Release Note for CTE v7.8.0 for Windows
Release Note | Version | Date |
---|---|---|
v7.8.0.79 | 1 | 2025-06-17 |
v7.8.0.79 | 2 | 2025-06-24 |
This release of CipherTrust Transparent Encryption for Windows adds new features, fixes known defects and addresses known vulnerabilities.
New Features and Enhancements
RWP Protection report on CipherTrust Manager when RWP detects suspicious behavior
A new report was added for Ransomware Protection.
- See Understanding Ransomware Protection Reports for more information.
Integrating Imperva FAM with CTE
File Activity Monitoring (FAM) catalogs, monitors, and secures unstructured data (files). Unstructured data refers to any data that is not stored in databases. You can find these files locally, on the network, or in the cloud. FAM provides insights into data location, ownership, access history, permissions, protection, sharing, and sensitivity, enabling informed decisions about data protection.
Documentation Improvement: SQL File Stream doc improved for clarity
SQL File Stream documentation was improved for clarity.
- See Using LDT with SQL FILESTREAM for more information.
Resolved Issues
-
AGT-61679 [CS1581483]: The Apache service does not start when launched within a GuardPoint
This issue was interoperability between CTE and Windows Defender related to the Apache2.4 directory. This has been fixed.
-
AGT-61846: Windows AccessOnly node: LDT over CIFS GuardPoints are inactive after upgraded to v7.7.0.79, or 7.8.0.65, key rotated, and agent rebooted
The issue occurred because the CipherTrust Manager was not using the supported version. Make sure that your CipherTrust Manager is v2.20.
-
AGT-63199: Failed to guard FileTable VNN path in SQL AlwaysOn setup with LDT
LDT for SQL Server AlwaysOn with FileTables is currently not supported. LDT for SQL Server Always-on (without FileTables) is supported.
-
AGT-63043 [CS1596700]: Binaries launched from UNC are not matching the process set
UNC paths added to a process set were not matching the actual path of the process. Therefore, a process in the process set could be erroneously denied access to a resource specified in the policy. This has been fixed.
Known Issues
-
AGT-36370: The vorvmd.log reports an error message when guarding LDT over CIFS GuardPoint
This error message displays when the CTE agent is in the process of authenticating the user. This error can be safely ignored.
-
AGT-39189 | AGT-55063: CTE failed to unguard after changing to incorrect CIFS credentials
If a user has a CIFS guarded path, and tries to access it with invalid credentials, the unguard request fails. After this, if the user switches to valid credentials, the unguard request still fails because CTE agent is unable to access the CIFS share to update the credentials.
Work-around
To successfully guard/unguard a CIFS path, use valid credentials.
-
AGT-39190: File modified time does not change after rekey for excluded files
This is a limitation with the current CTE agent. This is due to the Windows Redirected Drive Buffering Subsystem (rdbss) limitation.
-
AGT-48196: Microsoft DPM recovery creation failed when creating an incremental backup recovery point
Work-around
Perform a complete backup. Do not perform an incremental backup.
-
AGT-48580: The gzip files in a directory can be mistakenly identified as ransomware by Ransomware Protection
Some compression algorithms haves high entropy value and intermittently, zip or unzip activity that occurs on files that already themselves have high entropy, within a Ransomware Protection GuardPoint, is mistakenly identified as ransomware.
Work-around
Add the
zip/gzip/winzip
programs to the Ransomware Protection process exemption list in the CipherTrust Manager. -
AGT-48862: Unguard process fails if CTE
secfsd
service is downThe
secfsd
service is a critical CTE service. If this service is down, certain CTE features may not work as intended.Work-around
Manually restart the
secfsd
service in the service manager. -
AGT-58577: Issues and limitations for Multifactor Authentication and Ransomware Protection co-existence
Multifactor Authentication is not yet supported for a GuardPoint with Ransomware Protection with a CTE Agent.
-
AGT-61138: When applying a GuardPoint on the UNC (Universal Naming Convention) name instead of a Local drive, files display as cipher-text format when accessing using local drive
User must apply GuardPoint on the local drive. If the user decides to apply the GuardPoint on the UNC path, user must use the UNC path to access the data. Do not view through the local Windows explorer path.
-
AGT-64352: No Audit logs generated for same resource set on Standard Policy vs FAM policy
In FAM, no audit logs are generated with a FAM policy having a resource set matching the designated pattern.
-
AGT-64711: Data transformation is failing in case of existing data in OneDrive using dataxform
For OneDrive v23.066 and subsequent versions, Microsoft made a change to their software. Users can no longer disable the Files On-Demand feature. Disabling this feature is required for the CTE driver. As a result, the CTE driver can only support using a standard policy and Data Transformation with previous versions of OneDrive v23.066. For OneDrive v23.066 and subsequent versions, the CTE driver supports using a standard policy. It does not support using Data Transformation.
-
AGT-64971: Unable to delete GuardPoint inside a Ransomware protected volume, when simulating a ransomware attack when a process is marked as malicious by RWP
GuardPoint is not being removed from the directory. On CipherTrust Manager it displays that it's in the processing state.
Work-around
Reboot the agent.
-
AGT-65794: CTE/FAM duplicate audit logs generated for single action
For CTE protected paths, there can be multiple FAM audit logs generated for a single I/O operation.
-
AGT-66352: System Crashed while restoring shadow-copy backup
Forcefully dismounting a shadow drive using the
vssadmin.exe revert shadow /ForceDismount
command, and then attempting to generate an LDT report using the Voradmin LDT report command, in sequence, may result in a system crash. Thales suggests that you do not perform these two commands in sequence. -
AGT-66386: Not able to access CIFS file from a Windows AccessOnly node after key rotation
If a file on a CIFS share is accessed from a Windows AccessOnly node immediately following the initial LDT transformation operation, and then a subsequent rekey is performed, the file is no longer be accessible on the Windows AccessOnly Node.
Workaround
Reboot the Windows AccessOnly node.
End of Life
Due to the end of life status of DSM, CTE no longer ships with VMSSC.