Release Notes for VIPRE Agent - Apr 06, 2023

Written By Marissa Fegan (Super Administrator)

Updated at September 18th, 2023

Product release information for VIPRE Agent for Windows version 13.0.8352 on April 6, 2023.

What's New

Updates

April 6, 2023: VIPRE Agent for Windows v13.0.8352 is now generally available.

March 23, 2023: Custom build for VIPRE Agent for Windows version 13.0.8352 is released.

 

In the last several months, we've made many significant backend changes allowing VIPRE to continue communicating with the latest version of Microsoft Windows Security Center. As a result, it's important to note the following changes to our system requirements list. 

  • Windows 10 RS5 (32- & 64-bit) - Version 1809 must install Oct 2018 update; newer versions must install 9C (September 21, 2021) update
  • Windows 7 SP1 non-ESU (32- & 64-bit) - no longer supported
  • Windows 7 SP1 ESU - Must install May 2021 update
  • All other supported versions of Windows that are older than Windows 10 need to install 10B (October 12, 2021) update

See the System Requirements section below for a complete list of all system requirements.

Although this new agent has been tested carefully under a wide variety of conditions, out of an abundance of caution, we recognize that additional field testing is desirable before a significant launch. For this reason, we are asking YOU to please help us by deploying this new custom-built agent to test systems in your environment. This helps ensure that no problems will occur with the final release and that you will not experience any disruption to your production networks.

 

VIPRE Recommends

For new VIPRE Agent installs, Windows must be updated to the appropriate versions before attempting to install the VIPRE Agent.

If VIPRE Agent is already installed, we recommend verifying that the Windows upgrade media contains the required updates before upgrading Windows. For example, let's say your computer is running Windows 7 with the ESU update installed. Once the latest VIPRE agent is installed running on Window 7 and the version of Windows they are upgrading to should either have it out of the box or slipstreamed into the upgrade media

Special Instructions

 

Manage Agent Software Updates

VIPRE Cloud provides flexibility over the deployment of agent software updates, whether you want them automatically deployed to all of your endpoints, or prefer full manual control. In this article, we show you the options available and how to select the right amount of control for your needs.

As a VIPRE Cloud administrator, you are responsible for ensuring the best possible security posture of your business. By confirming that you are using the latest VIPRE agent software on all your devices, you know they're protected by the most current and robust defense VIPRE offers.

What are agent software updates?

Agent software updates are packages pushed to each of your endpoint devices. Agent software updates can range from including a few patches to a full version release with new functionality. VIPRE Security releases agent software updates as needed; from every few months to a few times a year.

Agent software updates are different from definition updates. Definitions are used by the VIPRE agent to identify and remediate malware and therefore, are automatically updated multiple times per day.

Unlike definition updates, software updates can be gated by VIPRE Cloud prior to pushing out to your endpoint devices. This gating process gives you the ability to review the agent update that is available and either a) immediately approve for production, or b) try in a test environment first and then approve for production.

Production and Test environments

We understand that administrators often prefer to test software updates in a secluded environment before deploying the changes to their production devices. The VIPRE Cloud agent software update process is built around this potential need for a Test environment vs. Production environment.

The agent software update process (show in the diagram below) is:

  1. Current agent software (e.g. v1.0) exists on your production devices
  2. An agent software update (e.g. v1.1) is released
  3. You can choose to either
    1. Test the new version by deploying it to your Test environment
      or
    2. Skip the test process
  4. At your convenience, you can then approve the new version. Production devices that are told to update will update to this new version.

Test before Approving for Production

As a Best Practice, you should test new software (including updates) on a group of devices that represent a cross-functional sampling of devices used in your production environment. When assembling a test group, consider hardware types and features; and the software and web sites your users access in their day-to-day activities.

The actual testing method of your devices is up to you. Generally, we recommend you perform enough activity on your various test devices to ensure you are confident with the end results. When you are satisfied the test period is complete, you can then approve the agent for use in production.

Split Test and Production Devices by Policy

Use policies to separate your production devices from your test devices to try out potentially disruptive changes in a non-production environment. Using a test policy to contain your test devices also enables you to easily test-deploy brand new VIPRE agent releases to this group.

A policy is simply a collection of settings that are applied to a group — one or more devices.

 

 

Generally, customers have separate policies for servers, workstations or laptops, and even for subgroups, like "Accounting laptops" or "Admin support machines". You can create policies for any group of devices that you like, and the devices belonging to that policy are all affected by that policy's settings.

Refer to Related Articles for more information on policies.

We recommend you leverage this policy-based approach to segment production devices from test devices. By creating a new policy (or policies) to affect only test devices, you have quickly isolated these machines as your test group.

By creating a test policy, changes applied to this policy affect only those devices — keeping your test activity apart from your day-to-day work (production) machines.

Therefore, at any time, you can have all of your production policies as well as one (or more) test policies:

  • Production policies - Your policies for your production machines. All of your 'normal' policies fall under this category. These policies use the production-approved version of the VIPRE agent — the latest version of the agent which you have approved, or auto-approved.
  • Test policies - A distinct set of test devices, isolated from production. You can deploy updated versions of the VIPRE agent to your test policies before you approve them for production.

In the adjacent visual example, all of our devices are grouped into a few different policies: Production (A, B, C) and Test.

Policy A contains some servers. Policies B and C are groups of workstations and laptops. Our Test Policy contains our test devices (a server, two workstations, and a laptop) that are not part of our production set.

How new Agent Software gets to Devices

The agent update process can be thought of in two parts:

  1. VIPRE Security releases a new agent update. Admins choose whether manually approve (and potentially test) the new software, or auto-approve it for use in production.
  2. The approved agent is deployed to devices. Any policies which are set to auto-update will deploy the new agent to their end devices. Otherwise, admins may manually deploy the update to devices.

The first step in the new agent software update is determining if you wish to manually approve updates, or have VIPRE automatically approve them for production.

Manually Approve

Choosing to manually approve each VIPRE agent software update is a method of forcing a stop (or gate) in the process. This can be used to enable the option to fully test agent software updates before they are deployed to your endpoint devices.

The Update Agent system setting is how you determine if new updates are automatically pushed to production, or "hold for clearance" by an admin.

If you choose to gate software updates - using the notify option - VIPRE Cloud displays a notification on the Deploy agents page each time an agent software update is available.

Automatically Approve

To skip the notification and approval process, use the auto-approve option. This tells VIPRE Cloud to go ahead and make a software update available immediately.

Controlling agent software updates to devices

The auto approve setting, in Update Agent, is combined with the policy-setting Automatically update VIPRE agent software to control whether updates are immediately pushed to all, some, or none of your agents.

Once new agent software is approved (either manually or automatically), the settings in each policy determine when that policy will push (or deploy) the update to its devices. Policies set to "auto-update" their agents will deploy the new software to each device as soon as possible. Policies NOT set to auto-update will need a manual deployment in order for their devices to receive the new software.

How to set the options for the right amount of control

There are two sets of options that work together to control the amount of automation used to deploy agent software updates to your endpoints.

  1. The option Auto approve or Notify first (manual approval) is set in System > Settings > Update Agent.
  2. The option to control the deployment of automatic updates to all, some, or none of your agents is set in Policy > Agent > Updates & Communication.

Refer to the table below to check which settings you should use.

 

Goal Description How to accomplish
Automatic approval and deployment No control over timing of deployment.
  1. Set System > Settings > Update Agent to Auto approve. Then select Update Settings.
  2. In each policy, navigate to Agent > Updates & Communication and enable the setting Automatically update VIPRE agent software. Then select Save

Repeat step 2 for each policy.

Automatic approval, combination of automatic and manual deployment; Partial control - immediate and manual deployment, based on policy.You want all VIPRE agent software updates to be automatically approved.You have some policies where auto-deploying the new agent to your devices is acceptable, but prefer to manually deploy the new agent to others.
  1. Set System > Settings > Update Agent to Auto approve.Then select Update Settings
  2. In each policy, navigate to Agent > Updates & Communication
    1. If you wish to automatically update devices on this policy, enable the setting Automatically update VIPRE agent software. Then select Save
    2. If you wish to manually update devices on this policy, disable the setting Automatically update VIPRE agent software. Then select Save

Repeat steps 2a/2b for each policy.

Automatic approval, manual deployment Greater control - all manual deployment. You want all VIPRE agent software updates to be automatically approved.You do not want any devices to have the new agent auto-deployed to them. You will choose when to manually deploy the new agent to all of your devices.
  1. Set System > Settings > Update Agent to Auto approve.Then select Update Settings
  2. In each policy, navigate to Agent > Updates & Communication and disable the setting Automatically update VIPRE agent software. Then select Save

Repeat step 2 for each policy.

Manual approval, automatic deployment Less control - immediate
deployment after manual approval.You want to manually approve and potentially test every VIPRE agent software update.Once approved, all of your devices may have the new agent automatically deployed to them.
  1. Set System > Settings > Update Agent to Notify.Then select Update Settings
  2. In each policy, navigate to Agent > Updates & Communication and enable the setting Automatically update VIPRE agent software. Then select Save

Repeat step 2 for each policy.

Manual approval, combination of automatic and manual deployment; Partial control - immediate and manual deployment, based on policy.You want to manually approve and potentially test every VIPRE agent software update.You have some policies where auto-deploying the new agent to your devices is acceptable, but prefer to manually deploy the new agent to others.
  1. Set System > Settings > Update Agent to Notify.Then select Update Settings
  2. In each policy, navigate to Agent > Updates & Communication
    1. If you wish to automatically update devices on this policy, enable the setting Automatically update VIPRE agent software. Then select Save
    2. If you wish to manually update devices on this policy, disable the setting Automatically update VIPRE agent software. Then select Save

Repeat steps 2a/2b for each policy.

Manual approval & deployment Full control - manual deployment after manual approval.You want to manually approve and potentially test every VIPRE agent software update.You do not want any devices to have the new agent auto-deployed to them. You will choose when to manually deploy the new agent to all of your devices.
  1. Set System > Settings > Update Agent to Notify.Then select Update Settings
  2. In each policy, navigate to Agent > Updates & Communication and disable the setting Automatically update VIPRE agent software. Then select Save

Repeat step 2 for each policy.

Troubleshooting

I received an email notification for a new agent. Where is the approval button?

Note - Coming Soon! The email notification for software agent updates will be coming soon! Until then, you can find the notification on the Deploy agents screen.

The Deploy Agents screen shows there is a new agent available and that action is required.

When there is an agent software update, VIPRE Cloud gives you two options:

  • Try on devices - enables pushing the new software version to test devices
  • Approve Version - accepts the software for use in your production environment

You may also select Download Agent Installer, which saves a copy of the latest version of the agent install package. This is intended for advanced manual testing.

How can I check which devices are running which agent versions?

There are a few ways to look at a list of the agent software versions you have distributed across your devices

  • Check the AGENT VERSION SPREAD section of the Dashboard
  • Look at the Devices screen or Device Registrations Report. You can sort your agents by version

I've approved the latest agent software update, but my devices are on an old version. What should I do?

  1. Check if your policies are set for auto-update
  2. Check the status of the outdated devices to see if they have deferred work pending
  3. For manual deployment, you can have a device update it's agent software in a few ways:
    • Schedule updates for the devices on the old versions
    • Manually push out the updates for each device

 

 

System Requirements

Component System Requirements
Endpoint Cloud Web-based Console

Web Browsers

  • Google Chrome
  • Microsoft Edge
  • Mozilla Firefox
  • Apple Safari
VIPRE Update Proxy
  • Computer with Network connection
  • Any desktop or server version of Windows
  • Microsoft .NET Framework 4.0 or higher
VIPRE Agent for Windows

Operating Systems

  • Windows 11 (64-bit)
  • Windows 10 RS5 (32- & 64-bit)
    • Version 1809 must have Oct 2018 update
    • Newer versions must have 9C (September 21, 2021) update
  • Windows 8.1 (64-bit) with 10B (Oct 21, 2021) update
  • Windows 7 SP1 ESU (32- & 64-bit) with May 2021 update
  • Windows Server 2019 (64-bit, excluding Server Core) 
  • Windows Server 2016 (excluding Server Core) 
  • Windows Server 2012 R2 (excluding Server Core) 
  • Windows Server 2008 R2 SP1 (excluding Server Core) 
  • Windows Small Business Server 2011 
     

Hardware

  • Dual-core processor recommended
  • 1GB free disk space
    2GB RAM or better recommended

Miscellaneous

  • Internet Explorer 8 or later


Supported Email Applications

  • Microsoft Outlook 2003+
  • SMTP/POP3 (Thunderbird, IncrediMail, Eudora, etc.)
  • SSL supported in Outlook only
     

Supported Web Browsers for HTTPS URL Protection

  • Google Chrome v79 or later
  • Microsoft Edge v79 or later
  • Mozilla Firefox v65 or later

Bugs Fixed in this Release

  • VPBAGENT-40303: Windows stop error was appearing randomly when a previous version of the VIPRE Agent was running during Windows Easy Transfer file transfers
  • VPBAGENT-8545: Previous version of VIPRE Agent was sometimes failing installation
  • VPBAGENT-40907: Drivers were left after uninstalling Agent
  • VPBAGENT-40862: Agent upgrades were creating duplicate AV/FW provider keys
  • VPBAGENT-40848: Agent delayed updating definitions until after the agent upgrade was completed
  • VPBAGENT-40845: There was an extra VIPRE folder in the programdata directory
  • VPBAGENT-40822: Offline package failed to apply
  • VPBAGENT-40794: PMAgent log was not being created after the initial service start up
  • VPBAGENT-40689: Custom Agent install directory was not being maintained after an agent upgrade
  • VPBAGENT-40417: Agent was reporting that definitions still needed to be updated even after having already updated them
  • VPBAGENT-40232: Persistent VIPRE Cloud Agent installation failures were occurring
  • VPBAGENT-7483: The ‘sbhips’ service was stopping after agent upgrade
  • VPBAGENT-3187: IPv6 trusted zones were not working 

Known Issues

Ticket Number Description/Workaround
VPBAGENT-40793

VIPRE Agent for Windows crashes unexpectedly during VTE (VIPRE Threat Engine) package update on Windows Server 2008 r2.

No workaround needed; service restarts automatically after 1-2 minutes.

VPBAGENT-40121

When using Google Chrome, if Malicious URL Blocking is enabled, remediation of malicious files is not complete and files may remain in the Downloads directory.

Workaround: VIPRE's layered security will continue to protect you. Ensure that you have Advanced Active Protection enabled.