This site will be decommissioned on January 30th 2025. After that date content will be available at techdocs.broadcom.com.

VMware Carbon Black EDR 7.3.2 | 04 OCT 2022 | Build 7.3.2.18738

Check for additions and updates to these release notes.

What's New

VMware Carbon Black EDR Windows Sensor 7.3.2 is a maintenance release that provides improvements to the Event Exclusion feature in addition to various other bug fixes and general improvements. This sensor release also includes all changes and fixes from previous releases.

This document provides information for users upgrading to Carbon Black EDR Windows Sensor 7.3.2 from previous versions as well as users new to Carbon Black EDR.

Server Compatibility

Carbon Black EDR sensors included with server releases are compatible with all server releases going forward. It is always recommended to use the latest server release with our latest sensors to utilize the full feature capabilities of our product; however, using earlier server versions with the latest sensor should not impact core product functionality.

Sensor Operating Systems

Carbon Black EDR sensors interoperate with multiple operating systems. For the most up-to-date list of supported operating systems for Carbon Black EDR sensors, see Sensor Operating Environment Requirements at https://docs.vmware.com/en/VMware-Carbon-Black-EDR/index.html.

Documentation

This document supplements other Carbon Black EDR documentation at https://docs.vmware.com/en/VMware-Carbon-Black-EDR/index.html.

Installation Instructions

To install the sensors on to your server, run through the following instructions:

  1. Ensure your Carbon Black EDR YUM repo is set appropriately:

    1. The Carbon Black EDR repository file to modify is /etc/yum.repos.d/CarbonBlack.repo

    2. Baseurl=https://yum.distro.carbonblack.io/enterprise/stable/$releasever/$basearch/

  2. On the Carbon Black EDR server, clear the YUM cache by running the following command:

    1. yum clean all

  3. After the YUM cache has been cleared, download the sensor install package by running the following command:

    1. Run yum install --downloadonly --downloaddir=<package local download directory> <package>

      1. Note: The <package local download directory> is a directory of your choice

      2. Note:<package> is replaced by cb-sensor-7.3.2.18738-win

  4. Install the new sensor package on the Carbon Black EDR server by running the command:

    1. rpm -i --force <package>

  5. Make the new installation package available in the server console UI by running the command:

    1. /usr/share/cb/cbcheck sensor-builds --update

      1. Note: If your groups have Automatic Update enabled, the sensors in that group will start to automatically update.

Your new sensor versions should now be available via the console. For any issues, please contact VMware Carbon Black Technical Support.

Important Note: It is always encouraged to conduct a reboot of the endpoint after installation (or restart) of our sensor to ensure the sensor properly captures the full historical data of all running processes and associated information.

Resolved Issues

  • CB-37205: Hardened Tamper Protection enforcement for registry modifications

  • CB-37236: Sensor now supports BypassIO feature introduced with Windows 11

  • CB-37816: Event exclusions now ignore network events when excluded (previously unsupported)

  • CB-38315: Relaxed sensor logging for sensor process accessing registry

  • CB-38394: Sensor prevents deleting of upgrade.exe

    Sensor prevents deleting of upgrade.exe when an issue with it (such as failing to verify digital signature) is encountered, for troubleshooting purposes.

  • CB-38397: Certificate thumbprint

    Sensor now logs certificate thumbprint for troubleshooting purposes when certificate pinor troubleshooting purposesning errors are encountered.

  • CB-38502: Updated the display name of the Carbon Black EDR services with latest branding info

  • CB-38746: Fixed an issue with uninstalling sensors from the console that were previously installed using .gpo methods

  • CB-38811: Event exclusions now ignore process start information when excluded

  • CB-38812: Event exclusions are now applied to already running processes

  • CB-38915: Fixed a bug that could cause malformed SHA256 hashes for child processes

  • CB-38942: Obfuscated sensors

    Fixed an issue with obfuscated sensors losing their obfuscated process name when upgraded through .exe or .gpo methods.

  • CB-39155: Fixed a bug with the sensor failing to submit sensor event logs

  • CB-39206: Fixed a bug with reporting error output from a Live Query

  • CB-39286: Fixed an issue with the PID of the carbonblack service continuously changing while in obfuscation

  • CB-39382: Interop issue between Carbon Black EDR and VMware Carbon Black Application Control

    Fixed an interop issue between Carbon Black EDR and Carbon Black Application Control products, where Carbon Black EDR’s Tamper Protection feature could prevent the necessary approval of Carbon Black App Control, resulting in access denial for Live Response and Live Query actions attempted.

  • CB-39524: System hangs after applying Windows update patches

    Fixed an issue with previous Carbon Black EDR sensor versions causing system hangs after applying Windows update patches. More information on this issue can be found in our knowledge base article.

  • CB-39831: Fixed a bug with 7.2.1-win+ sensors encountering a 0x8007277A error during check-ins with the server

  • CB-39976: Updated osquery version to v5.4.0

  • CB-40373: Hardened Tamper Protection enforcement of registry

Known Issues

  • CB-17552: Disabling DNS name resolution for netconn events

    Versions of the sensor prior to 7.1.1 (and 6.1.12 for XP/Server2003) were susceptible to high CPU utilization in the IP Address-to-Hostname resolution functionality of the sensor. This issue has been addressed; however, this registry key will still disable IP address name resolution for customers who want to do so:

    [HKEY_LOCAL_MACHINE\SOFTWARE\CarbonBlack\config]

    "DisableNetConnNameResolution"=dword:00000001

  • CB-28062: Obfuscated Windows Sensors will not start after first reboot

    Windows sensors installed from an obfuscated sensor group will not start after first reboot. A second reboot will start the sensor service.

  • CB-28063: Carbon Black branding is different between MSI and EXE installers

    Customers using the Add/Remove Program window to manage their Carbon Black EDR Windows sensor installation should be aware that the Carbon Black branding between the MSI and EXE installers is different.

  • EP-11934: VMware Carbon Black App Control Tamper Protection Rapid Config update recommended

    For users running Carbon Black App Control (formerly “CB Protection”) to tamper protect the Carbon Black EDR Windows Sensor (and do not opt-in to CDC) it is recommended to update the tamper rule settings for Carbon Black App Control to the latest “Carbon Black EDR Tamper Protection” Rapid Config to avoid possible conflict with applying Tamper Protection enforcement on both Carbon Black EDR and Carbon Black App Control.

    Note: Enabling Tamper Protection on both Carbon Black App Control and Carbon Black EDR does not provide extra protection and it is recommended to disable Carbon Black App Control enforcement of Tamper Protection after Carbon Black EDR enforcement is confirmed to be in place. When running Carbon Black EDR in “Tamper Detection” mode, “Tamper Protection” through Carbon Black App Control is still recommended. Tamper Protection (for Carbon Black EDR) requires a minimum operating system version of Windows 10 v1703 (Desktop) or Windows Server v1709. In addition,Tamper Protection (for Carbon Black EDR) requires minimum versions of both the Windows 7.2.0 sensor and 7.4.0 EDR Server. Please contact technical support to obtain the latest Rapid Config for Carbon Black App Control if needed.

Contacting Technical Support

Carbon Black EDR server and sensor update releases are covered under the Customer Maintenance Agreement. Technical Support is available to assist with any issues that might develop during the installation or upgrade process. Our Professional Services organization is also available to assist to ensure a smooth and efficient upgrade or installation.

Use one of the following channels to request support or ask support questions:

Reporting Problems

When contacting Carbon Black Technical Support, provide the following required information:

  • Contact: Your name, company name, telephone number, and email address

  • Product version: Product name (Carbon Black EDR server and sensor versions)

  • Hardware configuration: Hardware configuration of the Carbon Black EDR server (processor, memory, and RAM)

  • Document version: For documentation issues, specify the version and/or date of the manual or document you are using

  • Problem: Action causing the problem, the error message returned, and event log output (as appropriate)

  • Problem Severity: Critical, serious, minor, or enhancement request

Note: Before performing an upgrade, Carbon Black recommends you review related content at the Carbon Black EDR section of docs.vmware.com.

check-circle-line exclamation-circle-line close-line
Scroll to top icon