Release Notes for VIPRE Agent - Jan 10, 2023

Written By Marissa Fegan (Super Administrator)

Updated at January 10th, 2023

Product release information for VIPRE Agent for Windows, version 13.0.8, on January 10, 2023. 

What's New

We are pleased to announce the latest agent release bringing the VIPRE Agent for Windows to version 13.0. 

Updates

Jan 10, 2023: VIPRE Agent for Windows version 13 is now generally available.

Dec 13, 2022: Custom build for VIPRE Agent for Windows version 13 is released.

Nov 10, 2022: Initial announcement of custom build agent being released for testing. Check this space for updates.

 

 

This improved agent is the culmination of months of architectural changes, allowing us to offer Endpoint Detection & Response services managed by the same agent as the core Endpoint Security services you are familiar with as part of VIPRE Endpoint Security Cloud. 

This release runs 64-bit natively in 64-bit operating systems and includes several important fixes and improvements which can be found below (see Fixed in this Release and Known Issues).

  

VIPRE Recommends

It's critical to keep all software in your environment as up-to-date as possible. New software releases often fix issues with older versions of the product that, unless addressed, could leave you vulnerable. As such, VIPRE recommends updating to the most recent version as soon as possible.

Check the current status of older product versions on the VIPRE Product Lifecycle Matrix to learn when support for specific product versions may end.

 

Special Instructions

Refer to Related Articles for details on Managing Agent Software Updates.

System Requirements

Component System Requirements
Endpoint Cloud Web-based Console

Web Browsers

  • Google Chrome
  • Microsoft Edge
  • Mozilla Firefox
  • Apple Safari
VIPRE Update Proxy
  • Computer with Network connection
  • Any desktop or server version of Windows
  • Microsoft .NET Framework 4.0 or higher
VIPRE Agent for Windows

Operating Systems

  • Windows 11 (64-bit)
  • Windows 10 (32- & 64-bit, all versions)
  • Windows 8.1 (32- & 64-bit, all versions)
  • Windows 7 SP1 (32- & 64-bit)
  • Windows Server 2022 (64-bit, excluding Server Core) 
  • Windows Server 2019 (64-bit, excluding Server Core) 
  • Windows Server 2016 (64-bit, excluding Server Core) 
  • Windows Server 2012 R2 (64-bit, excluding Server Core) 
  • Windows Server 2008 R2 SP1 (64-bit, excluding Server Core) 
  • Windows Small Business Server 2011 
     

Hardware

  • Dual-core processor recommended
  • 1GB free disk space
    2GB RAM or better recommended

Miscellaneous

  • Internet Explorer 8 or later


Supported Email Applications

  • Microsoft Outlook 2003+
  • SMTP/POP3 (Thunderbird, IncrediMail, Eudora, etc.)
  • SSL supported in Outlook only
     

Supported Web Browsers for HTTPS URL Protection

  • Google Chrome v79 or later
  • Microsoft Edge v79 or later
  • Mozilla Firefox v65 or later

Bugs Fixed in this Release

  • VPBAGENT-8881: Patch Management scans were failing to identify the currently installed version of Adobe Editing Suite
  • VPBAGENT-8797: Previous version of VIPRE Agent was failing to install on Windows 2008 R2 Server
  • VPBAGENT-8498: Installation failures occurring with VIPRE Endpoint Security Roaming installer
  • VPBAGENT-8684: Patch Management was installing an expired trial version of Nitro Pro
  • VPBAGENT-8406: Agent was detecting Windows Server 2022 as a previous version
  • VPBAGENT-8380: Exclusions were interfering with loginmein.com

Known Issues

Ticket Number Description/Workaround
VPBAGENT-40793

VIPRE Agent for Windows crashes unexpectedly during VTE (VIPRE Threat Engine) package update on Windows Server 2008 r2.

No workaround needed; service restarts automatically after 1-2 minutes.

VPBAGENT-40121

When using Google Chrome, if Malicious URL Blocking is enabled, remediation of malicious files is not complete and files may remain in the Downloads directory.

Workaround: VIPRE's layered security will continue to protect you. Ensure that you have Advanced Active Protection enabled.