Generic selectors
Exact matches only
Search in title
Search in content
post
page
How can we help?
Print

Release Notes

NP-View releases are divided into two groups:

  • Release Candidates introduce new features and go through the full QA process once a quarter.  The rollout of release candidates is staged to ensure product quality.
  • General Releases are release candidates that have gone through field testing and any critical issues resolved before releasing to the general population. General releases typically lag release candidates by a month or more.

Release candidates generally following the below schedule:

  • January for the Winter release
  • April for the Spring release
  • July for the Summer release
  • October for the Fall release

General releases do not follow a fixed schedule since they are driven by field testing and support requests. 

Below is the list of releases and the features / fixes in each release. Only the most current release available to a customer will be posted on the portal.  

If you have any question, please contact us at support@network-perception.com.

NP-View Desktop and Server – 2024

Bug Fixes, Enhancements
Please read the disclosure on Incremental Data Availability Across Workspaces and Views.
Improved the presentation of Vulnerabilities and Services from the info panel.
Improved NAT Rules to Show CIDR Instead of Object Group Name for Translated Address.
Improved the display of Fortinet interfaces to include the alias property.
Improved the performance when saving topology.
Improved the table highlighting for object group popovers on the access rules table.
Improved support for warnings in the risks and warnings report.
Added a connector and data parser for Claroty CDT to import assets.
Improved support for Ruggedcom RX1500 and Ruggedcom ROX devices.
Improved support for Fortinet with focus on 7.2 devices.
Improved the performance of the Cicso device parser.
Resolved an issue where L2 switch ports were being depicted as gateways.
Resolved an issue where IP addresses assigned to each L2 switch were improperly creating hosts.
Resolved an issue where Fortinet L2 VLAN’s were not set correctly for switch ports.
Resolved an issue where the nesting in a service group was not identified for Sonicwall.
Resolved an issue where exported workspaces were not visible to the Admin role.
Resolved an issue where NAT Rules were Incorrectly Showing ‘any’ as ‘Original Address’.
Resolved an issue where the Viewer role users could change device type.
Resolved an issue where the user was unable to Set Criticality for Host to None.
Resolved an issue where the Zone Segmentation Matrix was being enabled for Single Zone (requires at least two zones).
Resolved an issue where ‘ESC to clear’ banner was still present after switching views.
Resolved an issue where Summary reports were not updated with data from updated risks report.
Resolved an issue where Object Linking was not working for all Objects w/IP on the Topology.
Resolved an issue where Palo Alto Virtual Routers were being pushed as separate devices.
Resolved an issue where the Interfaces Tables in a view was not filtering out other devices in the workspace.
Resolved an issue where global objects were not properly displaying in the access rules table.
Resolved an issue where translated NAT addresses were showing up as an unmapped address.
Resolved an issue where the outbound highlighted paths were not displayed correctly.
Resolved an issue where deleting a device from the Home view was not deleting zones properly.
Resolved an issue where cancelling an analyze process could render the workspace unusable.
Resolved an issue where the Application set to ping for Palo Alto devices was generating an unnecessary risk alert.
Resolved an issue where the NERC-CIP report would not generate until after a Topology Save.
Resolved an issue where the NERC-CIP Wizard is not auto selecting EAP when attached to multiple EACMS.
Resolved an issue where comments were not retained when importing a .npx file from a version prior to 5.0.
Resolved an issue where deleting a view may make a Workspace unusable for another user (server only).
Resolved an issue where connector won’t upload to a Workspace when the Workspace is added connector creation (server only).
Moved the device delete option to the kebab menu.
Removed ‘est time remaining’ from background tasks.
Bug Fixes, Enhancements
This release contains several database architectural changes designed to improve system performance.
During installation, a database maintenance procedure will be performed which will:
> Remove topology history from the system freeing up to 60% of database and RAM.
> Remove all pre-generated table highlights.
> Remove all pre-generated risks and warnings data.
> Path Analysis has been improved to reduce RAM usage and resolve several issues with external path analysis where not all external gateways were included in the analysis. Upon next analysis run (data import into a specific view), the analysis results will include the previously omitted paths.
*** It is strongly advised to back up your NP-View database prior to upgrade as there is no going back to a previous version otherwise.
 For users of the OVF, we replaced CentOS7 with Ubuntu Server due to the pending end of life for CentOS7.
Added an Interfaces report for individual devices and workspaces.
Added a Routes report for individual devices.
Added a NAT report for individual devices.
Added a Zone Connectivity Matrix to show communication between zones.
Added a connector and data parser for Claroty CDT to import assets.
Added table highlighting to the connectivity paths table to identify interactive service ports.
> This feature must be enabled in the policy manager.
Added support for Cisco VACL’s and Static NAT from Route maps.
Added support for FortiSwitch Rugged devices.
Improved the visualization and performance of the connectivity matrix.
Improved the visualization and performance of the Risks and Warnings report and added linkage of rule risks to the access rules report.
> Note that the rule risk requirements have been updated and all previous risk alerts will be removed upon upgrade. 
> It is recommended that the risks and warnings table be exported before upgrade if information is to be retained.
> Also, the comment function has been removed from the risks and warnings table, the recommendation is to use the linked rules table to add comments.
Improved the visualization and performance of the Asset Inventory report.
> The comment function has been removed from the asset inventory report.
Improved the performance of the table highlighting function.
Improved the performance and usability of the Manage Views function.
Improved the performance and usability of the zone creation and management functions.
Improved the performance and usability of the Topology Map including, loading time, expand / collapse, and stepping stone workflow.
Improved the performance and memory requirements of the external path analysis.  See the KB for details of the analysis changes.
> For some customers this manifested itself as a process stuck at 93% which never finishes.
Improved support for Fortinet devices including tunnels.
Improved the performance of the save topology function.
Updated the workspace report to match the new interface, NAT, and Routes reports.
Resolved an issue with Fortinet where ISDB services used in rules were incorrectly formatted.
Resolved an issue where the Best Practice Report, Section 1.4, showed unmapped hosts.
Resolved an issue where disabling a table highlighting requirement or policy did not work.
Resolved an issue where the analysis would incorrectly discard legitimate peers from tunnel endpoints.
Resolved an issue where the analysis failed to translate fully qualified domain names nested groups.
Resolved several parsing issues with Fortinet devices.
Resolved an issue where importing host Aux Data did not import IP Addresses.
Resolved an issue where the desktop software would time out after 30 days and require reauthentication.
Resolved an issue where the desktop “Printer / PDF” function did not provide an option to Print.
Restored the workspace rename function.
Removed the comment feature from the risks and warnings and asset inventory reports.
Removed the comment count blue bubble from the topology and settings menu.
Removed the reset function for table highlighting as it is no longer needed.
Removed the SRC Criticality and DST Criticality columns from the Access Rules table due to loading performance issues.

NP-View Desktop and Server – 2023

Bug Fixes, Enhancements
Resolved an issue where scheduled connectors would not run unless logged into the connector group and upon logging in, all connectors were being run (server only)
Resolved an issue where some device manufacturers were being improperly displayed in the UI.
Resolved an issue where some users were prohibited from creating access rules and object groups comments when using LDAP authentication (server only).
Resolved an issue where transferring a workspace was not properly completing resulting in missing data in the info panel (server only).
Bug Fixes, Enhancements
Improved support for virtual routers associated with a virtual firewall in Palo Alto devices. Note that the improved support identifies additional interfaces which will add extra computational time to path analysis.
Improved support for Routes, Static/Dynamic NAT, Route Maps and VACL’s in Cisco devices.
Improved support for tunnels in Fortinet devices.
Improved support for IPSec tunnels in both star and meshed communities in CheckPoint devices.
Resolved an issue where some ports were missing in Fortinet FTD devices.
Resolved an issue where Rule & Object IDs are being duplicated causing reporting conflicts.
Resolved an issue where FortiSwitch devices were not properly parsed.
Resolved an issue where legitimate peers from tunnel endpoints were incorrectly discarded.
Resolved an issue where importing Host Aux Data did not display IP Address for an unmapped host.
Resolved an issue where the Notification manager displayed improperly requiring a refresh to clear.
Resolved an issue where connectivity paths in excess of 100,000 rows caused a view not to load.
Resolved an issue where the system log was not using a consistent time zone for tagging events.
Resolved an issue where repetitively exporting / importing a workspace caused the file to exponentially grow in size.
Bug Fixes, Enhancements
Added the capability to analyze rule usage from Palo Alto Next Generation Firewalls using the updated connector and Access Rules Table. See the Knowledgebase for details. 
Resolved an issue where naming was not enforced for connectors. The connector naming is now consistent with the naming of Workspaces and Custom Views (3-24 alphanumeric, hyphen, or underscore characters). If the user edits any existing connectors with an invalid length or characters, they will need to adhere to the updated naming convention before saving.
Bug Fixes, Enhancements
Improved support for virtual firewalls and virtual routers in Palo Alto devices with additional support for device selection in connectors and manual import.
Improved the Cisco parser to include serial port information.
Improved device type identification for Switches and Routers
Improved multiple parsers for preserving interface names and port ID.
Improved tunnel type identification for Fortinet devices.
Improved the coverage of address pool peering to better present tunnel peers.
Improved support for Fortinet VDOMS which have the same name on different devices
Improved the labeling on topology hosts and network nodes to display names by default and IP addresses on hover.
Improved the real-estate usage of the workspaces page to allow for more horizontal widgets.
Improved support for multi-vsys on Palo Alto devices.
Improved the performance of the analysis engine for large config files. Depending on file size and vendor we have seen up to a 30% reduction in processing time.
Resolved an issue where the version sorting on the Compare Path history function was not in descending order.
Resolved an issue where the topology may not refresh with new devices after a connector pull.
Resolved an issue where URI reserved characters were showing as percent encoded in asset inventory.
Resolved an issue where the contents of search boxes were not saved in access rules.
Resolved an issue where Alphanumeric naming was not enforced for connectors. This allowed users to previously name connectors with not approved characters. If the user edits these connectors they will need to adhere to the updated naming convention to save.
Resolved an issue with the Connectivity Matrix not refreshing after new configs were imported.
Resolved an issue where the System Log pause or download feature did not work properly.
Resolved an issue with License and Terms where setting a device as Invisible did not work as intended.
Resolved an issue for Fortinet devices where additional paths were shown for rules with destination zones.
Resolved an issue for Fortinet devices where source and destination bindings were sometimes incorrect in the Access Rules Table.
Resolved an issue with Fortinet parsing ports.
Resolved an issue where running “Stepping Stone Analysis” from the NERC-CIP wizard broke path highlighting
Resolved an issue where Step 4 of the NERC-CIP wizard would intermittently not load the path information.
Resolved an issue where Highlight Paths mode did not show “ESC to Clear” when paths were selected.
Resolved an issue where renaming a Workspace required a browser refresh.
Resolved an issue in the Workspace Report where the Access Rules table for Palo Alto devices was not sorting correctly.
Resolved an issue with the desktop edition where the list of exported workspaces did not persist.
Resolved an issue with the SonicWall parser which was erroring when setting binding groups
Known issue: saving a topology with a large number of tags & criticalities can be slow.
Known issue: loading or deleting workspaces when the system contains a large number of conditionally formatted access rules can be slow.
Known issue: loading a Panorama file with multiple firewalls, vsys and virtual routers can be slow to present the device selection list.
Known issue: loading the devices from a ChecPoint R80/R81 connector for device selection can be slow due to CheckPoint API issues.

 

Bug Fixes, Enhancements
Resolved an issue where NP-View Desktop would not start properly on Windows Server 2016.

 

Bug Fixes, Enhancements
Added a CiS Benchmark Policy for Juniper
Added support for rules with action trust bypassing other rules for Cisco Firepower
Added experimental parser support for FS Switches
Added alphabetical sorting to the connectors page
Improved the performance of the device information panels
Improved the performance of the Connectivity Paths Table and linked the Path Table to the Access Rules Table for visibility. Note that comments are no longer available for the Connectivity Paths table.
Improved the performance of the backend system manager and webserver
Improved the Cisco parsing grammar to support service-object referencing IANA ports by name
Improved the ability for the Cisco parser to identify device types
Improved the loading animation to show status updates
Improved the ability for parsers to detect mis formatted xml files and log errors
Updated the Service Risk Policies and Highlighting to exclude Ping.
Upgraded the NERC-CIP ERT export to v7 and the Asset Column Dropdown options in ERT > BES Table
Resolved an issue to preserve the sequence order from the XML data for Panorama
Resolved an issue where the criticality of hosts were not being updated in the Access Rules Table
Resolved an issue where MAC addresses were not displaying
Resolved an issue where internally generated NPV_ interfaces were showing in the UI
Resolved an issue where some path highlights were missing.
Resolved an issue where Interface names in NERC CIP Wizard do not match names in Access Rules modal
Resolved an issue where the Access Rule config line numbers were incorrect (desktop only)
Resolved an issue where the Object Groups comparison bean count didn’t match the rows in the table
Resolved an issue where all devices from the same device group in the Panorama connector retrieve device list were not showing
Resolved an issue where the asset call on home view returned a list of interfaces instead of assets
Resolved an issue where historical comments for removed Access rules Object groups were not displaying in compare mode.
Removed the pin/unpin, arrange in circle and expand/collapse icons from the topology map (they are available by clicking on a node and using the kabab menu on the info panel)

 

Bug Fixes, Enhancements
Resolved an issue where retrieve device list for the Checkpoint connector was not working.
Resolved an issue where the Risks and Warnings list in the Best Practice report did not match the Risks and Warnings Modal.
Resolved an issue where the Hostnames Node Count in Section 1.4 of the Best Practice Report was incorrect.
Resolved an issue with the NERC-CIP Excel Export where the Critical Assets Tab was displaying errors.
Resolved an issue where opening the Rules/Groups modals before the map loads causes an infinite re-render.
Resolved an issue where the Viewer Role could hide, add and delete comments in change tracking; add standard comments to access rules and object groups and can click ‘create new view’ button in Manage Views
Resolved an issue where the Name of New View field becomes unselectable (Windows Desktop)
Resolved an issue where Workspace Report MD5 Checksums did not match the files.
Resolved an issue where some NAT Rules are missing translation in the Workspace Report.
Resolved an issue where the CheckPoint R80/R81 Connector was unable to fetch configs (Server)
Resolved an issue where selecting Generate NERC CIP Report from Summary Reports did not include Topology Screenshots
Resolved an issue where the exported Topology Map PDF was Missing Zone Names
Resolved an issue where the Access Rules and Object groups modals did not refresh after switching to Comparison mode.
Resolved an issue where the NERC CIP Report page becomes unresponsive and crashes the application for large views.
Resolved an issue where renaming a custom view breaks linkage to assigned zones
Resolved an issue where Clear All Filters and Reset All Settings did not reapply the default sort order.
Resolved an issue where the number of paths in the workspace and Workspace Report did not match.
Resolved an issue with the incorrect number of in access rules for Fortinet devices.
Resolved an issue with the incorrect display of rule services for Fortinet devices.
Resolved an issue where the Access rules table was missing policies for SonicWall devices.
Improved the Cisco parser to extract radio port attributes from statement “interface dot11Radio X”
Improved the Cisco parser to create zones from security level interfaces.
Improved the Cisco parser to create port-channel and sub-interfaces with type virtual.
Improved the Cisco parser to preserve interface names and port IDs.
Improved the Cisco parser to display a default gateway off of a BVI interface on the topology map.
Improved the Cisco parser to parse SNMP server hosts.
Improved the rendering of the Access Rules and Object Groups modal reports
Added a table for Rules without Descriptions to the Best Practice report.
Added the ability to show NAT Rule translation “any” in workspace report
Added a parser for the XML output of the SEL-3620
Removed conditional highlighting from Access Rules Service column for ICMP any to any.

 

Bug Fixes, Enhancements
Resolved an issue where importing a .NPX file or access rules table with comments resulted in improper loading of the data into NP-View.
Resolved an issue where the Workspace report was not filtering the risks and warnings for the open workspace and the count of interfaces did not include hidden management networks.
Resolved an issue where the NERC-CIP report would not generate when a large quantity of access rules were present in the workspace.
Bug Fixes, Enhancements

As of this release, the Essential Desktop and Enterprise Server editions are no longer being offered.  NP-View is offered in a desktop edition for Windows and a Server edition for Linux.

Released Generation 2 of Connectivity Path Analysis which includes:

  • Added external analysis to include devices previously contained in ‘unmapped’ into the analysis.
  • Improved order of operation for Cisco devices, particularly in ingress processing and egress filtering steps.
  • Improved handling of NAT rules, particularly the bi-directional NAT rules and twice NAT rules.
  • Added logic to transform destination range 0.0.0.0-0.0.0.0 to a wildcard for Cisco. This improvement can cause an increase in the number of paths for Cisco configs that use the 0.0.0.0-0.0.0.0 constructs, usually seen in wildcard permissions for web services.
  • Improvements in handling routes including:
  • Allow allocation of destination space to routes leading back to ingress.
  • Validation that all used routes are listed in the paths output and are unique.
  • Ensuring that route names are unique across devices.
  • Allow ranges to pass through the default route through rerouting.
  • Improvements to the inclusion of routes through the default interface.
  • Improvements in paths through gateways:
  • Whether the search is launched by choosing a peer or a gateway, any paths that result will have the first device in the path be the gateway and have the peer’s ID be listed as the ‘include’ on the Path EndPoint describing the start.
  • Limit networks launched from the gateway as a source to be dominating peers. The peer can only get back to the device (firewall) that directs routes to it.
  • Improved recognition and handling of border gateways.
  • Improved computations of VPN and tunnel paths for Cisco firewalls.
  • Improved computation of independent paths.
  • Improved the treatment of parent and child networks.

Improved NERC-CIP wizard workflow to include any:any interfaces when using external analysis.
Improved NERC-CIP report topology snapshots to include in-scope hosts.
Improved the Palo Alto and Cisco parsers to resolve specific customer issues.
Added analysis description to View Names to indicate type (standard or external) in manage views and view selector
Added NAT table in Workspace Report
Resolved an error for RuggedCom RX1500 performing analysis to target node
Resolved an issue where the Rule Policy destination service ‘any’ rule triggered a risk for the any to case. The update now restricts the risk to ‘any to any’ cases.
Removed the traces function from device info panel
Removed the single device Drilldown option from home view right click menu (use view manager)
Removed the Connectivity matrix from Info panel on Home view (still available from within custom views)
Removed the device rename option from the device info panel.
Resolved an issue where the SSH connector returns success even with a bad password when testing the connector (Server Only)
Resolved an issue where the SSH connector returns success even with a bad password (Server Only)
Resolved several access related issues to the viewer role (Server only)

 

Bug Fixes, EnhancementsEssential DesktopProfessional DesktopProfessional ServerEnterprise Server
Resolved an issue where standard comments were missing from the Workspace Report.XXXX
Resolved an issue where renaming a Drilldown view caused the view to not load.XXXX
Resolved an issue where the criticality of Hosts was not being updated in the Access Rules Table.XXXX
Resolved an issue where Views could be created with zero devices selected.XXXX
Resolved an issue where the access rules and object groups compare function were not filtered to the active device.XXXX
Resolved an issue where disabling a standard policy was not disabling the policy.XXXX
Resolved an issue where Palo Alto host IPs were not properly linking from the Access Rules and Object Groups table.XXXX
Resolved an issue where the Export Map function was not displaying zones.XXXX
Improved loading performance of the main menu.XXXX
Resolved an issue where Palo Alto 850 VLAN interface IP Addresses are not detected.XXXX
Resolved an issue for Checkpoint R80 with Parse bond interfaces/link aggregation.XXXX
Improved support for Fortilink protocol to depict layer2.XXXX
Resolved several issues where SonicWALL configurations were not loading.XXXX
Resolved an issue where Compare Path History was erroring when loading the difference table. XXX
Resolved an issue where updating a connector triggers the connector to run.  XX
Resolved an issue where Connector Groups would not load after upgrading to 4.1.0  XX
Resolved an issue where running an on demand connector ran all active connectors  XX

 

Bug Fixes, EnhancementsEssential DesktopProfessional DesktopProfessional ServerEnterprise Server
Replaced the Access Rules and Object groups table reports with a new technology that provides for faster rendering and support for larger workspaces and configuration files. The new report contains upgrades for the following: comparison, comments with inline editing and history, conditional formatting, import/export, topology linking to devices. The Access rules table now supports Object group visibility and duplicated rules.XXXX
Replaced the ‘Manage Zones’ function with a new technology to improve performance.XXXX
Improved support for Fortinet devices including support for internet services in policies, hardware switches, virtual-switch blocks and the “Forti link” protocol, to depict layer 2.XXXX
Resolved issues with Cisco devices where NP-View was not identifying split tunnels and corresponding ACL and was throwing an error when parsing ipv6 object “subnet ::/0”.XXXX
Resolved an issue where Sophos v19 was not properly categorized.XXXX
Resolved several issues with the sanitizer not supporting devices properly.XXXX
Increased the default number of devices within a custom view to 25. XXX
Replaced the SMB connector with a new technology that improves connector reliability and folder recursion.  XX
Removed the polling limiters from the notification manager.  X 
Resolved several issues when supporting HA pairs (Connector and Risks and Warnings)   X

 

Bug Fixes, EnhancementsEssential DesktopProfessional DesktopProfessional ServerEnterprise Server
Resolved an issue preventing the Windows Desktop Edition from starting after installation.XX  
Added function to manually save the topology map for admin and workspace admin user groupsXXXX
Improved the parser logic and support for Fortinet devices; ISDB services in rules, objects of type ‘interface-subnet’, address group Wi-Fi address with no static IP address and Mismatched VDOM in rule/service associationXXXX
Added support for dynamic filters found inside address objects for Panorama devicesXXXX
Improved support for Palo Alto 850XXXX
Resolved issues where the comments don’t persist for Object Groups or Risks & Warnings reports and the comment timestamp becomes “N/A” after closing report.XXX 
Implement logic to provide additional granularity for session timeout and changed the default to half hour if session length is set to 0.  XX
Improved Panorama connector logic and support for Fortinet FortiManager devices  XX
Enhanced the Source, Destination and Service columns in the Access Rules table to display and export Object Group details   X
Added support for the licensing of active / passive HA groups for firewalls   X
Improved the comparison function for Access Rules and Object Groups   X

NP-View Desktop and Server – 2022

 

Bug Fixes, EnhancementsEssential DesktopProfessional DesktopProfessional ServerEnterprise Server
Added function to manually save the topology map for admin and workspace admin user groups   X
Improved the parser logic and support for Fortinet devices; ISDB services in rules and objects of type ‘interface-subnet’   X
Added support for dynamic filters found inside address objects for Panorama devices   X
Implement logic to handle floating point values for session length and default to half hour if session has been set to 0.   X
Fixed connector logic and support for Fortinet FortiManager devices   X
Enhanced the Source, Destination and Service columns in the Access Rules table to display and export Object Group details   X
Added support for the licensing of active / passive HA groups for firewalls   X

 

Bug Fixes, EnhancementsEssential DesktopProfessional DesktopProfessional ServerEnterprise Server
Added upgraded modal reports for Access Rules and Object Groups with improved display performance.  Also includes  custom meta data field capability with history and export / import and data synchronization capabilities.   X
Added the capability to create custom risks and warnings within policy manager.   X
Added the capability to create custom conditional formatting within policy manager for modal reports.   X
Improved the NERC-CIP report with better support for Palo-Alto devices and improved Access Rules modal report.   X

 

Bug Fixes, EnhancementsEssential DesktopProfessional DesktopProfessional ServerEnterprise Server
Enhanced Path Analysis table function; clicking on device name opens Access Rule modal, pre-filtered to display only the line corresponding to the IP/line/deviceXXXX
Improved the performance of the topology save functionXXXX
Added conditional formatting to applicable sections of the NERC-CIP summary reportXXXX
Added Path Block Analysis: take two hosts/ two networks/ or one host and one network and troubleshoot if the connection between is blocked, and if so why  XX
Added new default requirements to perform conditional text and cell formatting; Action – Permit/Deny, Source – Any, Destination – Any, Service – Any, Risk – None, Risk Criticality – NA, Enabled – True/False  XX
Improved Policy Manager functions; When creating requirements all logic rows will follow the operator of the first row; AND/OR. Invalid operators selection will be disabled in all rows but the first row.  XX
Improved Panorama connector’s logic for device state selection in configuration manager; active / all. All includes both active/passive routing devices  XX
Updated system logging with additional information when modifying custom fields in Access Rules or Object Groups   X

 

Known defects that may exist + Plan for resolution

  • When upgrading from previous versions (specifically v3.2.2 or v3.2.5) to v4.0.6, comment data within the Asset Inventory report from these previous versions will not be preserved nor visible in this latest version.
    • Note: Please be aware that there are currently no plans to provide backwards compatibility for these specific versions.
    • For additional information, or further questions, please reach out to support@network-perception.com
Bug Fixes, EnhancementsEssential DesktopProfessional DesktopProfessional ServerEnterprise Server
Fixed an issue where the Object Group table displayed internal names instead of protocols and ports for the Value columnXXXX
Fixed a parsing exception and improved parsing support for HP devicesXXXX
Added ability to copy standard fields for Access Rules and Object GroupsXXXX
Added an “Alias” column to the interface table for Palo Alto devicesXXXX
Added “Checked for Updates” to System MenuXXXX
Improved the View Manager menu to allow users to select all devices when creating a viewXXXX
Improvements to the creation and navigation of Topology viewsXXXX
Improved support for Cisco Remote Access TunnelsXXXX
Added function to include topology snapshots to the NERC CIP reportXXXX
Improved the connector logic and support for Checkpoint devices  XX
Improved connector usability by combining the ‘Test Credentials’ and ‘Test Connector’ buttons during set up of new connector  XX
Fixed issues that resulted in connector errors when a user clicked either the test connector or retrieve device list buttons during new set up or editing of connector  XX
Enhanced Policy Manager functions; at-a-glance view of a policy enabled/disable state and text/styling changes on Risks & Warnings and Table Highlighting tab  XX
Improved the connector logic and support for Panorama devices  XX
Enhanced Policy Manager functions; custom requirement editing and cloning   X

 

Known defects that may exist + Plan for resolution

  • When upgrading from previous versions (specifically v3.2.2 or v3.2.5) to v4.0.6, comment data within the Asset Inventory report from these previous versions will not be preserved nor visible in this latest version.
    • Note: Please be aware that there are currently no plans to provide backwards compatibility for these specific versions.
    • For additional information, or further questions, please reach out to support@network-perception.com
Bug Fixes, EnhancementsEssential DesktopProfessional DesktopProfessional ServerEnterprise Server
Resolved miscellaneous issues in NERC-CIP report generation and exportXXXX
Enhanced background task functions; clicking on active task spinner opens background task modal, clear/cancel individual tasks and vertical scroll functionalityXXXX
Improved the stylings of the View Manager; added the search bar for devices, hovering over the saved custom view displays the device names included in the custom view. Added view/device countsXXXX
Implemented logic to set secure cookies never to expire for desktop edition. Set cookie expiration per customer (default = 30 days) for server editionXXXX
Optimized policy performance by running policies only when necessary. Default policies in serial instead of parallelXXXX
Improved disk recovery when there is less than 200 mb of disk availableXXXX
Added “Internal” column to the Object Groups modal and resolved “Internal” Object Group filteringXXXX
Improved support for Juniper devices such as rules and groups with wildcard IP addresses, routes via multiple gateways, multiple mapped IPs in NAT rules and updated parsing of source NAT to read destination address translation and updated Juniper predefined services listXXXX
Added Strict-Transport-Security to default HTTP response headers to Web servers  XX
Improved Panorama connector’s logic for device selection in configuration manager  XX
Added “Manage Connectors” to System Menu  XX
Added a “From Address” optional field in the Configure Service tab in Notification manager to override SMTP server’s rejection when a non valid email address is provided  XX
Added a new SMB connector under Volume Share in NP-Connect; SMB Date Folder Strategy   X
Added the synchronization of metadata ‘custom fields’ across same object groups for users and workspaces   X
Introduced Policy Manager functions; Enterprise users can now create custom policies and requirements. Numerical comparison operators can now be used in custom requirement logic to find things like for example devices > zero   X
Enhanced Policy Manager functions; selecting a policy loads the content immediately, changed order of logic for new requirement and text/styling changes on Table Highlighting tab   X
Enhanced the Access Rules and Object Groups with the addition of custom fields for user generated content   X

 

Known defects that may exist + Plan for resolution

  • When upgrading from previous versions (specifically v3.2.2 or v3.2.5) to v4.0.6, comment data within the Asset Inventory report from these previous versions will not be preserved nor visible in this latest version.
    • Note: Please be aware that there are currently no plans to provide backwards compatibility for these specific versions.
    • For additional information, or further questions, please reach out to support@network-perception.com
Bug Fixes, EnhancementsEssential DesktopProfessional DesktopProfessional ServerEnterprise Server
Resolved an issue where the line numbers displayed in Access Rules tables did not match the configuration file importedXXXX
Improved the path analysis, including NAT and egress functions for Cisco routing devicesXXXX
Improved the parsing of route-based IPsec vpn tunnelsXXXX
Resolved an issue where interfaces relying on variables defined in template stacks were not properly parsedXXXX
Resolved an issue where the risk and risk category columns in the access rules table displayed null valuesXXXX

 

Known defects that may exist + Plan for resolution

  • When upgrading from previous versions (specifically v3.2.2 or v3.2.5) to v4.0.4, comment data within the Asset Inventory report from these previous versions will not be preserved nor visible in this latest version.
    • Note: Please be aware that there are currently no plans to provide backwards compatibility for these specific versions.
    • For additional information, or further questions, please reach out to support@network-perception.com
  • When updating to 4.0.5, any connectors set to “on demand” will need to be changed to a specific polling time. Once the polling time is changed to one day (recommend choosing one day or longer) and the connector is saved (update connector button), users can pause the connector and use the on demand button as usual.
    • Plan for resolution: This is planned to be resolved with the release of NP-View v4.0.6.
Bug Fixes, EnhancementsEssential DesktopProfessional DesktopProfessional ServerEnterprise Server
Improved both the parser logic and support for Cisco, Juniper, and Panorama devicesXXXX
Enhanced the arrange button functionality to realign and display devices in a more user friendly visualizationXXXX
Updated background task logic to calculate and display a more accurate reflection of the percent complete for a task that is processingXXXX
Enhanced smart search functionality to highlight unmapped nodes after a search for them is executedXXXX
Improved the import process to resolve the anomaly related to auxiliary data not saving when included in custom views XXX
Enhanced the import process to resolve the anomaly related to device interfaces being misappropriately excluded  XX
Resolved an issue where users could not view Access Rules data within the info panel when installing NP-Live with Radius authentication  XX
Improved the connector logic and support for Checkpoint R80 devices  XX
Resolved an issue where no path details were displayed when reviewing inbound connectivity through a zone   X

 

Known defects that may exist + Plan for resolution

  • When upgrading from previous versions (specifically v3.2.2 or v3.2.5) to v4.0.4, comment data within the Asset Inventory report from these previous versions will not be preserved nor visible in this latest version.
    • Note: Please be aware that there are currently no plans to provide backwards compatibility for these specific versions.
    • For additional information, or further questions, please reach out to support@network-perception.com
  • After importing data for Cisco or FortiGate devices (v6 and v7), the associated Risks & Warnings that generate afterwards are intermittently pointing users who further review them to non-corresponding locations in the provided config files. Also, for Cisco devices specifically, the associated Risks that generate afterwards are displaying duplicate data.
    • Plan for resolution: This is planned to be resolved with the release of NP-View v4.0.5.
  • After running table highlighting policies, fields that do not display data under the Risk and/or Risk criticality columns within the Access Rules report are being highlighted erroneously.
    • Plan for resolution: This is planned to be resolved with the release of NP-View v4.1.0.
 Essential DesktopProfessional DesktopProfessional ServerEnterprise Server
Updated NP-View Essential Desktop to include correct compliance module based on license keyX   
Fixed an issue where the compliance framework did not appear when creating a new workspace after NP-View Desktop was restartedX   
Enhanced false positive risks/warnings displayed for Palo Alto Intrazone RoutingXXXX
Fixed an issue where the Workspace Report displayed internal names instead of interface names for the binding/source/destination and service columns in the Access Rules sectionXXXX
Fixed an issue where the size of the devices was difficult to view on the topology map due to an auto zoom out in existing workspacesXXXX
Fixed an issue where importing Palo Alto configuration files was displaying duplicate devicesXXXX
Improved parser and categorizer support for Panorama interfacesXXXX
Fixed an issue where the topology map was not centered when exporting the topology map to Visio or pdfXXXX
Fixed an issue where the incorrect nodes were displayed for device interfacesXXXX
Fixed an issue where the radial buttons to unpin/pin, collapse, and arrange peers did not appear after clicking on a specific nodeXXXX
Added Best Practice Report to the Summary Report function within the NERC-CIP and PCI Workspaces when the Best Practice Module is licensedXXXX
Enhanced view menu panel functionality so that it no longer auto closes after saving an edited custom viewXXXX
Enforced naming parameters when creating/renaming custom views, workspaces, and zonesXXXX
Fixed an issue where zone criticality colors were misapplied to Auto Generated ZonesXXXX
Fixed the Panorama configuration file notification messaging that previously indicated to users 0 devices were imported to now indicate and display the successfully imported devicesXXXX
Improved Panorama configuration file parsing to optimize the display of the correct device namesXXXX
Fixed an issue where unconfigured vsyses Panorama firewalls were not being filtered out and displaying as additional devices on topology mapXXXX
Removed hostname column from Asset InventoryXXXX
Fixed an issue where the display of the count of the number of dependents under a given network within the info panel was incorrect.XXXX
Fixed an intermittent issue where importing configuration files over 20 MB caused the application to lag and not execute import processesXXXX
Added SMB-Legacy and SSH connectors  X 
Fixed an issue where connectors were not functioning as expected after resolving all previously identified errors  XX
Added the Field Names (listed below) to the SSH Connector Type. These include: Path on Remote Host, Authentication, File name include filter, File name exclude filter and File Description Key  XX
Increased the width of the display bubble that shows Checkpoint and FortiManager connector types so that text no longer exceeds past the end of bubble  XX
Resolved an issue where on demand connectors were rerunning upon server restart  XX
Enhanced connector related authentication  XX
Fixed an issue that was resulting in connector errors when a user clicked either the test connector, test credentials, or retrieve device list buttons during set up   X
Resolved an issue where a false positive warning message displayed within the new connector setup window and indicated that no device list was retrieved upon creating a Panorama connector   X
Improved messaging that indicates successful connection when adding a new connector and testing connector credentials   X
Fixed an issue where clicking on “Generate NERC CIP Report” now displays the report in the same tab and no longer in a new one for NP-View Server Tab   X
Fixed an issue where the ability to add comments to devices with no comments was previously disabled when comparing data in Access Rules   X
Fixed an issue where not all Default Policies and Table Highlighting dropdown options were appearing within Policy Manager   X
Fixed an issue where the topology map did not update when adding a new connector within a new workspace   X
Fixed an issue where clicking the escape button did not close the Policy Management screen   X
 Essential DesktopProfessional DesktopProfessional ServerEnterprise Server
Increased the view limit from 1 to 15 to NP-View EssentialX   
Resolved an issue where the Export function was missing on the Essential/Professional desktop edition in 4.0.0XX  
Rebranded the naming of the diagnostic download files from NP-Live to NP-ViewXXXX
Resolved miscellaneous issues in the NERC-CIP WizardXXXX
Improved the usability of the workspace page; disable Add Workspace button when limit has been reached and provide error message when limit has been reachedXXXX
Added title to ALL table components in the NERC-CIP Reports when exporting to ExcelXXXX
Resolved an issue where the NERC-CIP Wizard displayed mismatching dataXXXX
Resolved an issue where the Auto Generate Zones doesn’t workXXXX
Updated the Category color for “CIP: Protected Cyber Asset” from red to orangeXXXX
Resolved an issue where multiple interfaces had the same IP Address when running the NERC CIP WizardXXXX
Resolved an issue where updating licenses is not updating with the new license dataXXXX
Resolved issues with the SolarWinds Connector Device List  XX
Resolved an issue with the Splash Page on NP-View Desktop 4.0.0 missing logoXX  
Removed the Compared Results column from Access rules table due to new comparison functionXXXX
Resolved an issue where importing a NP-View Java project with customized fields, where missing after import into NP-View XXX
Improved the usability of the NERC-CIP Report; fixed blank web pages and console errorsXXXX
Resolved an issue where the Sidebar was stuck in loading after a new local install on a new workspace  XX
Resolved an issue where user could not create a custom view from selection (right click) XXX
Resolved an issue where labels added where stacking on top of each other during NERC-CIP wizard processXXXX
Resolved an issue where the Enterprise license can’t create additional views   X
 Essential DesktopProfessional DesktopProfessional ServerEnterprise Server
Resolved an issue where the NERC-CIP report had an issue loading the EACMS section.XXXX
Resolved an issue where the NERC-CIP Wizard displayed mismatching data.XXXX
Resolved an issue with the license downgrade function on Windows desktop.XX  
Resolved an issue where the Viewer role could change category tagging.  XX
 Essential DesktopProfessional DesktopProfessional ServerEnterprise Server
Added MAC categorization supportXXXX
Added parser and categorizer support for transparent cisco interfacesXXXX
Added parsing support for Transparent Firewall format of Cisco MAC TableXXXX
Added support for “fortilink” protocol to depict layer 2XXXX
Added the ability to rename viewsXXXX
Added the ability to rename workspacesXXXX
Improved the “Created by and Updated by” fields in the Asset Inventory table to reflect the source file names.XXXX
Improved the selection of devices on the topology to add Ctrl for single device selectionXXXX
Improved the usability of the Access Rules and Object Groups reportsXXXX
Improved the Workspace and Best Practice Summary Reports to reflect the current viewXXXX
Redesigned the NERC-CIP report and wizardXXXX
Resolved a ‘bool’ object has no attribute ‘keys’ attribute error for JuniperXXXX
Resolved a Regex issue with Risks and Warnings default policyXXXX
Resolved an issue for Palo Alto SERVICE group translationXXXX
Resolved an issue where .NPV files failed to loadXXXX
Resolved an issue where Cisco routing tables were not matching routesXXXX
Resolved an issue where conditional formatting was not being run after import of .NPV file.XXXX
Resolved an issue where disconnected topology assets would be repositioned on data updateXXXX
Resolved an issue where rerunning conditional formatting was not updated the modal reportsXXXX
Resolved an issue where rulesets have ambiguous association of BINDING groups to INTERFACE for PanOSXXXX
Resolved an issue where the Risks And Warning were not showing on the Best Practice reportXXXX
Resolved an issue where the system allocated another license if the device name is changed.XXXX
Resolved several issues with the comparison reporting functionXXXX
Released NP-View EssentialX   
Resolved an issue where renaming objects in Custom views was not sticky XXX
Rebranded NP-View II to NP-View Professional Desktop X  
Resolved an issue where Panorama files loaded into workspace using NP-Connect were causing workspace errors  XX
Resolved an issue where the Panorama connector device list was not showing all of the devices  XX
Resolved an issue where the Retrieve device list” window title shows “Connector error”, even when successful  XX
Resolved an issue where topology maps for Workspaces transferred between users fail to load  XX
Resolved an issue where connectors were pulling files not in the path and not updating until the next manual pull  XX
Resolved an issue where the creation date of a cloned connector does not update when saved  XX
Resolved multiple issue where the SMB connector failed to authenticate  XX
Rebranded NP-Live to NP-View Professional Server  X 
Released NP-View Enterprise Limited Preview   X
Table of Contents