VMware Carbon Black EDR 7.3.2 | 04 OCT 2022 | Build 7.3.2.18738 Check for additions and updates to these release notes. |
VMware Carbon Black EDR 7.3.2 | 04 OCT 2022 | Build 7.3.2.18738 Check for additions and updates to these release notes. |
VMware Carbon Black EDR Windows Sensor 7.3.2 is a maintenance release that provides improvements to the Event Exclusion feature in addition to various other bug fixes and general improvements. This sensor release also includes all changes and fixes from previous releases.
This document provides information for users upgrading to Carbon Black EDR Windows Sensor 7.3.2 from previous versions as well as users new to Carbon Black EDR.
Carbon Black EDR sensors included with server releases are compatible with all server releases going forward. It is always recommended to use the latest server release with our latest sensors to utilize the full feature capabilities of our product; however, using earlier server versions with the latest sensor should not impact core product functionality.
Carbon Black EDR sensors interoperate with multiple operating systems. For the most up-to-date list of supported operating systems for Carbon Black EDR sensors, see Sensor Operating Environment Requirements at https://docs.vmware.com/en/VMware-Carbon-Black-EDR/index.html.
This document supplements other Carbon Black EDR documentation at https://docs.vmware.com/en/VMware-Carbon-Black-EDR/index.html.
To install the sensors on to your server, run through the following instructions:
Ensure your Carbon Black EDR YUM repo is set appropriately:
The Carbon Black EDR repository file to modify is /etc/yum.repos.d/CarbonBlack.repo
Baseurl=https://yum.distro.carbonblack.io/enterprise/stable/$releasever/$basearch/
On the Carbon Black EDR server, clear the YUM cache by running the following command:
yum clean all
After the YUM cache has been cleared, download the sensor install package by running the following command:
Run yum install --downloadonly --downloaddir=<package local download directory> <package>
Note: The <package local download directory> is a directory of your choice
Note:<package> is replaced by cb-sensor-7.3.2.18738-win
Install the new sensor package on the Carbon Black EDR server by running the command:
rpm -i --force <package>
Make the new installation package available in the server console UI by running the command:
/usr/share/cb/cbcheck sensor-builds --update
Note: If your groups have Automatic Update enabled, the sensors in that group will start to automatically update.
Your new sensor versions should now be available via the console. For any issues, please contact VMware Carbon Black Technical Support.
Important Note: It is always encouraged to conduct a reboot of the endpoint after installation (or restart) of our sensor to ensure the sensor properly captures the full historical data of all running processes and associated information.
CB-37205: Hardened Tamper Protection enforcement for registry modifications
CB-37236: Sensor now supports BypassIO feature introduced with Windows 11
CB-37816: Event exclusions now ignore network events when excluded (previously unsupported)
CB-38315: Relaxed sensor logging for sensor process accessing registry
CB-38394: Sensor prevents deleting of upgrade.exe
Sensor prevents deleting of upgrade.exe when an issue with it (such as failing to verify digital signature) is encountered, for troubleshooting purposes.
CB-38397: Certificate thumbprint
Sensor now logs certificate thumbprint for troubleshooting purposes when certificate pinor troubleshooting purposesning errors are encountered.
CB-38502: Updated the display name of the Carbon Black EDR services with latest branding info
CB-38746: Fixed an issue with uninstalling sensors from the console that were previously installed using .gpo methods
CB-38811: Event exclusions now ignore process start information when excluded
CB-38812: Event exclusions are now applied to already running processes
CB-38915: Fixed a bug that could cause malformed SHA256 hashes for child processes
CB-38942: Obfuscated sensors
Fixed an issue with obfuscated sensors losing their obfuscated process name when upgraded through .exe or .gpo methods.
CB-39155: Fixed a bug with the sensor failing to submit sensor event logs
CB-39206: Fixed a bug with reporting error output from a Live Query
CB-39286: Fixed an issue with the PID of the carbonblack service continuously changing while in obfuscation
CB-39382: Interop issue between Carbon Black EDR and VMware Carbon Black Application Control
Fixed an interop issue between Carbon Black EDR and Carbon Black Application Control products, where Carbon Black EDR’s Tamper Protection feature could prevent the necessary approval of Carbon Black App Control, resulting in access denial for Live Response and Live Query actions attempted.
CB-39524: System hangs after applying Windows update patches
Fixed an issue with previous Carbon Black EDR sensor versions causing system hangs after applying Windows update patches. More information on this issue can be found in our knowledge base article.
CB-39831: Fixed a bug with 7.2.1-win+ sensors encountering a 0x8007277A error during check-ins with the server
CB-39976: Updated osquery version to v5.4.0
CB-40373: Hardened Tamper Protection enforcement of registry
CB-17552: Disabling DNS name resolution for netconn events
Versions of the sensor prior to 7.1.1 (and 6.1.12 for XP/Server2003) were susceptible to high CPU utilization in the IP Address-to-Hostname resolution functionality of the sensor. This issue has been addressed; however, this registry key will still disable IP address name resolution for customers who want to do so:
[HKEY_LOCAL_MACHINE\SOFTWARE\CarbonBlack\config]
"DisableNetConnNameResolution"=dword:00000001
CB-28062: Obfuscated Windows Sensors will not start after first reboot
Windows sensors installed from an obfuscated sensor group will not start after first reboot. A second reboot will start the sensor service.
CB-28063: Carbon Black branding is different between MSI and EXE installers
Customers using the Add/Remove Program window to manage their Carbon Black EDR Windows sensor installation should be aware that the Carbon Black branding between the MSI and EXE installers is different.
EP-11934: VMware Carbon Black App Control Tamper Protection Rapid Config update recommended
For users running Carbon Black App Control (formerly “CB Protection”) to tamper protect the Carbon Black EDR Windows Sensor (and do not opt-in to CDC) it is recommended to update the tamper rule settings for Carbon Black App Control to the latest “Carbon Black EDR Tamper Protection” Rapid Config to avoid possible conflict with applying Tamper Protection enforcement on both Carbon Black EDR and Carbon Black App Control.
Note: Enabling Tamper Protection on both Carbon Black App Control and Carbon Black EDR does not provide extra protection and it is recommended to disable Carbon Black App Control enforcement of Tamper Protection after Carbon Black EDR enforcement is confirmed to be in place. When running Carbon Black EDR in “Tamper Detection” mode, “Tamper Protection” through Carbon Black App Control is still recommended. Tamper Protection (for Carbon Black EDR) requires a minimum operating system version of Windows 10 v1703 (Desktop) or Windows Server v1709. In addition,Tamper Protection (for Carbon Black EDR) requires minimum versions of both the Windows 7.2.0 sensor and 7.4.0 EDR Server. Please contact technical support to obtain the latest Rapid Config for Carbon Black App Control if needed.
Carbon Black EDR server and sensor update releases are covered under the Customer Maintenance Agreement. Technical Support is available to assist with any issues that might develop during the installation or upgrade process. Our Professional Services organization is also available to assist to ensure a smooth and efficient upgrade or installation.
Use one of the following channels to request support or ask support questions:
Web:User Exchange
Email: [email protected]
Phone: 877.248.9098
Reporting Problems
When contacting Carbon Black Technical Support, provide the following required information:
Contact: Your name, company name, telephone number, and email address
Product version: Product name (Carbon Black EDR server and sensor versions)
Hardware configuration: Hardware configuration of the Carbon Black EDR server (processor, memory, and RAM)
Document version: For documentation issues, specify the version and/or date of the manual or document you are using
Problem: Action causing the problem, the error message returned, and event log output (as appropriate)
Problem Severity: Critical, serious, minor, or enhancement request
Note: Before performing an upgrade, Carbon Black recommends you review related content at the Carbon Black EDR section of docs.vmware.com.