This is the first document a DriveLock administrator should read. · DriveLock Administration Guide The Administration Guide describes the DriveLock architecture and components. It contains detailed instructions for configuring DriveLock using the DriveLock Management Console (DMC). This document is intended for DriveLock administrators who need to become familiar with all available DriveLock functionality. · DriveLock Control Center User Guide This manual describes how to configure and use the DriveLock Control Center (DCC). This document is intended for administrators and users who will use DriveLock Control Center for reporting and forensic analysis. Release Notes 7.8.4 3 © 2020 DriveLock SE Introduction · DriveLock User Guide The DriveLock User Guide is aimed at end users. It describes how to request the temporary unlocking of a computer, how to use DriveLock Encryption 2-Go and how to use Network Profiles. · DriveLock Security Awareness This manual describes the new security awareness features, which are also included in DriveLock Smart SecurityEducation. You can read and download the latest version of these manuals from our online help website www.drivelock.help. Release Notes 7.8.4 4 © 2020 DriveLock SE Introduction 2 System Requirements This section contains recommendations and minimum requirements. The requirements may vary depending on your configuration of DriveLock, its components and features, and your system environment. 2.1 DriveLock Agent Before distributing or installing the DriveLock agents on your corporate network, please ensure that the computers meet these requirements and are configured properly to provide full functionality. Main memory: o at least 4 GB RAM Free disk space: o approx. 1 GB with average policies that do not include your own video files o at least 2 GB if Security Awareness campaigns are used with video sequences (Security Awareness Content AddOn) How much disk space you need largely depends on how DriveLock agents are configured via policies and on the settings and features they contain. It is therefore difficult to provide an exact specification here. We recommend that you verify and determine the exact value in a test setup with a limited number of systems before performing a company-wide roll-out. Additional Windows components: o .NET Framework 4.5.2 or newer (for Security Awareness Campaigns in general) o Windows Media Player (for Security Awareness Content AddOn) 2.2 DriveLock Management Console and Control Center Be sure to install the two management components on the same computer because the DCC will access some of the dialogs provided by the DriveLock Management Console. Before distributing or installing the DriveLock management components DMC and DCC on your corporate network, please ensure that the computers meet these requirements and are configured properly to provide full functionality. Main memory: o at least 4 GB RAM Free disk space: o approx.350 MB Additional Windows components: o .NET Framework 4.5.2 or newer 2.3 DriveLock Enterprise Service Before distributing or installing the DriveLock Enterprise Service on your corporate network, please ensure that the computers meet these requirements and are configured properly to provide full functionality. Release Notes 7.8.4 5 © 2020 DriveLock SE System Requirements Main memory: o at least 8 GB RAM Free disk space: o at least 4 GB, with policies that do include Security Awareness campaigns with video sequences (Security Awareness Content AddOn), approx. 15 GB is recommended o if the server is also running the SQL-Server database, additional 10 GB are recommended for storing DriveLock data Additional Windows components: o .NET Framework 4.5.2 or newer Depending on the number and duration of the DriveLock events that are stored, the size of the DriveLock database can vary greatly from one system environment to another. It is therefore difficult to provide an exact specification here. We recommend setting up a test environment with the planned settings over a period of at least a few days to determine the exact values. These values can be used to calculate the required memory capacity. Release Notes 7.8.4 6 © 2020 DriveLock SE System Requirements 3 Supported Platforms DriveLock has been tested and is released for all Windows versions (having the latest available patches installed), which have been official released by Microsoft by the time this DriveLock version was released and which have not reached their end-of-service date: Operating System XP 3) W7 SP12) OS X Win-10 Win-10 Win-10 Server Server Server Windows 1) W8.1 10.9+ 1607 1703/ 1803/ 2008 SP2 2012 2016 1709 18094) 2008R2 20012R2 SP1 Agent (DC/AC) Device Control x x x x x x x x Application Control x x x x x x x x File encryption Mobile Encryption x x x x x x x x Application File Protection6) x x x x x x x x Disk encryption Disk Protection x13) x x x 7) x 7) Management components Management x x x x x x x Console Control Center9) x x x x x x x Enterprise Server x12) x12) x12) x12) x x x DriveLock IGEL WYSE Embedde eLux Virtual Channel UDLX Linux V6 d Thin- 4.12.100 Windows Clients + 10) ICA x x x x RDP x x x DriveLock Thin-Client Support ICA (Citrix) XenApp XenApp XenApp / 6.0 6.511) XenDesktop 7.X RDP (Windows TS) 2008R2 2012 2016 SP1 20012R2 Release Notes 7.8.4 7 © 2020 DriveLock SE Supported Platforms Database Microsoft SQL 2008 2012/20 2016 SP2 Server5) SP4 14 SP2 2008R2 SP3 Oracle Database14) 11.2 12.2 Remarks 1) Windows Intel X86 based Systems (x86_32, x86_64, AMD64) Windows Vista and Windows 8 are not supported any more. 2) Windows 7 SP1 KB3033929 (SHA-2 code signing support) is required on Windows 7 64-bit. 3) Windows XP Windows XP with SP3 fully patched and POSReady 2009 is supported. An additional license for support of legacy OS is required! 4) Windows 10-1809Please use the latest DriveLock release for this Windows version. We are not experiencing any issues so far with this version. 5) Microsoft SQL For installations up to 200 Clients. Express 6) File Protection Citrix Terminal Servers are not supported. 7) Disk Protection UEFI and GPT Partitioning are only supported for disks up to 2 TB running on Windows 8 64 bit or newer and UEFI Version V2.3.1 or newer. For UEFI running on Windows 10 Version 1703 the Update KB4032188 is mandatory. DriveLock Disk Protection is supported on Windows 10 version 1709 or newer with some limitations (see chapter "Known issues" for more information). 9) Control Center Internet Explorer 11 is required for remote connections to an DriveLock Agent. 10) Windows Der DriveLock Virtual Channel and the DriveLock Agent must not be installed on the same Client. Embedded 11) XenApp XenApp 6.5 Hotfix Roll Up 4 or newer. 12) DES On these operating systems DES should only be installed for evaluation or testing purposes.
Recommended publications
  • Through the Looking Glass: Webcam Interception and Protection in Kernel
    VIRUS BULLETIN www.virusbulletin.com Covering the global threat landscape THROUGH THE LOOKING GLASS: and WIA (Windows Image Acquisition), which provides a WEBCAM INTERCEPTION AND still image acquisition API. PROTECTION IN KERNEL MODE ATTACK VECTORS Ronen Slavin & Michael Maltsev Reason Software, USA Let’s pretend for a moment that we’re the bad guys. We have gained control of a victim’s computer and we can run any code on it. We would like to use his camera to get a photo or a video to use for our nefarious purposes. What are our INTRODUCTION options? When we talk about digital privacy, the computer’s webcam The simplest option is just to use one of the user-mode APIs is one of the most relevant components. We all have a tiny mentioned previously. By default, Windows allows every fear that someone might be looking through our computer’s app to access the computer’s camera, with the exception of camera, spying on us and watching our every move [1]. And Store apps on Windows 10. The downside for the attackers is while some of us think this scenario is restricted to the realm that camera access will turn on the indicator LED, giving the of movies, the reality is that malware authors and threat victim an indication that somebody is watching him. actors don’t shy away from incorporating such capabilities A sneakier method is to spy on the victim when he turns on into their malware arsenals [2]. the camera himself. Patrick Wardle described a technique Camera manufacturers protect their customers by incorporating like this for Mac [8], but there’s no reason the principle into their devices an indicator LED that illuminates when can’t be applied to Windows, albeit with a slightly different the camera is in use.
    [Show full text]
  • Latest Features Available from the Windows 10 Updates That Could Be Beneficial for Students & Businesses Based Within the Milwaukee Area
    Latest features available from the windows 10 updates that could be beneficial for students & businesses based within the Milwaukee area By: Jeremy Konetz | November 20, 2018 | Informative Article What are some of the benefits that the latest windows 10 updates provide to students and Milwaukee area-based businesses? Note the last three updates made available through windows 10 updates are windows 10 version 1709 (Released: January 23, 2018), windows 10 version 1803 (Released: July 6, 2018), and windows 10 version 1809 (Released: October 1, 2018). What are some of the beneficial updates provided in the Windows 10 update version 1709 released on January 23, 2018, one of the first updates Windows 10 released this year. What are the areas that this update has improved on? 1) Deployment a. Launching the autopilot application. i. Accomplished through a zero-touch experience. Example shown in figure 1. Figure 1 Resource link: https://docs.microsoft.com/en-us/windows/whats-new/whats-new-windows-10- version-1709 ii. Client or organization profile configuration can be accomplished at the vendor with the devices sent directly to them upon completion. Example shown in figure 2. Figure 2 1 Resource link: https://docs.microsoft.com/en-us/windows/whats-new/whats-new-windows-10- version-1709 b. Activation on subscription to windows 10. i. Feature allows for Windows 10 enterprise to be deployed within an organizational networks structure without applying any keys or rebooting of devices or components within an organizations operational system. See figure 3. Figure 3 1 Resource link: https://docs.microsoft.com/en-us/windows/whats-new/whats-new-windows-10- version-1709 ii.
    [Show full text]
  • MAXPRO Microsoft Windows Patches.Book
    MAXPRO® VMS and NVR Approved Microsoft® Windows Patches Technical Notes MICROSOFT® WINDOWS PATCHES TESTED WITH MAXPRO®NVR AND MAXPRO®VMS Overview The purpose of this document is to identify the patches that have been delivered by Microsoft® Windows and which have been tested against the current shipping ver- sions of MAXPRO®NVR and MAXPRO®VMS with no adverse effects being observed. If you have questions concerning the information in this document, please contact Honeywell Technical Support. See the back cover for contact information. Windows Patches Tested with MAXPRO®NVR till the Month of: June, 2020 Windows Patches Tested with MAXPRO®VMS till the Month of: June, 2020 This document contains: Section See... • June - 2020- Microsoft® Windows Patches Tested with MAXPRO®NVR on page 5 Windows 10 (Enterprise) • June - 2020- Microsoft® Windows Patches Tested with MAXPRO®VMS Server/ Client on Windows 2016 Standard and Windows 10 (Enterprise) page 5 • May - 2020- Microsoft® Windows Patches Tested with MAXPRO®NVR on page 5 Windows 10 (Enterprise) • May - 2020- Microsoft® Windows Patches Tested with MAXPRO®VMS Server/ Client on Windows 2016 Standard and Windows 10 (Enterprise) page 5 • April - 2020- Microsoft® Windows Patches Tested with MAXPRO®VMS Server/ page 7 Client on Windows 2016 Standard and Windows 10 (Enterprise) • April - 2020- Microsoft® Windows Patches Tested with MAXPRO®NVR on Windows 10 (Enterprise) page 7 • March - 2020- Microsoft® Windows Patches Tested with MAXPRO®VMS Server/ page 8 Client on Windows 2016 Standard and Windows 10 (Enterprise) • March - 2020- Microsoft® Windows Patches Tested with MAXPRO®NVR on Windows 10 (Enterprise) page 8 • February - 2020- Microsoft® Windows Patches Tested with MAXPRO®VMS Server/ page 8 Client on Windows 2016 Standard and Windows 10 (Enterprise) • February - 2020- Microsoft® Windows Patches Tested with MAXPRO®NVR on Windows 10 (Enterprise) page 8 800-19154V9-K_Microsoft Windows Patches 1 Section See..
    [Show full text]
  • Metasys Server Installation and Upgrade Instructions Code No
    Metasys Server Installation and Upgrade Instructions Code No. LIT-12012162 Software Release 10.0 Issued April 15, 2019 Welcome.....................................................................................................................................3 Getting Started...........................................................................................................................3 Summary of Changes.........................................................................................................................4 Prerequisite Software Checklist for Installation and Upgrade.......................................................4 Recommended OS and SQL Server Combinations.........................................................................7 Upgrade Pre-Work Checklist..............................................................................................................8 Metasys Server Installation.....................................................................................................10 Installing Unified Metasys Server on Desktop Computer.............................................................10 Installing Unified Metasys Server on Server Computer................................................................12 Installing Unified Metasys Server and SCT on Desktop Computer.............................................14 Installing Unified Metasys Server and SCT on Server Computer................................................17 Installing a Split Metasys Server and SCT.....................................................................................20
    [Show full text]
  • Surface Hub 2S Admin Guide
    Surface Hub 2S Admin Guide Surface Hub 2S coming soon; Pre-release products shown; products and features subject to regulatory certification/approval, may change, and may vary by country/region. Surface Hub 2S has not yet been authorized under U.S. Federal Communications Commission (FCC) rules; actual sale and delivery is contingent on compliance with applicable FCC requirements. This documentation is an early release of the final documentation, which may be changed prior to final commercial release and is confidential and proprietary information of Microsoft Corporation. This document is provided for informational purposes only and Microsoft makes no warranties, either express or implied, in this document. © 2019. Microsoft Corporation. All rights reserved Introduction .................................................................................................................................................. 1 Welcome to Surface Hub 2S ......................................................................................................................... 1 New User Experience and Features ........................................................................................................................ 1 Microsoft Teams ..................................................................................................................................................... 1 New form factor and hardware changes ................................................................................................................ 2 Surface
    [Show full text]
  • SECURITY ADVISORY Volume 2017-160
    Security Advisory | Volume 2017‐160 PRODUCT DESCRIPTION AFFECTED VERSIONS OTHER INFORMATION Microsoft Edge Remote Chakra Scripting Engine Memory Corruption Vulnerability - CVE-2017- Published - May 12, 2017 0223 CVE-2017-0223 Microsoft Edge Remote Chakra Scripting The Chakra JavaScript engine in Microsoft Edge on Windows 10 version 1703, does not properly CVSS - 7.5 Version(s): <=Windows Ver Engine Memory Corruption Vulnerability - render when handling objects in memory, making it prone to a remote code execution vulnerability. Vendor's Advisory - https://www.microsoft.com/en- 10. CVE-2017-0223 A remote attacker could exploit this issue to cause memory corruption and execute arbitrary code us/windows/microsoft-edge in the context of the current user. To exploit this issue the attacker would have to entice the victim http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017- to visit a maliciously crafted web site or to open a maliciously crafted file. 0223 Published - May 12, 2017 Linux Kernel 4.11.1 and Earlier Local DoS or Other Impact due to Use-After-Free Error - CVE-2017- CVE-CVE-2017-7487 Linux Kernel 4.11.1 and Earlier Local DoS 7487 CVSS - 7.2 or Other Impact due to Use-After-Free The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference Version(s): <=4.11.1 Vendor's Advisory - Error - CVE-2017-7487 counts, which allows local users to cause a denial of service (use-after-free) or possibly have http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017- unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface.
    [Show full text]
  • Windows 10 What to Do Now
    WINDOWS 10 WHAT TO DO NOW ARRAYA SOLUTIONS Educating, Engaging, and Elevating IT since 1999 Chuck Kiessling Director, Cloud and Workspace Solutions AGENDA Why are we here? What is your story? What are some key items to help your journey? Changes to Desktop Security WaaS: Servicing your Security Needs INTRODUCTIONS Chuck Kiessling Director, Cloud and Modern Workspace Practice [email protected] Twitter: @CKiessling WHAT IS YOUR INTEREST IN THIS SESSION? Windows and Office Active ConfigMgr Directory Windows Exchange Server SharePoint On-premises Legacy devices Modern devices Windows 7 Windows 10 Office Office 365 Active Directory + Azure Active Directory ConfigMgr + Microsoft Intune Windows Defender + Microsoft Threat Protection Cloud-connect what you have today What is your Digital Transformation Story? WHAT YOU CAN DO TO PROTECT YOUR BUSINESS WITH WINDOWS 10 WINDOWS 10 IS THE MOST SECURE WINDOWS EVER Device safeguards Threat resistance Identity protection Information security Threat detection and response *For the supported lifetime of the device THE MICROSOFT INTELLIGENT SECURITY GRAPH 450B monthly authentications Cyber threat intelligence collected 200+ global from unparalleled security cloud consumer and commercial information sources services Billions of data points Detect threats before they do damage +1B Windows Powered by machine learning and 18+ billion devices Bing web updated human intelligence pages scanned 400B e-mails analyzed THE MOST SECURITY, BUILT IN Where do these data points come from? WINDOWS 10: THE
    [Show full text]
  • KACE® Systems Management Appliance 11.0 Patching Catalog
    KACE® Systems Management Appliance 11.0 Patching Catalog: Supported Operating Systems and Applications Table of Contents Patching matrix........................................................................................................................................ 3 Operating systems........................................................................................................................... 3 Applications...................................................................................................................................... 5 About us.................................................................................................................................................20 Technical support resources......................................................................................................... 20 Legal notices..................................................................................................................................20 KACE Systems Management Appliance 11.0 Patching Catalog: Supported Operating Systems and Applications 2 Patching matrix This document contains the most recent list of supported applications and operating systems in the KACE Patch Catalog. The content of this matrix was compiled in March 2021. Operating systems Platform Publisher Operating System (OS) OS Architecture Edition Mac Apple Computer, Inc. macOS Catalina 10.15 ALL x86_64 Mac Apple Computer, Inc. macOS High Sierra 10.13 ALL x86_64 Mac Apple Computer, Inc. macOS Mojave 10.14 ALL x86_64 Mac Apple
    [Show full text]
  • Drivelock Release Notes 2020.2
    DriveLock Release Notes 2021.1 HF1 DriveLock SE 2021 Table of Contents 1 RELEASE NOTES 2021.1 HF1 4 1.1 Document Conventions 4 1.2 Available DriveLock Documentation 4 2 UPDATING DRIVELOCK 7 2.1 Migrating the databases 7 2.1.1 Requirements for successful migration 8 2.1.2 How to migrate 8 2.2 Updating the DriveLock Agent 10 2.3 Updating the DriveLock Enterprise Service (DES) 11 2.4 General information on updating to the current version 11 2.5 Manual Updates 12 3 SYSTEM REQUIREMENTS 13 3.1 DriveLock Agent 13 3.2 DriveLock Management Console and Control Center 18 3.3 DriveLock Enterprise Service 19 3.4 DriveLock Operations Center (DOC) 21 3.5 DriveLock in workgroup environments (without AD) 21 4 VERSION HISTORY 23 4.1 Version 2021.1 23 4.1.1 Bug fixes 2021.1 HF1 23 4.1.2 Bug fixes 2021.1 24 4.2 Version 2020.2 29 4.2.1 Bug fixes 2020.2 29 4.3 Version 2020.1 37 4.3.1 Bug fixes 2020.1 37 4.3.2 Bug fixes 2020.1 HF1 44 2 4.3.3 Bug fixes 2020.1 HF2 47 4.3.4 Bug fixes 2020.1 HF3 48 4.4 Version 2019.2 52 4.4.1 Bug fixes 2019.2 52 4.4.2 Bug fixes 2019.2 HF1 58 4.4.3 Bug fixes 2019.2 SP1 60 4.4.4 Bug fixes 2019.2 HF3 64 5 KNOWN ISSUES 66 5.1 DriveLock Management Console 66 5.2 Known limitations on the agent 66 5.3 DriveLock Enterprise Service (DES) 66 5.4 Installing Management Components with Group Policies 66 5.5 Self Service Unlock 66 5.6 DriveLock, iOS and iTunes 66 5.7 DriveLock Device Control 67 5.8 DriveLock Disk Protection 68 5.9 DriveLock File Protection 71 5.10 DriveLock Pre-Boot Authentication 72 5.11 Encryption 72 5.12 DriveLock Mobile Encryption 72 5.13 BitLocker Management 72 5.14 DriveLock Operations Center (DOC) 74 5.15 DriveLock Security Awareness 74 5.16 DriveLock and Thin Clients 75 6 END OF LIFE ANNOUNCEMENT 76 7 DRIVELOCK TEST INSTALLATION 77 COPYRIGHT 78 3 1 Release Notes 2021.1 HF1 1 Release Notes 2021.1 HF1 The release notes contain important information about new features and bug fixes in the latest version of DriveLock.
    [Show full text]
  • Administrator Guide
    Administrator Guide HP ThinUpdate © Copyright 2016, 2017 HP Development Company, L.P. Windows is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Fifth Edition: November 2017 First Edition: February 2016 Document Part Number: 849856-005 User input syntax key Text that you must enter into a user interface is indicated by fixed-width font. Item Description Text without brackets or braces Items you must type exactly as shown <Text inside angle brackets> A placeholder for a value you must provide; omit the brackets [Text inside square brackets] Optional items; omit the brackets {Text inside braces} A set of items from which you must choose only one; omit the braces | A separator for items from which you must choose only one; omit the vertical bar ... Items that can or must repeat; omit the ellipsis iii iv User input syntax key Table of contents 1 Getting started ............................................................................................................................................. 1 Supported operating systems ............................................................................................................................... 1 Downloading and installing HP ThinUpdate .........................................................................................................
    [Show full text]
  • Should Download Windows 10, Version 1709 Or
    should download windows 10, version 1709 or not Microsoft .NET Framework 4.8 on Windows 10 version 1709, Windows 10 version 1803, Windows 10 version 1809 and Windows Server 2019. This article describes an update for Microsoft .NET Framework 4.8 on Windows 10, version 1709, Windows 10, version 1803, Windows Server, version 1803, Windows 10, version 1809 and Windows Server, version 1809 and Windows Server 2019. Please note: .NET Framework 4.8 has been refreshed with the latest servicing updates as of January 14 th , 2020. Apart from the servicing fixes, there is no change in the .NET Framework 4.8 product from the August 13 th , 2019 Windows update. If you have already downloaded and installed the update from August, you do not need to install this update otherwise please install this update to receive the latest product bits. About Microsoft .NET Framework 4.8. Microsoft .NET Framework 4.8 is a highly compatible and in-place update to .NET Framework 4.7, 4.7.1 and 4.7.2. However, it can run side- by-side with .NET Framework 3.5 Service Pack 1 (SP1) and earlier versions of .NET Framework. When you install this package, it is listed as Update for Microsoft Windows (KB 4486153) under the Installed Updates item in Control Panel. Microsoft .NET Framework 4.8 is available on the Microsoft Update Catalog website for download and for import into Windows Software Update Services (WSUS). Download information. The following files are available for download from the .NET Download Site: For more information about .NET Framework 4.8 offline installer, see .NET Framework 4.8 offline installer for Windows.
    [Show full text]
  • Kofax Transformation Modules 6.3.0 Technical Specifications
    Kofax Transformation Modules Technical Specifications Version: 6.3.0 Date: 2019-04-29 © 2019 Kofax. All rights reserved. Kofax is a trademark of Kofax, Inc., registered in the U.S. and/or other countries. All other trademarks are the property of their respective owners. No part of this publication may be reproduced, stored, or transmitted in any form without the prior written permission of Kofax. Table of Contents Table of Contents ........................................................................................................................................ 3 About Kofax Transformation Modules technical specifications ............................................................ 4 Product requirements ................................................................................................................................. 4 KTM Server ............................................................................................................................................... 4 KTM Thin Client Server ............................................................................................................................. 4 KTM Thin Clients (Browser UI) .................................................................................................................. 5 KTM Thick Clients (interactive modules) ................................................................................................... 5 KTM Project Builder ..................................................................................................................................
    [Show full text]