Airlock v5.1 & v5.0.9 Availability
This month we are excited to announce the release of two new versions of Airlock:
- Airlock v5.0.9: This version is the Long Term Support (LTS) branch of Airlock and contains bugfixes for existing functionality; and
- Airlock v5.1: This version is the latest release of Airlock containing new features. v5.1 is one of the largest updates to the Airlock platform yet and includes a significant underlying platform update.
Both releases are now available for download via the Airlock Digital Customer Portal. Cloud hosted customers can also be upgraded via a request to Airlock support.
2023 is shaping up to be a significant growth year for Airlock, with an accelerated company expansion that is well underway, combined with a continued focus on product, making allowlisting easier than ever.
Flagship features of Airlock v5.1 include:
Windows Performance & Interoperability Enhancements
The Windows Enforcement Agent driver architecture has been completely re-written to further improve performance and interoperability when installed alongside other Endpoint Protection products.
Command Line Blocklisting
Introduced the ability to block (or allow) process executions via their command line. This makes the Blocklisting framework even more flexible to control application behaviour.
Full Path Parent Process Trust
Full Path Parent Process Trust: The parent process feature now supports specifying full paths to images (rather than just the image name itself).
Bulk Add Improvements
The Bulk Add screen now has a filter that will automatically remove trusted files/publisher data. Making it easier to process large data sets.
Ability to disable OTP duration’s
OTP duration’s can now be enabled/disabled within policy, enabling administrators to prevent the use of times such as 7 days for OTP mode.
File Repository Comments
Comments can now be added on the File Repository page, enabling teams to discuss and leave notes against file entries.
Ability to Blocklist by Certificate Thumbprint
File signing certificates can now be blocked by their certificate thumbprint. This can provide a mitigation when vendors code signing certificates are stolen.