Safe Lock TXOne Edition 1.1 Critical Patch 2010 for Intelligent Manager and Critical Patch 1060 for Agent are Now Available
  • 22 Feb 2023
  • 2 Minutes to read

Safe Lock TXOne Edition 1.1 Critical Patch 2010 for Intelligent Manager and Critical Patch 1060 for Agent are Now Available


Article summary

Summary


Safe Lock TXOne Edition 1.1 critical patch 2010 for Intelligent Manager and critical patch 1060 for agents have officially been released and are now available on TXOne’s download center. Check the readme and download package files for details here.

Details


  • Safe Lock TXOne Edition 1.1 critical patch 2010 for Intelligent Manager updates the certificate checking to make sure the compatibility when users try to upgrade newer version after agent version 3.1.1060 remotely using Intelligent Manager.
  • Critical patch 1060 for Safe Lock TXOne Edition 1.1 agents also ensures that agents could recognize the TXOne certificate to prevent hotfix or patch installation failure and introduce several enhancements.
  • It is highly suggested to apply patch and do the Intelligent Manager as well as agent upgrade to avoid the remote agent upgrade issue for future releases after agent version 3.1.1060.

Applicable Upgrade Versions

Here are the applicable versions for the abovementioned critical patches.

  • Safe Lock TXOne Edition 1.1 critical patch 2010 for Intelligent Manager is applicable to upgrade from Safe Lock TXOne Edition 1.0 and 1.1 with server version from 3.0.x to 3.1.2009
  • Safe Lock TXOne Edition 1.1 critical patch 1060 for agents supports upgrading from Safe Lock TXOne Edition 1.1 with agent version from 3.1.1042.

For Safe Lock 2.0 Service Pack 1 users, please contact us for more detailed instructions.

Recommended Upgrade Steps

Here are the recommended upgrade steps to do the Safe Lock Intelligent Manager update and Safe Lock agent upgrade remotely.

  • Step1: Download and import 4 Digicert certificates that (legacy) OSes may not have

    • [DigiCert Assured ID Root CA.cer]
      https://www.digicert.com/kb/digicert-root-certificates.htm
      DigiCert Assured ID Root CA (SHA256 Fingerprint: 3E:90:99:B5:01:5E:8F:48:6C:00:BC:EA:9D:11:1E:E7:21:FA:BA:35:5A:89:BC:F1:DF:69:56:1E:3D:C6:32:5C)
    • [DigiCert Global Root CA]
      https://www.digicert.com/kb/digicert-root-certificates.htm
      DigiCert Global Root CA (SHA256 Fingerprint: 43:48:A0:E9:44:4C:78:CB:26:5E:05:8D:5E:89:44:B4:D8:4F:96:62:BD:26:DB:25:7F:89:34:A4:43:C7:01:61)
    • [DigiCert Hight Assurance EV Root CA]
      https://www.digicert.com/kb/digicert-root-certificates.htm
      DigiCert High Assurance EV Root CA (SHA256 Fingerprint: 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF)
    • [DigiCert Trusted Root G4]
      https://www.digicert.com/kb/digicert-root-certificates.htm
      DigiCert Trusted Root G4 (SHA256 Fingerprint: 55:2F:7B:DC:F1:A7:AF:9E:6C:E6:72:01:7F:4F:12:AB:F7:72:40:C7:8E:76:1A:C2:03:D1:D9:D2:0A:C8:99:88)
  • Step2: Apply Safe Lock TXOne Edition 1.1 critical patch 2010 to upgrade Intelligent Manager

    • Before upgrading, backing up Intelligent Manager database is strongly suggested.
  • Step3: Upgrade Safe Lock agents

    • Administrators can upgrade agents directly from the web console page by using Intelligent Manager to deploy an uploaded patch file to remote Safe Lock agents. Below is the procedure.

      1. Click Agents from the Intelligent Manager console. The Agent Management screen appears.
      2. Select one or more agents or groups.
      3. Click Send Command > Deploy Agent Patch.
      4. Select the patch file for deployment.
      5. Click Deploy.
      6. Please wait for the upload process to complete. After Intelligent Manager verifies the validity of the file, it deploys the patch file to the selected agents.
    • Step 3.1: Apply the Safe Lock TXOne Edition 1.1 critical patch 1042 to remote agents

    • Step 3.2: Apply the Safe Lock TXOne Edition 1.1 critical patch 1060 to remote agents

For support assistance, please contact us at support@txone.com or your Support Provider.


Was this article helpful?