Release Notes
Abstract
This technical note provides guidance for installing IBM Guardium Data Protection 12.2, including any new features or enhancements, resolved or known issues, or associated notices.
Content
Guardium 12.2 is available as an ISO product image on Passport Advantage. If the downloaded package is in .zip format, extract it outside of the Guardium appliance before you upload or install it. Review the latest version of these release notes just before you install. Install Guardium across all of the appliances, such as the central manager, aggregators, and collectors. For detailed steps, see Installing your Guardium Data Protection system.
Note: The Guardium system will restart during the upgrade process for all of the patch installations, so schedule the upgrades in batches during low database traffic times to minimize audit gaps. Do not reboot the appliance while the patch installations are in progress. Contact IBM Support if there is an issue with patch installation.
- Centralized case investigation and management with ability to add threat categories based on policy rules or threshold alerts directly from the Active Threat Analytics dashboard.
- Detailed view of the observations related to Outlier detections in a case.
- Enhanced monitoring and investigation capabilities with two additional predefined admin reports to identify admin users who access a production database for the first time and those who log in to the database by using multiple client internet protocols.
- Improved case management for high volumes of cases by closing multiple active threat analytics cases simultaneously and automatically closing matching cases from an exclusion list.
- Integration of Risk Spotter to identify and assess risky users from the Active Threat Analytics dashboard.
- Retrieval of detailed Active Threat Analytics cases information with API command get_ata_case_info.
- Option to make comments mandatory before signing off on audit process results.
- User activity audit trial improvements to track updates if for Policy installation, edit and add policies and rules, Upload Modules, Set up by client and GIM Global Parameters.
- Automatic identification of managed units based on common name (CN), subject alternative names (SAN), and wildcards certificates.
- Bulk retrieval of certificate signing requests (CSR) for all managed units from the central manager to manage expiring certificates.
- Certificate distribution status reports.
- Smart assistant for compliance monitoring provides the ability to set up data source vulnerability assessments and alerts for generated regulation policies.
- Compliance regulation templates for National Institute of Standards and Technology (NIST), North American Electric Reliability Corporation (NERC), New York Department of Financial Services (NYDFS), and The Digital Operational Resilience Act (DORA).
- Ability to set up a custom data compliance program with controls to measure your compliance with relevant regulations, standards, and policies, and thresholds to measure the performance of your compliance controls.
- Data compliance hub provides a central view of your compliance posture.
- The cross-CM health view feature is renamed to enterprise hub. In Guardium 12.0 and 12.1, the original name remains visible; Guardium versions 12.2 and later display the new name.
- Distribution of configuration profiles can be done from enterprise hub to central managers and managed units.
- Ability to uninstall and reinstall security policies on managed units, and a policy from a central manager.
- Ability to update group members without policy changes.
- Additional security incidents detection with session-level policy templates for blind SQL injection detection, encrypted session detection, quantum safety detection (insecure TLS connections), and suspicious administrative activity (start time range) rules.
- New query rewrite (QRW) action with session-level policies.
- Query rewrite verdicts not applied to fully encrypted database instances.
- Session-level policy additions and new criteria, actions support, rule definitions, and tokens.
- Automatic discovery of MongoDB instances.
- Backup load balancer assignment.
- Custom S-TAP bundles in GIM setup.
- Internal load balancer enhancement.
- Enterprise load balancer support for Oracle Advance Security Option (ASO) traffic.
- Modification of inspection engines with guard-config-update script.
- Option to perform Kerberos session correlation locally.
- Seamless S-TAP upgrade with A-TAP continuity.
- Guardium Data Protection Linux-UNIX S-TAP 12.2.0.0 r121306
- Guardium Data Protection Linux-UNIX GIM 12.2.0.0 r121306
- Guardium Data Protection Linux-UNIX CAS 12.2.0.0 r121306
- Internal load balancer enhancement.
- Firewall parameter for database sessions to make progress when all collectors are down: VERDICT_RESUME_DELAY.
- Parameter for Windows PCRE regular expressions: PCRE_REGEX_ENABLED.
- Support for Apache Solr 9.8.1
- Support for Microsoft Azure as a remote storage option for backup, restore, and data archiving.
- Support for Nutanix Acropolis Hypervisor (AHV) 10.3
- Support for Nutanix Acropolis Operating System (AOS) 7.1
- Support for Red Hat OpenShift Virtualization
- Utilization of Java 17 and support for FIPS 140-3.
- Bulk data source profile configuration templates to create, test, and install multiple data source profiles at once.
- Java Database Connectivity (JDBC) credentials over TLS for Oracle Unified Audit (OUA).
- Enterprise load balancing for universal connectors. Set up group associations for universal connector profiles by using the enterprise load balancer configuration for OUA-based Oracle universal connector.
- Manage Apache Kafka clusters by using cruise control
- New preinstalled universal connector plug-ins:
- OpenSearch over CloudWatch
- Azure Databricks over Event Hub
- Capella over Capella Input
- Trino for Apache Hive
- Additional universal connector plug-ins available for configuration through the central manager workflow:
- Apache Solr over Pub/Sub
- DocumentDB over CloudWatch Logs
- FireStore over Pub/Sub
- GCP Big Query over Pub/Sub
- MongoDB over Mongo Atlas
- MySQL over Pub/Sub
- Neptune over Cloudwatch Logs
- PostgreSQL over Pub/Sub
- Redshift over Cloudwatch Logs
- Redshift over S3
- S3 over SQS
- Spanner over Pub/Sub
- Universal connector fixes are now delivered in cumulative patches separate from Guardium Data Protection appliance bundle patches. When you install Guardium 12.2 (GPU 12.0p200), your universal connector will upgrade to what is included in the GPU only if the universal connector on the system where you are installing GPU 12.0p200 is older than the universal connector that is included in GPU 12.0p200.
- Modern, refreshed look that enhances usability, such as:
- Tabbed pages that logically organize content, making navigation more intuitive.
- Expandable rows and side panels that reveal details contextually, reducing on-screen clutter.
- Stepped flows and wizard-based forms that break down complex tasks into manageable steps, improving usability.
- Struts-to-modern user interface conversion of the Welcome, Central Management, Global Profile, Anomaly Detection, System, Distribute Report Builder, and Definitions Import/Export pages.
- Containerized Vulnerability Assessment Scanner improves the scalability and performance of data source scanning.
- View all Common Vulnerabilities and Exposures (CVEs) fixed in Guardium release 12.0 and later directly on the Guardium CVE Information page.
- Filter CVEs relevant to your patch version by importing CSV files from Nessus or Qualys vulnerability scanner agents to your Guardium system. View the filtered CVE list on the Filtered CVE Information page.
| Sniffer patch number | Issue key | Summary | APAR |
|---|---|---|---|
12.0p4006 | See release notes for sniffer patch 12.0p4006 | ||
12.0p4007 | See release notes for sniffer patch 12.0p4007 | ||
12.0p4008 | See release notes for sniffer patch 12.0p4008 | ||
12.0p4009 | See release notes for sniffer patch 12.0p4009 | ||
12.0p4011 | See release notes for sniffer patch 12.0p4011 | ||
12.0p4012 | See release notes for sniffer patch 12.0p4012 | ||
12.0p4013 | GRD-108510 | Add alert template variable to include RTTE reasoning for real-time alerts: %%RTTEData |
- Milvus
- Oceanbase
- TigerGraph
- Amazon Linux 2 and Amazon Linux 2023 (Limited to ARM64 and x86 architectures and has support for Apache Cassandra, MongoDB, MySQL, Oracle (x86 only), and PostgreSQL)
- Apache Cassandra 5.0.2
- DataStax Cassandra DSE 6.9.9
- CockroachDB 25.1.2
- Couchbase 7.6.4
- CounchDB 3.4.2
- EDB Postgres 17.4
- Elasticsearch 8.15.3
- IBM Db2 12.1
- Informix 15.0
- MariaDB 11.5.2
- MongoDB 8.0.8
- MySQL 8.4.2
- Neo4j 2025.08
- PostgreSQL 17.5
- Redis 7.8.2
- SingleStore 8.7.18
- Sybase ASE 16.1
- Teradata 20.0
- Vertica 25.2
- Ubuntu 24 on x86 and s390x
- Couchbase 7.6.3
- CouchDB 3.4.2
- EDB Postgres 17.4
- Elasticsearch 8.15.3
- IBM Db2 12.1
- Informix 15.0
- MaridDB 11.5.2
- MongoDB 8.0.5
- MySQL 8.4.2
- Neo4j 2025.04
- Oracle 23ai Free
- PostgreSQL 17.2
- Sybase ASE 16.1
- Amazon DocumentDB 5.x versions Amazon Web Services
- Amazon ElastiCache all versions Amazon Web Services
- Aerospike Graph
- Amazon Neptune Database all versions Amazon Web Services
- Couchbase Capella all versions Couchbase Services
- IBM Db2 13 for z/OS
- Microsoft Azure Cosmos all versions Azure Services
- Microsoft Azure PostgreSQL Flexible Service
- MongoDB 7.0
- Neo4j 5.x, 5.1x, and 5.2x (up to 5.24)
- YugabyteDB all versions Amazon EC2
| Old command | New command |
|---|---|
store unit type cmhealthview | store unit type enterprisehub |
| Component | Issue key | Summary |
|---|---|---|
| Apache Solr | GRD-109074 | With the Apache Solr upgrade in Guardium Data Protection 12.2, the old Solr data (from before the upgrade) on central manager and managed units will not be returned on the Quick Search page. This includes units upgraded to 12.2 and units that are at a lower version than the central manager. No workaround is available. |
| Apache Solr | GRD-110065 | Guardium 12.2 does not automatically invoke Apache Solr repair to detect issues in the environment. Workaround: You must manually invoke solr_repair through the command-line interface. |
| Apache Solr | GRD-110083 | If after running grdapi enable_quick_search in some edge cases, the nodes appear down on the quick search UI. Workaround: Run the CLI command store solr rebuild_shards on the central manager. |
| Apache Solr | GRD-110107 | If you register a lower version managed unit after the central manager is upgraded to Guardium 12.2, the Apache Solr certificate is not distributed on the managed unit. Workaround: Manually push patch 1138 to the managed unit to install the Solr certificate. |
| Apache Solr | GRD-110246 | On Guardium 12.2, if you enable or disable FIPS mode on the environment, then Apache Solr may go down on managed units. Workaround: Execute the GuardAPI command restart_solr on impacted managed units. |
| Apache Solr | GRD-110559 | If Apache Solr does not work on managed units after upgrading to Guardium 12.2, run the CLI command store solr rebuild_shards |
| Central manager | GRD-102666 | Due to changes in behavior to TLS enablement in 12.2, if you run the get_secured_protocols_info from a central manager to a managed unit that is still in version 11.x, it may inaccurately show the TLS version if deprecated protocols are enabled. The returned information may not be correct. |
| Central manager | GRD-108384 | During the backup central manager process, when the primary central manager switched back from the secondary central manager, you may receive an “API Connection Failed: Guardium is unable to connect to the server” error on the Data compliance page. Workaround: Restart the feature with the GuardAPI command grdapi restart_data_compliance. |
| Central manager | GRD-108467 | When you run the CLI command grdapi get_secured_protocols_info fullscan=1 in a 12.2 central manager, any 11.5 managed unit will incorrectly report that TLS is configured for versions 1.2 and 1.3 when TLS on the managed unit is actually set for version 1.2 only. |
| Central manager | GRD-108655 | After switch from central manager to backup central manager, the cruise control functionality present in Kafka Cluster Management will not work on the new central manager. |
| Central manager | GRD-110531 | While using the CLI to register an aggregator and collector to the central manager, you might see the message “Fail: Successfully registered unit, logging out of cli session” even when registration is successful. |
| Certificate | GRD-108347 | The CLI command store certificate smime sender only supports SCP or SFTP to import your pfx file into the Guardium appliance. Do not use other options in the list. |
| Compliance monitoring | GRD-106731 | If your data source is configured for the universal connector, only the following data sources are supported in the Compliance Monitoring page: DB2, ORACLE, INFORMIX, MYSQL, MS SQL SERVER, SYBASE, TERADATA, POSTGRESQL, NETEZZA, SAP HANA, and MONGODB. This will be fixed in a future release. |
| CyberArk | GRD-110672 | Before re-installing the CyberArk patch, the corresponding entry for that Guardium system should be removed from the CyberArk vault server and CyberArk needs to be uninstalled. |
| Data compliance | GRD-105573 | If a user imports the data compliance control charts after the threshold is run manually, the system does not display any data in the charts. Workaround: Manually refresh the page. The system will then display data in the charts. |
| Data compliance | GRD-105644 | If you have data compliance enabled and you restart your Guardium system, you may receive an “API Connection Failed: Guardium is unable to connect to the server” error. Workaround: Restart the feature with the command grdapi restart_data_compliance. |
| Data compliance | GRD-105756 | Data compliance is not supported on IPv6-only environments. No workaround is currently available. |
| Data compliance | GRD-108010 | Delayed or rerun Thresholds show today’s age instead of the TO_DATE for the report run. No workaround is currently available. This will be fixed in a future release. |
| Data compliance | GRD-110249 | In rare instances, compliance templates may deploy a threshold without a selected metric or measure column. If this occurs you will see that the threshold and control remains unmeasured for a long period of time after deployment. You can confirm the issue exists by reviewing the threshold settings and observing that there is no selected column for either the measure or the metric. Workaround: To resolve the error, delete the reports the threshold uses, the threshold and the control. Then redeploy the template. |
Data compliance | GRD-110323 | In large environments with busy central managers, it was observed that threshold values may unexpectedly report zero in situations where many other processes ran at the same time as the threshold calculations. Workaround: Until this issue is resolved, users are encouraged to schedule threshold calculation at a time when audit processes and other scheduled jobs are not running. This can be done in Setup > Tools and Views > Threshold Update Job Configuration. |
| Enterprise load balancer | GRD-106684 | Invalid error message displays on the Enterprise Load Balancer Properties page when an out-of-range value is entered for the following properties:
Workaround: Enter valid values. |
| Executive Dashboard | GRD-106494 | IBM DB2 for z/OS and IMS DB do not consistently appear in the Asset Inventory page cards. They will appear if there are active S-TAP for z/OS agents. |
| Executive Dashboard | GRD-109156 | For some times after midnight (00:00) in the date time picker, the calendar refers to the previous day with a period (.) underneath the day’s number instead of the current date. |
| External S-TAP | GRD-110116 | Enterprise load balancer is not supported by External S-TAP. Ensure that enterprise load balancing is not configured on the collector. |
GIM | GRD-74281 | GIM transitional bundles (SHA1) cannot be uploaded to Guardium 12.2 when FIPS mode is on. Workaround: Turn off FIPS mode to upload SHA 1 GIM bundles. |
| GIM | GRD-103379 | When upgrading a GIM client from a major version that supports GIM bundle changes to a major version that does not support GIM bundle changes (versions earlier than 12.2), the GIM Client Status report may display outdated values in the Active Certificate-related columns. Workaround: To avoid seeing outdated certificate values in the report, you can perform a GIM connection reset. This action clears the stale data and refreshes the client status. |
| GIM | GRD-109036 | If your GIM agent is not connected after you upgrade your Guardium appliance to 12.2 (and assuming GIM service port 8446 is open), restart tomcat manually from the command-line interface with the restart gui command. |
| GuardAPI | GRD-104958 | Running GuardAPI commands is not currently supported on Kafka nodes. |
| Guardium Data Security Center and Guardium Insights | INS-59195 | Before upgrading any Guardium Data Protection appliances to 12.x, you should perform the workaround of disabling all the collectors from Guardium Data Security Center and Guardium Insights. Clients will encounter problems if the collectors are still enabled during the upgrade. Workaround:
|
Install | GRD-103896 | During the patch installation process for Guardium 12.2, the following warning message might appear and be added to the patch log: “Warning: The system is configured to read the RTC time in the local time zone.” This is only a warning and the message will disappear after the patch installation is complete. Workaround: Use the CLI command 'timedatectl set-local-rtc 0' to set the real-clock time (RTC) to Coordinated Universal Time (UTC). |
| Linux-UNIX S-TAP | GRD-99873 | S-TAP traffic capture for IBM Db2 on Solaris 5.10 might occasionally be incomplete. As a result, some queries might not be logged and are missing from reports. No workaround is currently available. |
Linux-UNIX S-TAP | GRD-104759 | DataStax Cassandra remote traffic queries are not logged in the Full SQL report when configured with DataStax auditing for a non-existing database. The query is logged in the SQL ERROR report instead. No workaround is currently available. |
| Linux-UNIX S-TAP | GRD-105535 | Oceanbase Oracle mode redaction is not currently supported in Guardium 12.2. |
| Linux-UNIX S-TAP | GRD-106202 | Some login errors may be missed as application-level response errors in HTTP/1 traffic aren't analyzed due to their non-standard nature. Only responses with HTTP/1 500 error codes are recognized as login failures. |
| Linux-UNIX S-TAP | GRD-108710 | Since the following platforms do not support updated SSL ciphers that are required to negotiate a secure connection in FIPS 140-3 mode with a Guardium 12.2 managed unit, aggregator, or stand-alone collector, they must fall back to using an unencrypted connection:
|
Linux-UNIX S-TAP | GRD-109484 | While attempting to create an OceanBase datasource in Oracle mode for S-TAP verification, the connection fails, preventing the datasource from being created successfully. |
| Mail encryption | GRD-106564 | The "Active":true JSON field for ALERTER_SMIME_CONFIG is ignored in favor of the GuardAPI parameter ALERTER_SMIME_ACTIVE to determine whether or not S/MIME is activated. Workaround: Users can control whether S/MIME is on or off by changing ALERTER_SMIME_ACTIVE by calling grdapi from the CLI with the following command: grdapi modify_guard_param paramName=ALERTER_SMIME_ACTIVE paramValue=true. |
| Risk Spotter | GRD-110440 | After applying patch 12.0p125, the dynamic auditing policy setup on Risk Spotter is removed from the UI. Workaround: Go to Active Risk Spotter > Policy and related modules > Dynamic Auditing and select the policy that is installed on the collector from the list. |
| TLS | GRD-108626 | Unable to connect using JDBC credentials over TLS when TLS version 1.3 is enabled, as Oracle 19c Enterprise Edition does not support this TLS version. Workaround: You can use Oracle 23ai database which supports TLS version 1.3. |
| TLS | GRD-110500 | Important: While Guardium supports TLS 1.3, not all add-ons and features currently provide TLS 1.3 support. Until you know that every part of your Guardium system supports TLS 1.3, do not disable TLS 1.2. |
| Universal connector | GRD-103771 | In a Guardium on Oracle Cloud Infrastructure environment, when creating an Apache Kafka cluster through Kafka Cluster Management, the node initialization fails. Workaround: For proper Kafka cluster setup in an Oracle Cloud Infrastructure environment, the correct hostname and domain name are required and should not exceed 64 characters. To find this information, open the Kafka Cluster Management interface, select your virtual machine name, click Networking, and look for the Hostname and Internal FQDN fields. The domain is the string after the hostname. The hostname and domain that are visible on the Networking page are the values you can use when running the CLI commands store system hostname <value> and store system domain <value>. |
| Universal connector | GRD-103946 | After you modify a cluster on the Kafka Cluster Management page, the Kafka Metrics dashboards might initially display 0 for all values. After a delay, the graph values reappear. |
| Universal connector | GRD-105697 | To ensure optimal performance of your enterprise load balancer, it’s important to avoid having unassigned profiles on Guardium. If you currently have any unassigned profiles, follow these steps:
By completing these steps, your profiles are automatically managed within the groups you defined. This eliminates the need for default profiles and ensures there is no additional overhead from managing unassigned profiles. |
| Universal connector | GRD-106690 | When collectors in the Primary group go down, the enterprise load balancer does not assign all available managed units from the Failover group at once. Instead, it allocates them one by one, with some delay between each allocation. This sequential allocation leads to a noticeable delay in recovery when multiple collectors fail at the same time, since the Failover managed units are not brought online simultaneously. |
| Universal connector | GRD-108368 | The deployed status of the installed universal connector profile is seen as "Installing the Profile" on the restored environment for the central management flow. Workaround: Reinstall the problematic universal connector profiles from the Central Manager as follows: 1. Go to Manage > Universal Connector > Datasource Profile Management. 2. Select the problematic universal connector profiles. 3. Click Install > Reinstall. The deployed status is properly visible after reinstallation is complete. |
| Universal connector | GRD-109491 | When creating a universal connector data source profile for Apache Kafka, the profile name must consist of only letters, numbers, underscores (_), or hyphens (-) since it’s also used as the topic name in Kafka. Avoid using any other characters. |
| Universal connector | GRD-110250 | While rebooting a Kafka node machine or its UI, if the central manager is not up and reachable, the Kafka node machine tries to remove itself from an established Kafka cluster. This leads to the instability of the Kafka cluster and potential traffic monitoring loss if universal connectors are active. Workaround: First, start or restart the central manager. After the central manager comes up, verify that the UI is up and running fine. Then boot up the Kafka node machines. |
Universal connector | GRD-110311 | In a large deployment (>50 MUs), correlation alerts defined on the Kafka Cluster might not fire as expected. |
| Universal connector | GRD-86940 | Universal Connector Kafka cluster nodes are not part of backup. This will be fixed in a future patch. |
Unified Discovery and Classification | Custom sensitivities are scanned for on-premises databases only and not for cloud and SaaS instances. Enhancements to expand custom sensitivities to cloud and SaaS will be coming soon. | |
Unified Discovery and Classification | Encrypted connections (SSL) to on-premises databases are not supported in version 1.0. | |
Vulnerability Assessment Scanner | GRD-110361 | Vulnerability Assessment Scanner does not work on Guardium aggregators. The following error message appears if you try to run it on an aggregator: "ERROR DatasourceConnections". This will be fixed in a future release. Workaround: Run the Vulnerability Assessment Scanner only on managed units. |
| Issue key | Summary | APAR |
|---|---|---|
| GRD-63344 | Oracle Unified Audit (OUA) DB instance information lost after operating system reboot with GIM | GA18052 |
| GRD-71179 | Restart supervisor service INIT start on Solaris 11 servers to avoid S-TAP failing to start after reboot. | DT389799 |
| GRD-74027 | Added DB_NAME for CouchDB to avoid mistaking for Couchbase traffic | DT433671 |
| GRD-78772 | Venafi: Guardium GUI certificate renewal error: "guardium Venafi retrieve script error 80333" trying to import Venafi certificate | DT389660 |
| GRD-78855 | Backup restore didn't restore the SAML and CyberArk configuration from 11.5 to 12 | DT276401 |
| GRD-80164 | "show remotelog test" configured with facility.priority='all.all' only tests using facility.priority='daemon.info' | DT419678 |
| GRD-80679 | Guardium audit process intermittently fails with error:1615; message:Prepared statement needs to be re-prepared | DT421926 |
| GRD-80995 | Couchbase database connection vulnerability assessment with LDAP needs GUI changes | DT379903 |
| GRD-81863 | 100% CPU usage on multiple collectors after 11.0p535 upgrade | DT394196 |
| GRD-81983 | Aggregator GUI is slow and unresponsive | DT395091 |
| GRD-82250 | Guardium cannot classify tables with function-based index on Sybase database [Error Code: 11738] | DT396797 |
| GRD-83569 | Data in RESULT_DETAIL column of table TEST_RESULT_DETAIL is truncated | DT409139 |
| GRD-83572 | Vulnerability Assessment Test ID 394 fails for MongoDB, indicating that authentication is disabled if auth type is x509 (which is a valid authentication type) | DT419687 |
| GRD-83923 | Updated permissions for the GIM service to prevent erroneous warning messages in syslog | |
| GRD-84215 | Cannot upload Guardium Installation Manager modules again | DT395912 |
| GRD-84325 | Audit process not adding partitions in finalSql | DT396467 |
| GRD-84548 | Version 12 grdapi command with --help=true hangs | DT409020 |
| GRD-85220 | logrotate configuration reverts to default after installing bundle patch 11.0p540 or 11.0p545 | DT399828 |
| GRD-85278 | Audit process builder's reordering receivers not taking effect | DT393991 |
| GRD-85772 | Enterprise Load Balancer not relocating S-TAPs when collector database is getting full | DT419735 |
| GRD-86477 | Added support for family of kernels 5.10.0-32.x86_64 | |
| GRD-86523 | Analyzer issue to handle some Teradata Database traffic | DT398866 |
| GRD-86991 | When creating tuple group, unable to add tuple parameters on a Simplified Chinese appliance | DT399735 |
| GRD-86996 | CLI: Unable to set Alerter SNMP traphost by using hostname | DT397016 |
| GRD-87129 | After configuring A-TAP on collector with Oracle Exadata databases, the collector reports a high CPU usage | DT420527 |
| GRD-87135 | Unable to send files from Guardium to COS bucket on IBM Cloud | DT431894 |
| GRD-87282 | EMEA - GUI showing SNMP version 2 but CLI and traffic in SNMP version 3 | DT400637 |
| GRD-87489 | Weak default snif ciphers (TLS_RSA) | DT396934 |
| GRD-87490 | Fixed missing traffic captured by using Ubuntu 22 | DT419779 |
| GRD-87491 | Error 'ORA-00942: table or view does not exist.' from Assessment Test ID 2374 'No Authorization To CREATE ANY LIBRARY Privilege' | DT419661 |
| GRD-87503 | Guardium unable to connect with Oracle databases, getting Java Array error - VA | DT418630 |
| GRD-87529 | Add TUPLE_PARAMETERS table to translation | |
| GRD-87718 | GUI certificate size still running in 1024 bits in central manager | DT422234 |
| GRD-87819 | Duplicated in Group Builder after importing policies with shared groups | TS017242631 |
| GRD-87862 | Add support for family of kernels 5.14.0-284.11.1.el9_2.s390x | |
| GRD-87931 | Cannot overwrite SNMP contact information | DT397398, DT397399 |
| GRD-87951 | EMEA Guardium SYSLOG issue encountered as everything in wait status | DT409085 |
| GRD-88026 | Cloning out of the box reports fails | DT420128 |
| GRD-88033 | Added separate event handles to notify S-TAP when 64-bit and 32-bit database processes start | DT416655 |
| GRD-88120 | Aggregator: Import/Export/Archive failing after bundle patch 545 with "Another aggregation process is currently running" | DT417651 |
| GRD-88200 | Fixed an instability in Microsoft SQL Server instance due to the Correlator Proxy dynamic-link library (DLL). You must reboot the database server to update the Correlator Proxy DLL. | DT398828 |
| GRD-88259 | reset-managed-cli command fails to reset the CLI password on all managed units | DT419826 |
| GRD-88351 | Added support for family of kernels 6.4.0-150600.23.17-default #1 | DT437910 |
| GRD-88364 | CyberArk CLI commands not working as expected | DT438034 |
| GRD-88775 | 'show system hostname' command fails with the "Error: Machine information not found" message | DT409174 |
| GRD-88890 | Backup configuration through SFTP protocol failed with the error message: connection corrupted | DT426747 |
| GRD-89081 | CLI command show port open scans for the open port instead of making an actual connection | |
| GRD-89105 | syslog daemon service (rsyslogd) keeps crashing and stops logging to the messages syslog file | DT409033 |
| GRD-89175 | Fixed session correlation and Kerberos delivery timeouts | DT438267 |
| GRD-89290 | support reset_managed_cli command does not set chage for CLI user | DT409177 |
| GRD-89308 | Version 12.1 managed units do not successfully register to central manager | DT426768 |
| GRD-89310 | GUI login hangs in AWS cloud environment with central manager and managed units | DT419827 |
| GRD-89389 | Removed unnecessary blank lines in guard_tap.ini during OS patching | DT437906 |
| GRD-89466 | Prevent S-TAP instability by ignoring empty traffic messages | DT417031 |
| GRD-89562 | Inconsistent hostname in syslog message header for Guardium sniffer and audit process | DT423305 |
| GRD-89659 | The issue with test report result for Guardium vulnerability assessment scan is Guardium Test ID on MS SQL Server is No Guest User Accounts is erring for all instances | DT419987 |
| GRD-89693 | Change how rsyslogd is started | |
| GRD-89704 | Aggregation/archive log warning | DT420186 |
| GRD-89890 | Adds the option PROCEDURE_OBJECT_FIELD (that can be enabled through the following grdapi command: modify_guard_param) to change sniffer parsing behavior to not explicitly associate non-literal function arguments with function or procedure objects when evaluating object+field policy rule tuple groups and logging | DT418983 |
| GRD-89910 | Guardium version 12.1 central manager still accepts TLS 1.0 and 1.1 connections | DT431893 |
| GRD-89993 | Removed a vulnerable Perl file subject to CVE-2023-7101 vulnerability | DT437925 |
| GRD-90015 | Venafi certifications failing after applying fix p550 | DT416887 |
| GRD-90211 | Unable to add new catalog archive entry on collector | DT421878 |
| GRD-90257 | Some GUI operations, such as editing a report in Query-Report Builder, take several minutes to respond | DT418120 |
| GRD-90468 | Add support for kernel 6.8.0-47-generic.x86_64 | |
| GRD-90524 | Removed repeating S-TAP log message "no free entries" in db2diag | DT438099 |
| GRD-90648 | Guardium Vulnerability Assessment test ID does not show correct value in CURRENT_SCORE_SINCE column | DT424310 |
| GRD-90821 | Unable to capture guard_diag | DT419135 |
| GRD-90866 | Collector GUI down after failed data restore from 10.6 to 11.5 | |
| GRD-90878 | Archive and system back up configuration fails using password-less SSH configuration | |
| GRD-90898 | Incorrect indentation in grdapi list_inspection_engines | DT425742 |
| GRD-90942 | Scheduled Job Exception 'IP Alias creation: An error occurred java.util.IllegalFormatConversionException: d != java.lang.String' after version 12.1 upgrade | DT419702 |
| GRD-90989 | Sending alerts through SMTP fails if the SMTP server supports only NTLM authentication | DT434614 |
| GRD-91695 | Resolved security vulnerability | |
| GRD-91760 | Fixed an issue where Application TAP (A-TAP) did not work for Sybase IQ for Red Hat Enterprise Linux (RHEL) 9 due to a change in libraries | DT437877 |
| GRD-92214 | Issue with adding and updating catalog by using GUI and GuardAPI | DT426077 |
| GRD-92308 | Primary central manager failover policy installation verification change | DT421946 |
| GRD-92349 | Fixed an issue related to possible termination of sessions when Firewall S-Gate is enabled | DT426053 |
| GRD-92530 | Deployment Health Table / Dashboard on the central manager shows unavailable status (blue) for all managed units | DT425251 |
| GRD-92550 | Version 12.1 Certificate Management report shows that patch-signing.cert.pem and patchCA.cert.pem are expiring soon, although version 12.1 installed new certificate files with updated expiration dates | DT424328 |
| GRD-92686 | GuardAPI command to upload custom table is not working when using only data source group is attached to the custom table | DT431864 |
| GRD-92701 | Logged instance points to not logged construct ID | |
| GRD-92780 | Storage of host (bind) variables in the appliance | |
| GRD-92783 | Resolved conflict between S-TAP, Application TAP (A-TAP), and Rubrik by adding preload-libs parameter for a full path to third-party, preinstalled libraries while configuring A-TAP. For more information, see Conflict between IBM Guardium S-TAP and Rubrik. | DT438018 |
| GRD-93189 | Unable to log in to the appliance after configuring multi-factor authentication for DUO on Guardium | DT422702 |
| GRD-93414 | Missing S3 me-central-1 zone during configuration of backup | DT444696 |
| GRD-93684 | For the grdapi change_cli_password, the following error appears: User has insufficient privileges for the requested API function | DT431874 |
| GRD-93729 | After the failover to the backup central manager, the managed units are unable to sync license | DT424816 |
| GRD-93898 | Some /var/IBM/Guardium/data/guard-solr/cloud/ filenames on Guardium collectors showing virtual machine template hostname | |
| GRD-94015 | Managed unit registration to the central manager does not succeed due to mismatch in the strength of the system shared secret | DT424713 |
| GRD-94048 | Fixed an issue where Sybase IQ remote traffic was not captured | DT437930 |
GRD-94202 | Universal connector Neo4j plug-in does not start correctly and reports java.lang.NullPointerException: null | DT443019 |
| GRD-94293 | EMEA - Syslog sending junk messages | DT434622 |
| GRD-94620 | After Enforce allowlist for GUI logins is enabled, Chinese characters for user's First Name and Last Name are displayed as garbage characters in the GUI | DT435753 |
| GRD-94697 | Vulnerability Assessment incorrect reporting on Oracle SYSRAC user after installing DPS 2024 Q4 | |
| GRD-95231 | Web application penetration test findings | |
| GRD-95280 | Custom upload to a custom table with a data source of database type Text:FTP fails | DT433584 |
| GRD-95306 | Solr certificate for version 11.5 expired on 12 January 2025 | DT436468 |
| GRD-96966 | Support for multiple proxies under one federated environment | |
| GRD-97203 | High severity CVEs resolved by removing %GIM%\sppNew\c\bin\openssl.exe | DT435454 |
| GRD-97285 | Valid Teradata SQL with "NOT=" operator caused parser error | DT435869 |
GRD-97313 | Incorrect Couchbase object name (Create/Delete bucket) using universal connector for Couchbase to monitor traffic | DT443092 |
| GRD-97325 | Fixed Teradata parser errors | DT435870 |
| GRD-97815 | Issue with proxy functionality support | |
| GRD-97837 | Windows S-TAP now uses OpenSSL 3.5 | |
| GRD-98757 | Risk Spotter stopped working | DT446409 |
| GRD-99835 | After exporting the role to a target central manager, permissions for the role is different between the source central manager and target central manager | DT439490 |
| GRD-99852 | Fixed an issue of IBM Db2 exit Inspection Engine, updated Discovery to report only one EXIT IE instance per Db2 instance even if there are multiple db2sysc processes. | DT438527 |
| GRD-99996 | Support use of "Alert Only" policy action in the session-level policy to alert either on the request (SQL) or the exception of that request. | |
| GRD-100408 | Unable to access Guardium through GUI | DT448944 |
| GRD-101829 | Error when running multiple grdapi commands at once in batch mode | DT442976 |
| GRD-102117 | Error when trying to generate automatic report from audit process builder to search for information related to a privacy set | DT446590 |
| GRD-102722 | When using the command grdapi list_expiration_dates_for_restored_days to list restored data info, it fails with Returned ERR=3000 | DT444670 |
| GRD-103584 | PostgreSQL universal connector plug-in on GCP configuration failure | |
| GRD-103728 | Change tracker alive task might fail in LD due to lack of alive check concurrency with timeout limit | |
| GRD-103838 | If there are multiple Active Threat Analytics cases in the central manager, collectors now use EI_CASE_ID and sourceUnit (collector hostname) to fetch the record for update | DT446510 |
| GRD-105371 | Bell notification on GUI banner shows "Updates are available" and lists 2 old DPS updates | |
| GRD-105884 | K-TAP Request for 5.14.0-570.25.1.el9_6.s390x Red Hat Enterprise Linux 9.6 (Plow) version 12.1 | DT448777 |
| GRD-108309 | Newly added managed units did not have distributed reports scheduled on them |
Was this topic helpful?
Document Information
Modified date:
01 April 2026
UID
ibm17242908