Cloud Storage Security Help Docs
Release Notes
  • Introduction
  • Getting Started
    • How to Subscribe
      • Pay-As-You-Go (PAYG)
      • Bring Your Own License/GovCloud (BYOL)
      • AWS Transfer Family
    • How to Deploy
      • Steps to Deploy
      • Advanced Deployment Considerations
      • AWS Transfer Family
    • How to Configure
  • Console Overview
    • Dashboard
    • Malware Scanning
      • AWS
        • Buckets
        • Amazon EBS Volumes
        • Amazon EFS Volumes
        • Amazon FSx Volumes
        • WorkDocs Connections
      • Azure
        • Blob Containers
      • GCP
        • GCP Buckets
    • See What's Infected
      • Findings
      • Malware History
      • Results
    • Schedules
    • Monitoring
      • Error Logs
      • Bucket Settings
      • Deployment
      • Jobs
      • Notifications
      • Storage Assessment
      • Usage
    • Configuration
      • Classification Rule Sets
      • Classification Custom Rules
      • Scan Settings
      • Console Settings
      • AWS Integrations
      • Job Networking
      • API Agent Settings
      • Proactive Notifications
      • License Management
      • Event Agent Settings
    • Access Management
      • Manage Users
      • Manage Accounts
        • Linking an AWS Account
        • Linking an Azure Account
        • Linking a GCP Account
      • Manage Groups
    • Support
      • Getting Started
      • Stay Connected
      • Contact Us
      • Documentation
  • Product Updates
  • How It Works
    • Scanning Overview
      • Event Driven Scanning for New Files
      • Retro Scanning for Pre-Existing Files
      • API Driven Scanning
    • Architecture Overview
    • Deployment Details
    • Sizing Discussion
    • Integrations
      • AWS Security Hub
      • AWS CloudTrail Lake
      • AWS Transfer Family
      • Amazon GuardDuty
      • Amazon Bedrock
    • Demo Videos
    • Scanning APIs
    • SSO Integrations
      • Entra ID SSO Integration
      • Okta SSO Integration
  • Frequently Asked Questions
    • Getting Started
    • Product Functionality
    • Architecture Related
    • Supported File Types
  • Troubleshooting
    • CloudFormation Stack failures
    • Cross-Region Scanning on with private network
    • API Scanning: Could not connect to SSL/TLS (v7)
    • Password not received after deployment
    • Conflicted buckets
    • Modifying scaling info post-deployment
    • Objects show unscannable with access denied
    • Remote account objects not scanning
    • My scanning agents keep starting up and immediately shutting down
    • I cannot access the management console
    • Linked Account Out of Date
    • Rebooting the Management Console
    • Error when upgrading to the latest major version
    • I Cannot Create/Delete an API Agent
  • Release Notes
    • Latest (v8)
    • v7
    • v6 and older
  • Contact Us & Support
  • Data Processing Agreement
  • Privacy Policy
Powered by GitBook
On this page
  • Types of Updates
  • Performing Updates
  • Console Updates
  • Agent Updates
  • Linked Account Role Updates

Product Updates

Updating your console and agent is straightforward and easy to do.

PreviousDocumentationNextHow It Works

Last updated 28 days ago

**IMPORTANT**

Please upgrade your Linked Account Roles to v1.14.001 or later BEFORE upgrading your console/agent to v8.

If you do not upgrade your Linked Account Roles then you could experience problems when using EventBridge. to learn more about Linked Account Updates.

Please also note, you'll also need to upgrade your console/agent to the you're currently on before you can upgrade to the next major version.

For example, if you are on v6, you'll need to upgrade to the latest version of v6, then upgrade to the latest of v7, then finally upgrade to v8.

Types of Updates

There are 3 updates you could face: Major, Console Minor and Patch, and Agent Minor and Patch. All are performed from the top right corner of the console from the following icon:

Notice the red dot as that is the indicator you have some form of update available. We are following the Major.Minor.Patch versioning number format. All updates are preformed through the simple click of a button in the Updates popup.

Major updates are a larger update that forces both the console and the agent to update. The console and agent can be updated independently, but they can never deviate from having the same Major version number.

Minor updates are those where we may have added new functionality. This applies to the console and the agents.

Patch updates are those where we have mainly added bug fixes to the release. This applies to the console and the agents.

Performing Updates

When you click any of the update buttons within the Updates popup, we will roll out a new Task Definition(s) pointing at the new version of the specified component. Major forces both the console and agents to update together. Console-only or Agent-only updates will just update that one component. This will span all regions you have agents running.

When updating the Scanning Agents it will update all agents running globally.

AWS Fargate does not persist IPs across task refreshes or reboots. Therefore a new IP is always generated. We provide a dedicated subdomain URL to abstract this from you so you have a consistent access experience. You can leave this URL as the default that was provided or you can that is easier to remember.

You will see the following messages, or something similar, during the update:

Once the update is complete the popup will show No Available Updates:

Console Updates

Console updates are delivered via a CloudFormation Stack update. We automate this for you by executing the stack update against the stack used to create the current running deployment. If you'd like to better understand the specifics of what was updated, you will be able to see this in the CloudFormation Service area of the AWS Console as seen below. In the image below, you'll see the initial installation was done on 6/18 and then an update was performed on 07/09 along with each component that was involved in the update.

Agent Updates

Whereas the Console updates are performed through a CloudFormation update, agent updates are done through the Console itself.

Linked Account Role Updates

Linking AWS Accounts into the console is done by deploying a cross-account role CloudFormation stack in each account. Updates do come out for this role to provide the functionality to keep your data safe. This stack needs to be updated which can also be triggered from this updates menu. Clicking this option will attempt to update every linked account's role. If you'd like to roll the updates out in stages for your linked accounts, then perform the updates on a smaller scale on the Manage Accounts page. For more information on this, please refer to the page.

latest current version
Click here
Managed Accounts
specify a more useful name
Updates Popup
Stack Updates
Linked Accounts Role Top Updates Menu