Go to the table of contents Go to the previous page Go to the next page View or print as PDF
v2.1.0 Release Notes for TRITON RiskVision : New in RiskVision v2.1.0
New in RiskVision v2.1.0
Release Notes | TRITON RiskVision | 06-Jun-2016
Look and feel enhancements
To support the transition from Raytheon | Websense to Forcepoint LLC, the RiskVision Local Manager has a new look and feel. The colors and logos throughout the management console, including the logon screen and toolbar, have been updated to reflect the Forcepoint brand.
Similar changes have been made in the Help system, as well as in external content, like the Knowledge Base and Support portal.
As a result of the creation of Forcepoint LLC, the RiskVision subscription agreement has been updated for v2.1. If you are upgrading from v2.0, be sure to accept the new subscription agreement after upgrade is complete. See Upgrading to RiskVision 2.1 for complete upgrade instructions.
 
Important 
Integration with Threat Protection Appliance
RiskVision customers who also have SureView Threat Protection Appliance now have the option to forward suspicious files to either the cloud-based File Sandbox or to the Threat Protection Appliance for additional analysis.
Configure which file analysis tool to use on the System > Analytics page in the RiskVision Local Manager.
To configure RiskVision to forward files to Threat Protection Appliance:
1.
Click the Configure analysis platform link on the System > Analytics page.
2.
Select the Threat Protection Appliance radio button.
3.
Enter the IP address for the prod1 interface of the Threat Protection Controller.
4.
In incident records, if file analysis occurred, the Plugins field specifies whether the File Sandbox or Threat Protection Appliance performed the analysis.
Enhanced support for YARA rules
In this version, in addition to supporting customer-supplied YARA rules, RiskVision automatically downloads a YARA rules database, similar to its other analytic databases.
In this release, the YARA rules are used only to identify macros in text files. Files containing macros are flagged for further processing by Threat Protection Appliance.
RiskVision downloads YARA rules from Forcepoint download servers and saves them in the /opt/websense/yara/download directory on the appliance.
*
*
*
*
*
The Yara Plugin section of the Diagnostics > Performance page has been expanded to include information about decryption of the YARA database.
 
Note 
Enhanced incident details
When you select an incident in the Transaction Viewer, the Detail pane now includes:
*
The link includes the SHA-256 hash for the file associated with the incident. If a VirusTotal report exists for the file, clicking the link opens the report in a new browser tab.
*
This supplements the SHA-1 hash that is also displayed.
*
The flags that may be set by RiskVision analytics include:
*
Detected by Yara indicates that the incident was matched to a YARA rule by the YARA Plugin.
*
OffBoxScanRequired indicates that Local Analysis determined that a file should be further analyzed by the File Sandbox.
*
OffBoxTPScanRequired indicates that Local Analysis determined that a file should be further analyzed by the Threat Protection Appliance.
*
Persist indicates that the incident needs to be logged to the database.
*
RunAnalytics indicates that the User/URL Lookup plugin determined the Content Analytics Plugin should perform analysis.
In addition, any labels added to an incident by custom YARA rules are displayed here.
Updates to SIEM and syslog logging
A new field, sourceServerIp, has been added to the default SIEM/syslog formats. This reports the IP address of the RiskVision appliance that analyzed an incident.
In addition, several other SIEM keys may now optionally be included in custom SIEM and syslog strings:

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
v2.1.0 Release Notes for TRITON RiskVision : New in RiskVision v2.1.0
Copyright 2016 Forcepoint LLC. All rights reserved.