Skip to main content
Code42 Support

Code42 Cloud Version 6.9

Applies to:
  • Code42 for Enterprise

Overview

Version 6.9 of the Code42 cloud includes a number of fixes and enhancements. This release primarily impacts cloud-only Code42 environments (without on-site authority or storage servers), but some of the fixes and enhancements also apply to Code42 environments with on-premises authority servers that use Code42 cloud storage.

Updates affect the following components:

  • Code42 platform (powers the Code42 cloud)
  • Administration console
  • Code42 app

Features

Expanded file exfiltration detection

November 2018 (requires Code42 app version 6.9.0)

Endpoint monitoring now captures new categories of file activity: 

  • Introduces browser activity upload and download detection for Mac devices (previously only available on Windows). 
  • Expands upload and download detection for both Windows and Mac to applications other than web browsers, including Slack, FileZilla, FTP, and cURL.

Fixes and enhancements

Code42 cloud and administration console

Version 6.9.0

November 8, 2018

  • Security updates.
  • Performance and stability improvements.
  • Corrects an issue in which the Security Center user activity CSV export could display the wrong Process Name for events happening in different browsers at the same time. For example, files uploaded via both Firefox and Chrome within a minute of each other could incorrectly all appear as being uploaded in Firefox.
  • Corrects an issue in which initiating a device restore from the administration console could display the completion confirmation dialog multiple times.
  • The Code42 Master Service Agreement (MSA) now appears the first time an administrator signs in to the Code42 administration console.
  • Corrects an issue in which administration console searches only returned results for exact matches on Hostname. Now, search results also return partial matches (for example, searching for the term "harmless" now returns devices with the hostname harmless and mostly harmless).
  • Corrects an issue in which API requests to the WebRestoreFileMetaData resource could incorrectly return a 404 not found error.
  • Because file upload detection is no longer limited to web browsers, the Browser Activity label is now Application Activity throughout the endpoint monitoring and Security Center screens.
  • Improvements to logging.
  • Corrects an issue for organizations that activated Compliance Settings in which the option to enable web restores was still visible. This was a display issue only; web restores are always disabled for Compliance Settings organizations. 
  • Improves sync processes between the Code42 cloud and on-premises authority servers.
  • Corrects an issue that prevented web restores for offline devices using archive key password security.

Code42 app

Version 6.9.0

In cloud-only Code42 environments, the Code42 app will be automatically upgraded to version 6.9.0 over several days, beginning in late November, 2018.

  • Performance and stability improvements.
  • Corrects an issue on Windows 10 devices in which the Code42 app's backup process could inadvertently trigger the download of online-only files managed by OneDrive Files On-Demand.
  • Local backup destinations now display the file path of the destination in addition to the name.
  • When searching for files to restore, the search results now include the file path (previously, only the filename appeared). This helps differentiate between files with the same name that exist in multiple locations.
  • The Code42 app no longer allows you to add Universal Naming Convention (UNC) file paths (for example, //SERVERNAME/shareddir/) to the backup file selection. UNC paths have never been supported by the Code42 app; this update prevents you from entering a path the Code42 app is unable to back up.
  • Corrects a rare issue introduced in Code42 app version 6.8.3 which could prevent the app from being able to back up a file if it was locked by another program.
  • Corrects an issue introduced in Code42 app version 6.8.3 in which the app.log was truncated until a user signs in for the first time.
  • Corrects an issue introduced in Code42 app version 6.8.3 for environments using single sign-on (SSO): if the Require account password to open the Code42 app setting is enabled, the new user welcome message now only appears the first time the user opens the app (in version 6.8.3, the message could appear every time). 
  • Corrects an issue on Mac devices in which uninstalling the Code42 app did not properly remove files in the /var/db/receipts directory (for root installs) or the $base/Library/Receipts/crashplan directory (for per user installs).
  • Removes the connection.info command from the Code42 app command-line interface (CLI). Since the Code42 app no longer supports computer-to-computer backups, this command is no longer necessary.
  • On Mac devices, the keyboard shortcut to view the history log is now Command+Y. Previously, it was Command+Option+H.
  • De-authorizing a Windows device no longer resets the Device Preferences > Usage > Alert me if this device is not backed up for value to the default 3 days. Now, if a user customizes this setting, it retains the custom value after the user signs in again.
  • Accessed date metadata is no longer collected for files on Windows devices. 
  • Corrects an issue on Windows devices in which accessing a file without making any changes could incorrectly trigger backup of a new file version.
  • Corrects an issue in which a filename could appear twice in the list of Downloads if a device restore is initiated from the the administration console. This was only a display issue; only one copy of the file was restored and existed on the device.
  • Improvements to logging.
  • Corrects a rare issue in which there could be an unexpected delay in resuming a paused backup.
  • On Mac devices, corrects an issue in which endpoint monitoring could prevent a user from properly ejecting an external drive.
  • Corrects an issue introduced in Code42 app version 6.8 for users with custom key archive security which prevented new devices from being added via the Replace Device wizard.
  • Was this article helpful?