This document lists the new fixes and component versions in Symantec Endpoint Protection (SEP) 14.3 RU6 (14.3.9205.6000). This information supplements the information found in the Release Notes.
Download the full release through the Broadcom Software Download Portal. For details, see Download the latest version of Endpoint Protection.
Incident ID: CRE-7381
Incident Description: SEPM slowness and deadlocks observed after upgrading to 14.3 RU2
Incident ID: CRE-7815
Incident Description: IPS audit detections show inconsistent results in ICDm
Incident ID: CRE-7926
Incident Description: Single Risk Event email notifications contain invalid characters for Japanese
Incident ID: CRE-9157
Incident Description: Incorrect client count displayed for Out-of-date Definitions notification
Incident ID: CRE-10263
Incident Description: SEPM login intermittently is delayed up to 15 minutes
Incident ID: CRE-10360
Incident Description: SONAR, IPS, and Download Protection definitions show "Not Available" under Protection Technology view
Incident ID: CRE-10488
Incident Description: ExternalLoggingWorker exceptions found in Scm-Server-0.log
Incident ID: CRE-10852
Incident Description: SEPM upgrade may unexpectedly fail depending on the domain account used
Incident ID: CRE-10951
Incident Description: Upgrading SEPM to 14.3 RU5 incorrectly adds Threat Defense for Active Directory and Website Traffic Redirection to existing installation packages
Incident ID: CRE-10995
Incident Description: Potential SEPM upgrade failure observed during "Coalescing contents..." step
Incident ID: CRE-11259
Incident Description: Endpoint Status report shows incorrect version information if in JST time zone
Incident ID: CRE-11293
Incident Description: LiveUpdate Settings policy does not merge all settings as expected during replication
Incident ID: CRE-11415
Incident Description: Summary Report, Daily Status Report, and Virus Definition Distribution Report does not show anything when set to less than 24 hours
Incident ID: CRE-11591
Incident Description: Query Failed error when exporting Exploit Mitigation logs
Incident ID: CRE-9875
Incident Description: Event log does not match the current location of the client
Incident ID: CRE-9981
Incident Description: Get Quarantined File command from SEPM fails on files detected within archives
Incident ID: CRE-10327
Incident Description: Exceptions do not always apply properly to mounted drives on Windows Server 2019
Incident ID: CRE-10669
Incident Description: Tamper Protection incorrectly blocks LogViewer.exe from creating IFEO entries
Incident ID: CRE-10757
Incident Description: Cloud enrollment failure observed on some endpoints
Incident ID: CRE-10982
Incident Description: ClientSideClonePrepTool and smc -image command do not work as expected
Incident ID: CRE-11000
Incident Description: TDAD AD Gateway encounters an error when the ADG process token expires
Incident ID: CRE-11014
Incident Description: Upgrading a cloud-managed endpoint does not retain the assigned policy when a reboot is required
Incident ID: CRE-11366
Incident Description: .NET Mask is missing "Canonical Name" and "Created" attributes
Incident ID: CRE-11395
Incident Description: Folder exclusion list on an unmanaged client is lost when making specific configuration changes
Incident ID: CRE-11403
Incident Description: NetApp Global File Cache and SEP installed together causes Windows Server 2019 to hang
Incident ID: CRE-11524
Incident Description: Client installation fails with certain security controls in place
Incident ID: CRE-11662
Incident Description: User Interface becomes unresponsive intermittently
Incident ID: CRE-11824
Incident Description: TDAD does not synchronize DC computers when using the AD-GW agent
Incident ID: CRE-8781
Incident Description: SEPMac does not install system extension and "setup incomplete" is displayed
Incident ID: CRE-10022
Incident Description: SEPMac agent risk log is not forwarded to SEPM if the system is rebooted prior to it being uploaded
Incident ID: CRE-11257
Incident Description: User Interface shows "Disabled by user" even though it should say "Disabled by admin"
The build number for this release is 14.3.9205.6000.
Red text indicates components that have updated for this release.
Component |
DLL File |
DLL Version |
SYS File |
SYS Version |
---|---|---|---|---|
AutoProtect |
srtsp64.dll |
16.1.1.123 |
srtsp64.sys |
16.1.1.123 |
BASH Defs |
BHEngine.dll Seq#= 20220421.021 |
12.6.0.106 |
BHDrvx64.sys |
12.6.0.106 |
BASH Framework |
BHClient.dll |
12.6.0.106 |
N/A |
- |
CC |
ccLib.dll |
17.3.2.16 |
ccSetx64.sys |
17.3.0.48 |
CIDS Defs |
IDSxpx86.dll Seq#= 20220525.091 |
17.2.10.9 |
IDSviA64.sys |
17.2.10.7 |
CIDS Framework |
IDSAux.dll |
17.2.10.7 |
N/A |
- |
CP3 |
version.txt |
3.2.0.322 |
N/A |
- |
CX |
cx_lib.dll |
4.0.5.7 |
N/A |
- |
ConMan |
version.txt |
3.3.6.85 |
N/A |
- |
D2D |
version.txt |
1.5.0.81 |
N/A |
- |
DefUtils |
DefUtDCD.dll |
5.5.0.19 |
N/A |
- |
DuLuCallback |
DuLuCbk.dll |
1.13.2.2 |
N/A |
- |
ERASER |
cceraser.dll |
119.1.5.1 |
eraser64.sys |
119.1.5.1 |
IRON |
Iron.dll |
9.2.1.34 |
Ironx64.sys |
9.2.1.32 |
LUX |
Lux.dll |
4.2.2.24 |
||
LiveUpdate |
LUEng.dll |
2.9.1.14 |
N/A |
- |
MicroDefs |
patch25d.dll |
6.2.4.13 |
N/A |
- |
SDS Engine |
sds_engine_x86.dll Seq#= 20221021.004 |
1.19.0.73 |
N/A |
- |
SEF Defs |
speng32.dll |
1.9.0.1009 |
symevnt32.sys |
1.9.0.987 |
SIS |
SIS.dll |
14.3.21017.5000 |
N/A |
- |
STIC Defs |
stic.dll Seq#= 20220610.001 |
3.6.4.538 |
N/A |
- |
STIC Framework |
sticprxy.dll |
3.6.4.538 |
|
|
SymDS |
DSCli.dll |
6.8.1.39 |
N/A |
- |
SymEFA |
EFACli64.dll |
7.5.1.46 |
SymEFASI64.sys |
7.5.1.43 |
SymELAM |
ELAMCli.dll |
2.5.0.58 |
SymELAM.sys |
2.5.0.54 |
SymEvent |
Sevntx64.exe |
14.0.9.53 |
SymEvent.sys |
14.0.9.53 |
SymNetDrv |
SNDSvc.dll |
17.2.0.165 |
symnets.sys |
17.2.0.165 |
SymScan |
ccScanW.dll |
16.4.1.23 |
N/A |
- |
SymVT |
version.txt |
10.2.1.10 |
N/A |
- |