Release Notes for VIPRE Cloud - 2024 Feb 28

Written By Marissa Fegan (Super Administrator)

Updated at March 11th, 2024

Product release information for VIPRE Cloud, including Endpoint Detection & Response, Endpoint Security Cloud, and Site Manager, released on 2024 February 28.

What's New

We are excited to announce the arrival of the VIPRE API, bringing new features such as providing detailed information about your endpoints, request parameters, and response formats, separated into four categories: Devices, Site, Threats, and Incidents.

API Documentation

  1. Log in to your VIPRE Cloud site
  2. Navigate to Setup > Help > Documentation
  3. Under Online Documentation, you'll notice VIPRE Success Center and API Documentation
    1. VIPRE Success Center is this website, an online database where you can find product documentation and release notes
    2. API Documentation is a YAML file you can download to get detailed information about your site; you can use any API editor to view the YAML file

This VIPRE Cloud release also includes support for SAML Authentication. SAML (Security Assertion Markup Language) is an open standard that allows for authentication and authorization between an identity provider (IDP) and a service provider (SP).

Configure SAML SSO

ESC - SAML SSO

VIPRE Cloud supports using SAML, allowing for integration with SSO identity providers.

What is SAML?

SAML (Security Assertion Markup Language) is an open standard that allows for authentication and authorization between an identity provider (IDP) and a service provider (SP).

Configuration

SAML configuration occurs in the IDP admin portal and the VIPRE Cloud admin portal. 

We've provided Okta-specific instructions for configuring SAML with VIPRE Cloud for single sign-on below. If your IDP is not Okta, you can still use the instructions below as a general guide. If you require further assistance, contact Technical Support.

  1. Log in to your VIPRE Cloud portal
  2. On the left-side menu, find SETUP
  3. Click System, then select SAML
  4. Click Configure SAML 
  1. You will presented with Service Provider Metadata, giving you options to download the XML or copy the metadata and manually add it to your IDP
    1. For this example, we are going to copy the metadata manually
  2. Open a separate browser tab and navigate to your Okta admin portal
  3. In your Okta portal, select Applications > Applications on the left-side menu
  4. In the main part of the screen, select Add Application
  5. Click Create a New App in the top-right 
  6. Select SAML 2.0 as the Sign on Method and click Create
  7. On the General tab, under SAML Settings, click Edit
    • App name can be any name you want to use to identify the VIPRE Cloud application within Okta
    • All other options are based on your organization's desired decisions
  8. Click Next to get to the Configure SAML screen within Okta
  9. Go back to the browser tab that has your VIPRE Cloud portal open and copy the Entity ID from the Service Provider Metadata screen
  10. In the browser tab that you're using for Okta, paste the Entity ID into the Audience URI (SP Entity ID) field
  11. Go back to the browser tab that has your VIPRE Cloud portal open and copy the Single Sign On URL from the Service Provider Metadata 
  1. In the browser tab that you're using for Okta, paste the Single Sign On URL into the Single sign on URL field
  2. Under Single sign on URL, Use this for Recipient URL and Destination URL should already be checked by default
  3. Ensure the following configurations are set in your Okta portal:
    • Name ID format should be set to EmailAddress
    • Application username should be set to Email
  4. Scroll to the bottom of the page and click Next
  5. Click Finish

VIPRE Cloud is now configured in Okta. The next step is to configure Okta in VIPRE Cloud.

  1. You will see the Okta Application screen; click on the Sign On tab to find the Identity Provider Metadata
  2. In a separate browser tab, navigate to the MetadataURL from Okta and download the XML file
  3. Go back to the browser tab with VIPRE Cloud portal and click Next to get to the Identity Provider Metadata page
  4.  Drag and drop the XML file in the box or click Select a file… to upload the XML file you downloaded in Step 22 above
  1. The Entity ID and Single Sign On URL will be filled in; next to Provider Name, enter how you want this to appear on the VIPRE Cloud sign-in page
  2. Click Next
  3. Here, we will test our SAML setup
    1. Step 1: Copy the login URL into a new browser tab
      1. You should see the login page for your IDP
    2. Step 2: Enter your credentials and log in to your IDP
    3. Step 3: Review the results of the test

If you need to review the log or redo the test, you can complete those actions at the bottom of the page.

  1. Click Next
  2. The SAML Configuration Summary page allows you to see all of the settings in one place; when you are ready, click Save & Enable

Once SAML is enabled for all users, you can choose to enforce SSO login only, deactivating password authentication.

Congratulations! SAML SSO is now configured for use with your VIPRE Cloud site.

 

 

System Requirements

VIPRE Endpoint Detection & Response System Requirements

System requirements for VIPRE Endpoint Detection & Response.

Product or Component System Requirements
VIPRE EDR Web-based Console

We support the latest release of the following browsers:

  • Google Chrome
  • Microsoft Edge
  • Mozilla Firefox
  • Apple Safari 
VIPRE Update Proxy
  • A PC with a network connection
  • Any Desktop or Server version of Windows
  • Microsoft .NET Framework 4.0 or higher

VIPRE Update Proxy is a supplemental application tool that works with your existing deployment of VIPRE Endpoint Security Cloud or Endpoint Detection & Response. For more information, refer to Related Articles for details on the VIPRE Update Proxy Guide.

VIPRE Agent for Windows

OPERATING SYSTEMS

  • Windows 11 (64-bit)
  • Windows 10 (32- & 64-bit, all versions)
  • Windows 8.1 (32- & 64-bit)
  • Windows 7 SP1 (32- & 64-bit) 
  • Windows Server 2022 (64-bit, excluding Server Core) 
  • Windows Server 2019 (64-bit, excluding Server Core) 
  • Windows Server 2016 (64-bit, excluding Server Core) 
  • Windows Server 2012 R2 (64-bit, excluding Server Core) 
  • Windows Server 2008 R2 SP1 (64-bit, excluding Server Core) 
  • Windows Small Business Server 2011 

HARDWARE

  • Dual-core processor recommended
  • 1GB free disk space
  • 2GB RAM or better recommended

MISCELLANEOUS

  • Internet Explorer 8 or later

SUPPORTED EMAIL APPLICATIONS

  • Microsoft Outlook 2003+
  • SMTP/POP3 (Thunderbird, IncrediMail, Eudora, etc.)
  • SSL supported in Outlook only

SUPPORTED WEB BROWSERS FOR HTTPS URL PROTECTION

  • Google Chrome v79 or later
  • Microsoft Edge v79 or later
  • Mozilla Firefox v65 or later


 

VIPRE Agent for macOS

**EDR functions are not yet available for macOS

Operating System:

  • macOS Monterey 12
  • macOS Big Sur 11  
  • macOS Catalina 10.15  
  • macOS Mojave 10.14  
  • macOS High Sierra 10.13  
  • macOS Sierra 10.12  
  • macOS X El Capitan 10.11  

Your Mac must also have:

  • 2 GB Memory
  • 1 GB available hard drive space
  • Active Internet Connection