These release notes contain important information you should know before installing the ZeroLock® Platform so please familiarize yourself with all the new features listed in this document.
ZeroLock Management Console v3.x now supports ESXi 6.7, 7.x, and 8. The ZeroLock agent also includes enhanced logging.
The ZeroLock Platform release has two components:
- ZeroLock Management Console (ZMC) v3.0.2
- ZeroLock Endpoint Agent (ZA) v3.0.3
For more information, see the following table of links:
To Learn About |
Go To |
Download this Release |
|
Prerequisites | Prerequisites for the ZeroLock® Management Console |
Installation Instructions |
|
Cumulative Build Notes | |
New Features and Capabilities
ZeroLock Management Console
Version 3.0.2 includes the following new features and capabilities:
Feature |
Description |
ESXi Support |
This build adds protection designed to stop malware on ESXi systems using the same base capabilities the ZeroLock platform brings to Linux. The protection is undeniable with the addition of ESXi-specific Lock Down rules and SSH MFA. Currently, the versions supported are 6.7, 7.x, and 8.x. |
Environment Specific Deployment Options |
ZeroLock now provides a simple option setting when deploying to different environments, such as ESXi or an air-gapped environment. No guesswork is required; the options are automatically configured for the administrator. |
ZeroLock Agent
Version 3.0.3 includes the following new features and capabilities:
NOTE: ZeroLock maintains the same efficacy and detection capabilities without internet or management console access. This capability is required for dark/air-gapped environments and certain embedded or IoT systems.
Feature |
Description |
ESXi Support |
ZeroLock now supports ESXi Hypervisor OS 6.7, 7.x, and 8.x. It protects ESXi by using a combination of File Access and program Access lockdown rules and Anti-Tampering and ransomware protection. |
Enhanced Logging |
The ZeroLock agent has been updated to provide comprehensive logging capabilities required to support large enterprise deployments. It has also been updated to use standard logging levels and formats easily consumed by SIEMs. |
Enhanced Precision Mode |
Precision mode allows a system administrator the ability to fine-tune the ZeroLock protection on a specific system or group of systems. Precision mode allows for controlled rollout to production systems. |
Endpoint Deactivation Status |
ZeroLock agent deactivation is now honored between system reboots, version upgrades, and agent re-installs. The endpoint must be reactivated manually. |
ZeroLock Lockdown Rules |
ZeroLock now provides one hundred and forty-six (146) Lockdown rules covering Linux, ESXi and Caldera targeted protection. |
Trademarks
ZeroLock and Vali Cyber are registered trademarks of Vali Cyber Inc. All other trademarks or service marks are property of their respected holders.
For information about the third-party software that is delivered with the product, refer to the third-party license file on your installation tar.gz that is specific to your release.
Legal Notice
The publication referencing this notice describes and/or represents products and services of Vali Cyber Inc. (“Vali”). It may contain trade secrets and proprietary information that are protected by various federal, state, and international laws, and distributed under licenses restricting their use, copying, modification, distribution, or transmittal in any form without prior written authorization of Vali. The publication is current as of the date of publication only. Changes to the publication may be made from time to time at the discretion of Vali. This publication remains the property of Vali. and must be returned to it upon request. The publication does not imply any commitment to offer or deliver the products or services described herein. The publication may include references to Vali product features that have not been licensed by you or your company. If you have questions about whether a particular capability is included in your installation, please consult your Vali services consultant. Although Vali strives for accuracy in its publications, any publication may contain inaccuracies or typographical errors, as well as technical inaccuracies. Vali shall not be liable for technical or editorial errors or omissions contained herein. Vali may make improvements and/or changes to the publication at any time without notice. Any references in the publication to non-Vali websites are provided for convenience only and do not serve as an endorsement of these websites. The materials at these websites are not part of the material for Vali products, and use of those websites is at your own risk. This publication may contain examples used in daily business operations that include the names of people, companies, products, and other third-party publications. Such examples are fictitious and any similarity to the names or other data used by an actual business enterprise or individual is coincidental.
This document is the property of:
Vali Cyber Inc.
529 Rookwood Place
Charlottesville, VA 22903
Feedback
If you have suggestions or comments for how we can improve our materials, send an email to: documentation@valicyber.com
Was this article helpful?