Product release information for VIPRE Endpoint Detection & Response, released on January 17, 2023.
What's New
We are thrilled to announce a brand-new product we are adding to the VIPRE portfolio - VIPRE Endpoint Detection & Response (EDR). VIPRE EDR builds on top of our Endpoint Security product to add enhanced threat detection, investigation, and remediation capabilities similar to other EDR industry products but with enhanced features and usability.
With this release, VIPRE Endpoint Detection & Response becomes the flagship product in our Endpoint product line, to which existing Endpoint Security Cloud and Endpoint Security Server customers are encouraged to upgrade.
VIPRE Endpoint Detection & Response (EDR) is a comprehensive endpoint security solution that includes the best of a next-generation antivirus (NGAV)/endpoint protection platform(EPP), plus advanced investigation and response capabilities. Malicious code, network exploits, and many other threats will be immediately blocked, while more evasive and persistent attacks will be escalated to incidents for further analysis and remediation. The solution provides a wide range of investigation and hardening tools to allow security teams to respond rapidly and take action.
Capabilities include:
- All the next-generation anti-malware, anti-virus, and anti-threat capabilities included in VIPRE Endpoint Security Cloud and Server, including AI-driven malware detection, network intrusion detection, DNS protection, web exploit detection, and anti-spam engines
- Additional advanced threat detection and correlation engines that combine raw events, security events, and contextual data to identify zero-day, living-off-the-land, and grey zone threats not detectable by classic next-gen AV
- The VIPRE Endpoint Web Access Control add-on, which provides policy-based access control to selected website categories to address compliance and duty-of-care concerns
- A clean and seamless incident investigation capability that surfaces relevant information and actionable data to first responders
- Application scanning to determine the risk profile of the endpoint and any potential vulnerabilities
- A remote shell that provides instant access to allow investigators to perform detailed forensic analysis on the endpoint; no installer required
- Supplemental in-situ investigation with sandbox-based forensic threat analysis granting detailed insights into potential malware behavior.
- The ability to quickly and easily isolate threats that may reside on endpoints by preventing all network access to/from the endpoint
- Rapid response through built-in tools, including Vulnerability & Patch Management, remote process control, and remote file management
All of these capabilities are provided within a responsive console that can be used from anywhere, even while on the go, and supports the seamless exploration of all data through a deeply linked UI.
Special Instructions
Navigate to the VIPRE Endpoint Detection & Response guide for all product documentation, including a guided setup to help you get started. Here are some quick links below, organized in the same way as the product menus to help you find what you need:
System Requirements
VIPRE Endpoint Detection & Response System Requirements
System requirements for VIPRE Endpoint Detection & Response.
Product or Component | System Requirements |
---|---|
VIPRE EDR Web-based Console |
We support the latest release of the following browsers:
|
VIPRE Update Proxy |
VIPRE Update Proxy is a supplemental application tool that works with your existing deployment of VIPRE Endpoint Security Cloud or Endpoint Detection & Response. For more information, refer to Related Articles for details on the VIPRE Update Proxy Guide. |
VIPRE Agent for Windows |
OPERATING SYSTEMS
HARDWARE
MISCELLANEOUS
SUPPORTED EMAIL APPLICATIONS
SUPPORTED WEB BROWSERS FOR HTTPS URL PROTECTION
|
VIPRE Agent for macOS **EDR functions are not yet available for macOS |
Operating System:
Your Mac must also have:
|
Known Issues and Workarounds
This section lists issues that are known at the time of release. In some cases, these are bugs that we are working to resolve with a subsequent release. Other items may be due to causes outside of our control, such as bugs with other vendors' software. In all cases, we have tried to provide a workaround for you to consider, should you experience an issue.
If you have questions about a specific issue, please provide the issue ID (if applicable) when contacting our Technical Support team.
Ticket Number | Description |
---|---|
VPBAGENT-40793 (Agent for Windows) |
VIPRE Agent for Windows crashes unexpectedly during VTE (VIPRE Threat Engine) package update on Windows Server 2008 r2. No workaround needed; service restarts automatically after 1-2 minutes. |
VPBAGENT-40121 (Agent for Windows) |
When using Google Chrome, if Malicious URL Blocking is enabled, remediation of malicious files is not complete and files may remain in the Downloads directory. Workaround: VIPRE's layered security will continue to protect you. Ensure that you have Advanced Active Protection enabled. |
VCT-13044 (EDR Web Consoles) |
When using File Analysis, an error with long text may not show the full text of the error when expanding the row. There is no workaround at this time. |
VCT-13036 (EDR Web Console) |
VIPRE Agent is not seeing isolation exclusions with the direction OUT and only remotePort created in the web console There is no workaround at this time. |
VCT-12831 (EDR Web Console) |
Some email notifications being sent from the web console are being hardcoded with the America/New_York timezone. There is no workaround at this time. |
VPBAGENT-3187 (Agent for Windows) |
IPv6 trusted zone traffic is being detected as ‘non trusted’ There is no workaround at this time. |