N-central 2024.6 Release Notes (GA)

Build Number: 2024.6.0.19 Last updated: 10/12/2024

What's New in 2024.6

Assets View and Ecoverse Experience

We continue to add great new features into Assets View to create a truly useful tool for faster and more efficient experience of using N-central.

You will start to see:

  • More data columns, including External IP, CPU (Speed and time and count), OS Install date, MAC addresses, logged in users, device status, and even some cloud information such as Azure Region, ID, size and subscription

  • Data visualizations that allow you to see an aggregate view of your data in summary (first will be donuts, and next is bar charts)

  • The ability to create and save different custom views of Asset View, allowing you to switch between them easily.

A preview available for on-premise partners.

With 24.6, our on-prem partners will be able to access Assets View for their N-central instances. If you have an on-prem instance, you’ll need to:

  • Upgrade to 24.6

  • Adopt N-able Login (this is also available with Entra ID support)

  • Opt into Analytics (to Enable Cloud Eventing)

An additional, incredible, value that Asset View provides is, if you have multiple N-central instances and they all meet the requirements above, you can use Asset View screen to access devices across your estate. You can see devices, and critical pieces of data, that may belong to a separate N-central instance from where you are looking at Asset View! This is a huge benefit for those who need to go between instances to find the devices.

Release 2024.6 also has Linux agent update bundled with our new modern unified agent. This new Linux agent will provide the capability for Linux devices to show within our new modern Asset View along with providing the foundational work for future releases.

See also

Assets View documentation

Assets View - On-Premise Getting Started Webinar-Recording

N-able Login (with or without Microsoft Entra ID)

N-able Cloud Security (Analytics & Asset Views)

Modern Agent FAQ

New in Analytics (Preview)

We're happy to announce that with N-central version 2024.6, Analytics now offers an improved ability to print reports to provide internal and external status updates, e.g. as part of your billing cycle. This will kick off in preview shortly after release and will roll out over the coming weeks.

Within Analytics, choose to interact with your data through dashboards via the Dashboards tab, or produce printed graphs and tables via the 'reports' tab.

This first release includes the following reports to help you and your customers understand the current status of their managed devices:

  • AV Status

  • Disk Usage Trending

  • Hardware Inventory

  • Last Boot-Up Time and Logged-In User

  • Managed Devices Summary

  • Managed Devices by OS

  • Network Assessment Report

  • Remote Control Usage

  • Service Availability Report

  • Software Inventory Report

To get started, navigate to Analytics > Reports, choose a report and set the parameters you want . Expand the export button in the top right corner and choose your preferred format.

You can export all reports to either Excel, CSV, Word, PDF, or PowerPoint so that you can share them as is, or further format them if needed.

Live Chat

Now, with our new Live Chat feature, you can connect directly with end users in real-time without the need to launch a full Take Control remote session!

Instantly ask questions, get the information you need, and confirm availability without delay. This seamless communication channel ensures faster responses, improves troubleshooting, and minimizes downtime.

Some of the many benefits Live chat brings include:

  • Instant Communication: Leveraging the existing Take Control engine, Technicians can immediately connect with the end-user through chat, allowing for real-time communication without any delays or extra steps.

  • Faster Issue Resolution: Live chat enables quicker exchanges of information, helping technicians diagnose and resolve issues more efficiently compared to traditional email or phone support.

  • Non-Intrusive: Unlike a phone call, live chat allows users to continue working while discussing the issue, minimizing disruption to their workflow.

  • Saves Time: Technicians can multitask during a chat session handling multiple inquiries or continuing to work on a problem without having to juggle phone calls or wait for remote sessions to initiate.

User Audit Log Export

We now allow the exporting of user audit records to a Syslog server! With this feature, many user actions within N-central can now be automatically exported to your syslog server in near real time. In turn, you can pull these logs from your syslog server into your SIEM product.

Sending audit data to a SIEM helps improve security by providing centralized visibility into security events, analyzing log data, detecting potential threats and provides the following benefits:

  • Audit Trail: Maintaining a log of user actions provides a clear audit trail. This is crucial for compliance with regulations in industries like finance or healthcare, where tracking data access and modifications is necessary.

  • Notifications and Alerting: The ability to generate real-time alerting of perceived threats allows for time-sensitive remediation and protection of your data.

  • Accountability: By tracking who did what and when, you can hold users accountable for their actions. This discourages malicious or careless behavior.

  • Security Monitoring: Logs can help identify unusual or unauthorized access patterns, enhancing your security posture by allowing for proactive monitoring and alerts

To learn more, see Configure Syslog Export.

N-central Agent Visibility

N-central All Devices and Device Details views now have the Agent Last Check-in date and time displayed for each device. This additional visibility into last check-in time significantly reduces the uncertainty about the time the device was last seen online. Partners can view, sort and filter and conveniently identify the devices that need attention based on the last time they checked-in.

We now have the status of Discovery checks ran on discovered devices including WMI, SNMP, NetBIOS, Admin Share, & SSH services. The status of each discovery check can be viewed for all discovered devices before device import. It enables our partners to self-serve and prevent the agent incompatibility issues and enables services needed for agent to function. It saves the effort and time needed to manually validate the device resources and communication access on each device individually.

Apple FileVault

We’re thrilled to announce our new FileVault Management feature, designed to help streamline your encryption management for macOS devices and keep your data safe. With FileVault Management, you can now:

  • Easily Enable and Enforce Encryption: Protect your organization’s data by enabling FileVault encryption across all macOS devices, ensuring compliance and data security.

  • Monitor Encryption Status: Gain real-time visibility into the encryption status of each device, making it simple to verify compliance and pinpoint any issues.

  • Manage Recovery Keys: Generate and retrieve recovery keys, allowing secure access to encrypted devices if needed.

Our FileVault Management solution provides centralized control over macOS device encryption, offering enhanced data protection and simplifying security management.

API Enhancements

We’re excited to introduce additional new APIs to N-central:

  • Patch Maintenance Window

    • Add New Maintenance Windows: Schedule and define new maintenance windows tailored to your needs.

    • Delete Maintenance Windows: Remove outdated or unnecessary windows to keep your patching schedule organized and efficient.

    • Retrieve Maintenance Windows: Quickly access detailed information about existing windows to stay informed and in control.

  • Warranty Information

    • Partners can Add, Modify, and Retrieve warranty information related to the asset they manage in N-central.

  • Agent Last Check-in Time

    • Visibility into Last Check-in time significantly reduces the uncertainty about when the device was last seen online. Using last check-in time our partners can instantly identify how long a device has been offline and determine if it needs attention.

Take Control - Chat and Video Chat Out-of-Session

N-central 24.6 introduces a new button in the Device Details, allowing technicians to start a chat, video chat, or screen sharing with end users without launching a Take Control session.

Key Features:

  • Chat, Video Chat and Screen Sharing: Communicate with end users directly via a popup launched from the Device View.

  • Out-of-Session Support: Start a conversation or video call without initiating a full remote session.

  • Quick Access: Provides a faster and more efficient way to interact with end users for troubleshooting or updates.

Take Control – Support Toolkit

N-central 24.6 introduces the Support Toolkit, designed to enhance the efficiency of technicians by providing a centralized location for storing and accessing scripts, applications, and other essential files. This feature allows technicians to quickly resolve issues by having all necessary tools readily available during remote sessions.

Key Features:

  • Centralized Storage: A dedicated toolbox where technicians can store scripts, applications, and other files needed for troubleshooting and resolving issues.

  • Easy Access: While connected to a remote machine, technicians can easily access and use items from the toolbox, streamlining the problem-solving process.

Take Control – Multi-Monitor Support

N-central 24.6 introduces Multi-Monitor Support, allowing technicians to seamlessly view and switch between multiple monitors during a remote session. This feature enhances productivity by providing a clear and accurate representation of the end user’s monitor layout.

Key Features:

  • Seamless Monitor Switching: View and switch between multiple monitors during a session with a single click.

  • Real Monitor Layouts: Thumbnails reflect the actual monitor positions configured by the end user, ensuring intuitive navigation.

Post GA releases

Here's a breakdown of our new features and updates released since the GA version of N-central.

Assets view reboot

Released: 10/12/2024

As part of Assets view, we are introducing the new Reboot feature, that technicians frequently need to reboot devices as part of their daily workflows, whether addressing IT helpdesk tickets, troubleshooting system issues, improving performance, deploying patches, installing software, or ensuring security compliance. The Reboot is performed by the UFA.

Upgrade Paths and Notes

To upgrade to N-able N-central 2024.6, your N-able N-central server must be running the following version:

  • N-able N-central 2023.4.0.32

  • N-able N-central 2023.5.0.12

  • N-able N-central 2023.6.0.9

  • N-able N-central 2023.7.0.10+

  • N-able N-central 2023.8.0.11+

  • N-able N-central 2023.9.0.25

  • N-able N-central 2023.9.0.26

  • N-able N-central 2023.9.1.30

  • N-able N-central 2024.1.0.17

  • N-able N-central 2024.2.0.18

  • N-able N-central 2024.2.0.20

  • N-able N-central 2024.3.0.16

  • N-able N-central 2024.4.0.11

  • N-able N-central 2024.6.0.16

Note the following when upgrading N-able N-central.

Tasks may expire if the agent on an associated device is being upgraded when the task is scheduled to be completed. Agent upgrades are normally short in duration but a delay may happen if a device re-start is pending.

Included updates in N-able N-central

N-central 2024.6 GA

If you are upgrading from a version prior to 2023.9, please note that because of the PostgreSQL upgrade included with N-central 2023.9, on-premise partners can expect this upgrade to take longer than previous upgrades may have. Please do NOT reboot your N-central server if the upgrade appears to be stuck. Please check the server console for error messages, or contact Support and they can advise on the progress and status of the upgrade.

N-central 2024.6 (build 2024.6.0.19)

Category Summary Issue key
Core Auditing Export Performance Improvements NCCF-428597

N-central 2024.6 (build 2024.6.0.16)

Category Summary Issue key
Core Update custom filters based on Last Checkin Date NCCF-415461

N-central 2024.6 (build 2024.6.0.15)

Category Summary Issue key
Core [Usability] Last Check-In column does not sort by last check in time NCCF-407333

N-central 2024.6 (build 2024.6.0.11)

Category Summary Issue key
Automation Manager Resolved exceptions occurring during new Probe installations on Windows Server (2019 or 2022) and Automation Manager upgrades for a smooth deployment experience. AM-4313
Automation Manager Removed leftover Pendo components from NC Agent/Probe installers to ensure that no residual files or configurations related to Pendo remain in the installation packages and cleared associated project artifacts to ensure a cleaner, more efficient installation process. AM-4320
Ecosystem Framework Automated the Uninstallation of Ecosystem Agent for DNSF Standalone Devices after migration with No Other Active Integrations to improve the configuration management and resource optimization. KUIP-5787
Ecosystem Framework Improved the Connection Thread Handling in integration-entity-service for efficient Entity File Retrieval to reduce waiting threads, and improve memory efficiency. KUIP-6005
Ecosystem Framework Improved the connection thread handling when communicating to our middleware service KUIP-6006
Ecosystem Framework Improved the connection thread handling when communicating to DNSF KUIP-6007
Ecosystem Framework Improved the connection thread handling when communicating to DNSF KUIP-6009
Core Verify System Specific Agent and Probe Software Downloads On System Level NCCF-64266
Core Agent Work to Correct SessionId Issues NCCF-64275
Core Resolved the Timeout Delay displayed on reports NCCF-72407
Core Auditing: Compliance to control access to the Syslog Audit Export feature for System/SO level users, ensuring that only users with the appropriate permissions can manage the syslog configuration. NCCF-80335
Core Verify Linux Agent hides SSH remote control username in nagent.log:'labadmin@AUT-0873:~$ ' does not contain '******' NCCF-104520
Core Stored XSS in device configuration summary report via device name [/configurationSummaryAction.do] NCCF-132417
Core Stored XSS Access Role NCCF-132423
Core Optimized Sorting Performance for Remote Control Column with High Volume of Take Control Devices NCCF-149918
Core Auditing: User Login (IDP users) Tracks when an Identity Provider (IDP) user logs into the system. NCCF-166675
Core Auditing: User Logout (IDP users) Monitors when an IDP user logs out of the system. NCCF-166693
Core Auditing: User Password Change Logs events when a user changes their password. NCCF-167438
Core Auditing: Events for User Edits Captures modifications made to a user’s profile details. NCCF-169226
Core Auditing User Logout Records instances when a user logs out of the system. NCCF-188639
Core Auditing: User Locked Audits when a user’s account is locked, preventing further login attempts. NCCF-190243
Core Auditing: User Unlocked Tracks when a previously locked user account is unlocked and restored to access. NCCF-190252
Core Auditing: User Enabled Records when a user account is enabled, granting access to the system. NCCF-190253
Core Auditing: User Disabled Monitors when a user account is disabled, revoking access to the system. NCCF-190254
Core Auditing: User Failed Login (with attempt count) Tracks failed login attempts by users, including the number of attempts made. NCCF-190256
Core Auditing: User Deleted Service Organization Logs the event when a user is removed from a service organization. NCCF-190262
Core Auditing: User Deleted from Customer Captures when a user is deleted from a specific customer account. NCCF-190269
Core Auditing: User Deleted from Sites Audits when a user is removed from access to specific sites within the system. NCCF-190271
Core Auditing: User Created Device (Manually Added) Records the creation of a new device by a user manually adding it to the system. NCCF-190272
Core Auditing: User Created Device (Auto-Imported via Discovery) Tracks the creation of devices automatically imported into the system through a discovery process. NCCF-190273
Core Auditing: User Created Unmanaged Device (Not Imported During Discovery) Monitors the creation of unmanaged devices that are not imported during discovery but added by the user. NCCF-190276
Core Auditing: User Deleted Device Logs the deletion of a device by a user from the system. NCCF-190282
Core Auditing: User Initiated Remote Control Session Captures when a user initiates a remote control session for managing or troubleshooting devices. NCCF-190287
Core Auditing: User Terminated Remote Control Session Records when a user terminates an active remote control session. NCCF-190293
Core Auditing: User Enabled Remote Control Option Tracks when a user enables remote control capabilities for managing devices. NCCF-190297
Core Auditing: User Disabled Remote Control Option Monitors when a user disables remote control capabilities for devices. NCCF-190309
Core Auditing: MFA Enabled for User Audits when Multi-Factor Authentication (MFA) is enabled for a user to enhance security. NCCF-192224
Core Auditing: MFA Disabled for User Logs the event when Multi-Factor Authentication (MFA) is disabled for a user. NCCF-192225
Core Auditing: User Role Created or Cloned Records the creation or cloning of user roles, allowing for role-based access management. NCCF-192231
Core Auditing: User Role Edited Tracks changes made to a user’s role, which affects their permissions and access. NCCF-192232
Core Auditing: User Role Deleted Audits when a user role is deleted, removing the associated permissions and access. NCCF-192271
Core Auditing: User Created Rule (Add/Clone) Monitors the creation or cloning of a rule by a user, which may govern system behavior or security settings. NCCF-192287
Core Auditing: User Edited Rule Tracks when a user modifies an existing rule, potentially changing system behavior or access controls. NCCF-192288
Core Auditing: User Deleted Rule Logs the deletion of a rule by a user, removing any configurations or restrictions associated with it. NCCF-192289
Core Fixed the Cancel Button Error on Password Change: Now Remains Functional Without Redirecting to Invalid Page or Greying Out NCCF-193285
Core Fixed the issue where the Maintenance Task was clearing the LWT Data Tables Due to Missing LWT Common Updates NCCF-204222
Core Fixed the issue where the PSA Customer Mapping Records would temporarily go missing until Refreshed or Changed NCCF-215993
Core Fixed the issue where the JobStatusList displayed an error: java.lang.NumberFormatException on Null String Parsing NCCF-220165
Core Updated the EDR Migration service to delete only EDR Ecosystem integration rules thus preventing the removal of all customer rules during migration NCCF-236471
Core [FEATURE]Allow User Auditing for Hosted instances NCCF-253293
Core Excessive Ticket Generation Causing Autotask Ticket API to Fail - Fixed with new Rest API NCCF-258511
Core Resolved Invalid Regular Expression Error (PSQLException) when parsing NCCF-259233
Core Corrected Customer and Site Validation for Unique Name Requirements NCCF-260926
Core Fixed the issue where N-central failed to update Probe on 'ASSIGN PROBE' update NCCF-261439
Core Resolved Compatibility Issue with Microsoft Windows Server 2022 Datacenter Azure Edition NCCF-261897
Core Fixed the issue where device_id column in BU_SRC_NC_EVENTS_CUSTOMPROPERTYVALUE was always null. NCCF-265642
Core Auditing:Add the IP of Originating N-central to the test message NCCF-265884
Core Endpoint to expose agent status NCCF-267247
Core Fixed Sorting Issue with License Usage Date Column in 'Professional Mode NCCF-275865
Core Resolved Reinstallation Issue with Take Control Due to Security.CryptographicException NCCF-283429
Core Stored XSS Via WMI Namespace NCCF-284080
Core Fixed Analytics Timeout and Crash Issue That Occurred After 10 Hours NCCF-284934
Core Fixed CSRF Token Validation Issue with Null Token or Request Error NCCF-289825
Core Automated N-central OS Package Update - July 01, 2024 NCCF-290738
Core Resolved Blank Content Issue on SSO Providers Page in Firefox NCCF-291091
Core Improved Performance for Faster User List Retrieval in User Management NCCF-291146
Core Updated theExternal Audit Event Severity to Reflect Defined Values for User Actions in Hosted Instances NCCF-296474
Core Fixed the EDR Upgrade failure after updating to N-central 2024.3 version NCCF-297292
Core Ensured Uniqueness for lwtintegrationid andservicetypeinlwt_endpoint_configuration Table. NCCF-297728
Core Extend Custom Protocol Handler for SSH remote control NCCF-300691
Core Extend Custom Protocol Handler for Telnet remote control NCCF-300696
Core N-central side changes to use Custom Protocol Handler for tunneling type remote controls from Windows devices NCCF-300700
Core Extend Custom Protocol Handler for Web remote control NCCF-301782
Core Extend Custom Protocol Handler for Custom remote control NCCF-301783
Core Duplicate device events from device history for ecoverse device sync NCCF-302865
Core Error installing Windows agent: The underlying connection was closed: Could not establish trust relationship for the SSL/TLS secure channel. NCCF-303947
Core Improved Performance for ServerEI:devicePropertyList NCCF-306859
Core Fixed Issue Preventing Deletion of Custom Services from Agent NCCF-308879
Core Restored Missing EDR Agent Health and Threat Status Checks NCCF-309710
Core Fixed Incorrect NULL Check in isDiscEncryptionEnabled Configuration NCCF-312161
Core Resolved API Pagination Issue: Results Now Load Beyond Page 1 NCCF-320904
Core [USABILITY] Show Agent Last Check-in Time on All Devices and Device Details views in N-central NCCF-325473
Core Added the device last check in times to our public REST API NCCF-325753
Core Fixed Incorrect Handling of Password Reset Link Calls in UserCreateEditAuditor Class NCCF-328551
Core Renamed the dms_apiaudit.log to dmsservice_apiaudit.log for Consistency with DMS Log Naming Convention NCCF-328616
Core Fixed the reported path traversal vulnerability NCCF-330842
Core User Deprovisioning event should only be processed if the user was marked as externally provisioned. NCCF-333850
Core Resolved Issue Preventing Monitoring Application to SQL Server 2022 Services NCCF-335163
Core Fixed Issue Where 'Update Asset Info When Finished' Was Not Passed to DMS NCCF-339624
Core Fixed the EDR Installation Failure on New Computers Due to Aborted LWT Installation NCCF-341448
Core Auditing: Added the Originating IP Address to All Audit Messages for better tracking and security analysis. NCCF-341468
Core Auditing: User login events now includes the user's access level, providing clearer insight into login activity. NCCF-341509
Core Create a new table in N-central for probe discovery access results and all its dependencies NCCF-342018
Core Auditing: The originating IP address is now stored to support detailed auditing and event tracking. NCCF-343120
Core UI-Show SNMP column on Import Discovered Assets screen NCCF-344565
Core Auditing: User role creation events are now merged into the auditing logs for improved visibility and tracking. NCCF-345693
Core UI-Show NetBIOS column on Import Discovered Assets screen NCCF-355441
Core UI-Show ADMIN Share column on Import Discovered Assets screen NCCF-355759
Core UI-Show SSH column on Import Discovered Assets screen NCCF-355760
Core UI-Show Registry Query column on Import Discovered Assets screen NCCF-355761
Core Fixed the error when changing the filter access from 'User Created at SO-Level' to 'Everyone' NCCF-356099
Core Front-End Implementation of XSS Mitigation Revisions[NCCF-36183 & NCCF-36179] NCCF-358905
Core Add new log file for agent/probe precheck NCCF-359544
Core Resolved the server freezing issue due to contention around Applicancetask DAO cache NCCF-359678
Core Modify WMI precheck to test using a WMI query NCCF-360055
Core Enhancement: External audit events from EDS/Fusion now include the email ID (using MSP SSO ID) and service organization name (using device ID) when they are missing, ensuring completeness of the event data. NCCF-361557
Core Audting:Reboot events are now captured and logged in N-central, providing better tracking of system activity. NCCF-363763
Core Auditing: Device modification messages have been updated for clearer and more accurate event tracking in the audit logs. NCCF-366221
Patch Management Order of patches not correct when ordering by CVSS value. PMCM-8942
Patch Management Resolved the issue where Unchecking "Manage Windows Patching"Altered the Windows Update Settings PMCM-9347
Patch Management Set Maintenance Window on Device PMCM-9386
Patch Management Get Maintenance Windows for device PMCM-9388
Patch Management Add Api-Service Rest End Point for Deleting existing maintenance window by scheduleid PMCM-9399
Patch Management Implement Deleting existing Maintenance Window by scheduleid (to support api service) into DMS PMCM-9425
Patch Management Change result of successful POSTs to something more descriptive than 'True' PMCM-9475
Patch Management Api-Service, GET method fails on non patch maintenance windows PMCM-9536
Patch Management N-central Delete api call for maintenance windows has wrong permissions PMCM-9645

Known Issues

These items for the current version of the N-able N-central software is composed of material issues significantly impacting performance whose cause has been replicated by N-able and where a fix has not yet been released. The list is not exclusive and does not contain items that are under investigation. Any known limitations set forth herein may not impact every customer environment. The N-able N-central software is being provided as it operates today. Any potential modifications, including a specific bug fix or any potential delivery of the same, are not considered part of the current N-able N-central software and are not guaranteed.

Agents & Probes

Description

Bug

Communication issues may be encountered for N-able N-central Probes installed on Windows servers that have multiple NICs. For more information, refer to 'KBA20020:ConfiguringAServer WithMultipleNICs' in the online Help.

67778

Automation Manager

AV Defender and Backup Manager – D2D

Description

Bug

Running Automation Manager Policies created using Automation Manager 1.6 or earlier may result in Failed to create an EndDate ... errors if the Policies are run on a computer using a different date format. This issue does not affect Policies created using Automation Manager 1.7 or later.

65712

Custom Services

Description

Bug

Custom services may appear as misconfigured when the system locale of the device is not set to English. For example, in Portuguese the default decimal in c#/.net is not a period, ".", it is a comma, ",". If you are having this issue, please contact N-able Technical Support.

65288

Core Functionality

Description

Bug

There is known issue with the Audit Export to Syslog where there have been reports of many Device Import audit records being generated many times when only one record should exist. NCCF-404136

Installing N-able N-central on Servers that have an Nvidia Video Card

Due to a bug in CentOS 7 with Nvidia's 'Nouveau' driver, installing N-able N-central on servers that have an Nvidia video card may result in the N-able N-central console showing a blank screen, or displaying an Anaconda Installer screen with an error message about the video card driver.

NCCF-11842

If you have the need to use Conditional Access Policies for your Azure AD/Entra ID linked users, there is a known issue that prevents your users from logging in. We have identified a workaround by using Custom (OpenID Connect) instead. To learn more, click HERE. NCCF-31030

HDM does not work with the 'Last 5 Tickets' widget.

NCCF-10855

Dashboards

Description

Bug

Modifying a Dashboard that is associated with a large number of services may cause performance issues when using the Firefox browser.

70326

PSA Integration

Description

Bug

In some instances, tickets closed in PSAs are not being cleared in N-able N-central. This is likely because the ticketing recipient profile in N-able N-central has Do not change the Ticket Status selected (in order to manually configure tickets). Then, when the ticket is removed in the PSA, N-able N-central will not be able to update or resolve the ticket's status and new tickets cannot be created for the same issue. Until a solution is available through the UI for this situation, the work around is to set a Return to Normal status and set a non-used status in the 'updatable statuses' section or set the same status as the return to normal one. This will cause N-able N-central to add a note to the ticket on return to normal but will not alter the ticket's status. This will allow the stale ticket check to remove the ticket from the system.

65620

UI

Description

Bug

When Cove Data Protection is installed on a device, the device details view will not light up the Cove icon in the features row correctly. NCCF-162108

After re-naming, the Names of files or Registry entries may not be displayed properly in the File System window and the Registry window of the Tools tab when using Internet Explorer.

68149