Release notes for version 81.1.1 of Netskope.
Affected Products:
Netskope
Affected Operating Systems:
Windows
Mac
iOS
Android
This update of Netskope contains New Features and Enhancements, Known Issues, and Fixed Issues. For more information, click the appropriate topic.
Category | Feature | Detailed Description and Benefits |
---|---|---|
Private Access | Steering Configuration Options | With the rollout of Netskope Release 81.1.1, NPA administrators now have additional steering configuration options for when the Netskope Client is detected as being On-Premise. When On-Premise, customers can choose to either enable or disable NPA functionality, and can also select from the same options when not On-Premise. If an Alternative Steering option (GRE, IPSec, and so on) is detected, NPA Administrators can also configure NPA to be enabled or disabled (default). |
Private Access | High Availability and Load Balancing | With the rollout of Netskope Release 81.1.1, all connected NPA Publishers are not treated as Active for High Availability and Load Balancing purposes. Also, customers now have the option of assigning up to 16 publishers to each private app definition. |
Category | Issue Number | Issue Description |
---|---|---|
Steering | 120299 | For devices running macOS 11 (macOS Big Sur): If the Netskope Client auto upgrades to 81.1.1 from 81.0.0 or an older version, the user is prompted to enter credentials to remove the DNS proxy. If the user cancels the credential prompt, the DNS proxy continues to exist in the user's system. The user must manually remove the DNS proxy from Network Preferences, or the Netskope Client prompts for credentials during system restart to remove the DNS proxy. If DNS proxy is not removed, there may be DNS resolution issues resulting in loss of network connectivity. |
Category | Issue Number | Issue Description |
---|---|---|
Netskope for IaaS | 116498 | The Compliance > Raw Findings page was not displaying data for the customized "Failing Since" column after export. This is now fixed. |
Platform Services | 116516 | Users with the Threat privilege View and manage can take Malware Details page actions Quarantine and Mark as safe. |
Private Access | 117652 | The Netskope Client NPA tunnel connects automatically after a network change. |
Steering | 115868 | macOS Big Sur support: The client looks at SNI in the TLS Client hello message and HOST in HTTP to detect the application to decide whether traffic should be redirected to the Netskope DC. |
Steering | 116047 | macOS Big Sur support: While the client establishes the tunnel with the Netskope DC, any application can now listen on any TCP port for macOS Big Sur. |
Steering | 116416 | macOS Big Sur support: The intermittent file upload failure is resolved for managed applications. |
Steering | 116788 | macOS Big Sur support: The client uses Big Sur Transparent Proxy Provider framework to manage outgoing TCP / UDP traffic. |
Steering | 118330 | macOS Big Sur support: Manual upgrade from 81.0.0 to 81.0.1 removes the DNS proxy. However, if the installed Netskope Client is version 80 or prior, admins must manually uninstall the DNS proxy from the operating system Network Preference. |
Steering | 119164 | macOS Big Sur support: The client supports the proxy hostname if it is configured on the endpoint. |
Steering | 119165 | macOS Big Sur support: The client prompts for user credentials to set a cert trust policy in the key chain for the Netskope root certificate if it is not already set. |
Steering | 119232 | macOS Big Sur support: When uninstalling the client on devices running macOS 11 (macOS Big Sur), users are prompted to enter their credentials twice to uninstall the Network extension app proxy, and to remove the Netskope Client. |
Steering | 115902 | The Netskope Client on Windows 1909 works without issue with managed application traffic if the tunnel is established over the loopback interface. |
Steering | 112285 | This release resolves the McAfee interop problem on macOS if the device comes out from long sleep and the Netskope Client UI stops showing the correct connect status. |
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.